scispace - formally typeset
Search or ask a question
Topic

Trojan

About: Trojan is a research topic. Over the lifetime, 2028 publications have been published within this topic receiving 33209 citations.


Papers
More filters
Patent
26 Jun 2013
TL;DR: In this article, an intelligent Trojan horse detecting device based on Trojan horse behavior features reflected in network flows and a method thereof was proposed. The device and the method thereof play an active role in detecting Trojan horses and are high in detecting efficiency and low in mistaken report rate and miss report rate.
Abstract: The invention relates to an intelligent Trojan horse detecting device based on Trojan horse behavior features reflected in network flows and a method thereof. The device and the method thereof play an active role in detecting Trojan horses and are high in detecting efficiency and low in mistaken report rate and miss report rate. The method includes the steps of firstly, collecting TCP (transmission control protocol), UDP (user datagram protocol) data packets; secondly, pretreating collected data packets; thirdly, filtering data packets according to a neural network to identify abnormal data packets; fourthly, identifying data packets with Trojan horse behaviors from the abnormal data packets; and fifthly alarming when data packets with Trojan horse behaviors are found.

14 citations

Journal ArticleDOI
TL;DR: In this paper, an independent re-analysis of the Kepler light curve of Kepler-91 (KIC 8219268) was performed using the EXONEST software package, which provides both Bayesian parameter estimation and Bayesian model testing.
Abstract: Presented here is an independent re-analysis of the Kepler light curve of Kepler-91 (KIC 8219268). Using the EXONEST software package, which provides both Bayesian parameter estimation and Bayesian model testing, we were able to re-confirm the planetary nature of Kepler-91b. In addition to the primary and secondary eclipses of Kepler-91b, a third dimming event appears to occur approximately $60^o$ away (in phase) from the secondary eclipse, leading to the hypothesis that a Trojan planet may be located at the L4 or L5 Lagrange points. Here, we present a comprehensive investigation of four possibilities to explain the observed dimming event using all available photometric data from the Kepler Space Telescope, recently obtained radial velocity measurements, and N-body simulations. We find that the photometric model describing Kepler-91b and a Trojan planet is highly favored over the model involving Kepler-91b alone. However, it predicts an unphysically high temperature for the Trojan companion, leading to the conclusion that the extra dimming event is likely a false-postive.

14 citations

Journal ArticleDOI
TL;DR: In this paper, a comparative analysis of the orbital evolution of these transient co-orbitals is performed to understand better how they got captured in the first place and what makes them dynamically unstable.
Abstract: Uranus has three known co-orbitals: 83982 Crantor (2002 GO9), 2010 EU65 and 2011 QF99. Here, we perform a comparative analysis of the orbital evolution of these transient co-orbitals to understand better how they got captured in the first place and what makes them dynamically unstable. We also look for additional temporary Uranian co-orbital candidates among known objects. Our N-body simulations show that the long-term stability of 2011 QF99 is controlled by Jupiter and Neptune; it briefly enters the 1:7 mean motion resonance with Jupiter and the 2:1 with Neptune before becoming a Trojan and prior to leaving its tadpole orbit. During these ephemeral two-body mean motion resonance episodes, apsidal corotation resonances are also observed. For known co-orbitals, Saturn is the current source of the main destabilizing force but this is not enough to eject a minor body from the 1:1 commensurability with Uranus. These objects must enter mean motion resonances with Jupiter and Neptune in order to be captured or become passing Centaurs. Asteroid 2010 EU65, a probable visitor from the Oort cloud, may have been stable for several Myr due to its comparatively low eccentricity. In addition, we show that the orbital properties and discovery circumstances of known objects can be used to outline a practical strategy by which additional Uranus' co-orbitals may be found.

14 citations

Proceedings ArticleDOI
17 Jan 2020
TL;DR: The proposed solution, unlike the prior art, does not require a Golden IC and trains a Neural Network to act as a process tracking watchdog for correlating the static timing data to the delay information obtained from clock frequency sweeping for Hardware Trojan detection.
Abstract: In this paper, we introduce a Learning Assisted Side Channel delay Analysis (LASCA) methodology for Hardware Trojan detection. Our proposed solution, unlike the prior art, does not require a Golden IC. Instead, it trains a Neural Network to act as a process tracking watchdog for correlating the static timing data (produced at design time) to the delay information obtained from clock frequency sweeping (at test time) for the purpose of Trojan detection. Using the LASCA flow, we detect close to 90% of Hardware Trojans in the simulated scenarios.

14 citations

Journal ArticleDOI
TL;DR: Zhang et al. as mentioned in this paper proposed an efficient test generation technique to facilitate side-channel analysis utilizing dynamic current, which can quickly find the profitable ordered pairs of test vectors that can maximize sidechannel sensitivity.
Abstract: Detection of hardware Trojans is vital to ensure the security and trustworthiness of System-on-Chip (SoC) designs. Side-channel analysis is effective for Trojan detection by analyzing various side-channel signatures such as power, current, and delay. In this article, we propose an efficient test generation technique to facilitate side-channel analysis utilizing dynamic current. While early work on current-aware test generation has proposed several promising ideas, there are two major challenges in applying it on large designs: (i) The test generation time grows exponentially with the design complexity, and (ii) it is infeasible to detect Trojans, since the side-channel sensitivity is marginal compared to the noise and process variations. Our proposed work addresses both challenges by effectively exploiting the affinity between the inputs and rare (suspicious) nodes. The basic idea is to quickly find the profitable ordered pairs of test vectors that can maximize side-channel sensitivity. This article makes two important contributions: (i) It proposed an efficient test generation algorithm that can produce the first patterns in the test vectors to maximize activation of suspicious nodes using an SMT solver, and (ii) it developed a genetic-algorithm based test generation technique to produce the second patterns in the test vectors to maximize the switching in the suspicious regions while minimizing the switching in the rest of the design. Our experimental results demonstrate that we can drastically improve both the side-channel sensitivity (62× on average) and time complexity (13× on average) compared to the state-of-the-art test generation techniques.

14 citations


Network Information
Related Topics (5)
Cloud computing
156.4K papers, 1.9M citations
70% related
Cache
59.1K papers, 976.6K citations
70% related
Planet
27K papers, 980.6K citations
68% related
Compiler
26.3K papers, 578.5K citations
66% related
Key (cryptography)
60.1K papers, 659.3K citations
66% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023136
2022282
2021111
2020139
2019144
2018168