scispace - formally typeset
Search or ask a question
Topic

Trojan

About: Trojan is a research topic. Over the lifetime, 2028 publications have been published within this topic receiving 33209 citations.


Papers
More filters
Proceedings ArticleDOI
04 Sep 2013
TL;DR: Novel methods for system protection that alleviate the need for a golden chip are presented for detecting hardware Trojan detection and the practicality of the introduced schemes are shown by providing a proof of concept implementation of the proposed methodology on FPGA.
Abstract: Hardware Trojan detection is a very important topic especially as parts of critical systems which are designed and/or manufactured by untrusted third parties. Most of the current research concentrates on detecting Trojans at the testing phase by comparing the suspected circuit to a golden (trusted) one. However, these attempts do not work in the case of third party IPs, which are black boxes with no golden IPs to trust. In this work, we present novel methods for system protection that alleviate the need for a golden chip. Protection against injected Trojan is done using simple blockage method. We show the practicality of the introduced schemes by providing a proof of concept implementation of the proposed methodology on FPGA. We showed that the overhead is low enough in the simple blockage method. The delay overhead is negligible while the power overhead does not exceed 2%.

15 citations

Patent
06 Oct 2010
TL;DR: In this article, a method and a device for detecting Trojans by analyzing network behaviors is proposed. But the detection of TrojANS is based on analyzing and comparing behavior characteristics.
Abstract: The invention relates to a method and a device for detecting Trojans by analyzing network behaviors. The Trojans are detected by analyzing and comparing behavior characteristics. The method comprises the following steps of: searching the network behaviors in a local area network; analyzing the representative behavior characteristics of the network behaviors, and detecting the Trojans in real time through the network behaviors such as external linkage of the Trojans, information stealing and outbound information. The device consists of an acquisition device and an analyzer, wherein the acquisition device acquires a network data packet and sends the network data packet to the analyzer; the analyzer reorganizes data, extracts the representative behavior characteristic of the data, performs correlation analysis with a Trojan characteristic library, generates a security event report and presents the security event report to a fore system. The Trojans are detected by using behavior characteristic analysis technology; and compared with the conventional program characteristic code comparison technology, the method of the invention has the advantages of capability of detecting the Trojans in known types and in unknown types, and good detection effect particularly for mutation and variation such as packed and kill-free Trojans.

15 citations

Journal ArticleDOI
TL;DR: This paper introduces a machine learning-based run-time hardware Trojan detection method for microprocessor cores that uses changepoint-based anomaly detection algorithm to detect the activation of Trojans that introduce abnormal patterns in the data streams obtained from performance counters.
Abstract: There has been a growing trend in recent years to outsource various aspects of the semiconductor design and manufacturing flow to different parties spread across the globe. Such outsourcing increases the risk of adversaries adding malicious logic, referred to as hardware Trojans, to the original design. The increased complexity of modern microprocessors increases the difficulty in detecting hardware Trojans at early stages of design and manufacturing. Therefore, there is a need for run-time detection techniques to capture Trojans that escape detection at these stages. In this paper, we introduce a machine learning-based run-time hardware Trojan detection method for microprocessor cores. This approach uses changepoint-based anomaly detection algorithm to detect the activation of Trojans that introduce abnormal patterns in the data streams obtained from performance counters. It does not modify the original microprocessor design to integrate on-chip monitoring sensors. We evaluate our method by detecting the activation of Trojans that cause denial-of-service, the degradation of system performance, and change in functionality of a microprocessor core. Results obtained using the OpenSPARC T1 core and an field-programmable gate array (FPGA) prototyping framework show that the Trojan activation is detected with a true positive rate of above 99% and a false positive rate of 0% for most of the implemented Trojans.

15 citations

Journal ArticleDOI
01 Sep 2009-Icarus
TL;DR: The timescale for resurfacing the entire surface of the Trojan asteroids is similar to that of the flattening of the red spectrum of the new dust by solar-proton irradiation as discussed by the authors.

15 citations

Journal ArticleDOI
TL;DR: TROJAN as mentioned in this paper is a dedicated subsea support vehicle, which results from extensive market research being applied to a base of 15 years in the underwater technology market, and is conceived as a subsea workhorse offering a new dimension to sub-sea support operations.
Abstract: Following success in remotely operated vehicle (ROV) designs such as MMIM, IZE, SOLO, ORVIL, CIRRUS, PIC, and OBSERVER, Slingsby Engineering Limited (SEL) has now developed its technology to build and prove a new ROV, TROJAN. TROJAN is a dedicated subsea support vehicle, which results from extensive market research being applied to a base of 15 years in the underwater technology market. SEL has been at the forefront of the evolution of this market from early manned submersible days, followed by atmospheric diving systems to ROV's. The TROJAN ROV is conceived as a subsea workhorse offering a new dimension to subsea support operations. TROJAN benefits by incorporation of proven technology developed by SEL in recent years on SOLO, PIC, and CIRRUS projects. Using standard components, TROJAN's high reliability and efficient performance offer a versatile and cost-effective work system.

15 citations


Network Information
Related Topics (5)
Cloud computing
156.4K papers, 1.9M citations
70% related
Cache
59.1K papers, 976.6K citations
70% related
Planet
27K papers, 980.6K citations
68% related
Compiler
26.3K papers, 578.5K citations
66% related
Key (cryptography)
60.1K papers, 659.3K citations
66% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023136
2022282
2021111
2020139
2019144
2018168