scispace - formally typeset
Search or ask a question
Topic

Trojan

About: Trojan is a research topic. Over the lifetime, 2028 publications have been published within this topic receiving 33209 citations.


Papers
More filters
Posted Content
TL;DR: A method to verify if a pre-trained model is Trojaned or benign, which captures fingerprints of neural networks in the form of adversarial perturbations learned from the network gradients and an anomaly detection method to identify the target class in a Trojaned network.
Abstract: Deep neural networks are being widely deployed for many critical tasks due to their high classification accuracy. In many cases, pre-trained models are sourced from vendors who may have disrupted the training pipeline to insert Trojan behaviors into the models. These malicious behaviors can be triggered at the adversary's will and hence, cause a serious threat to the widespread deployment of deep models. We propose a method to verify if a pre-trained model is Trojaned or benign. Our method captures fingerprints of neural networks in the form of adversarial perturbations learned from the network gradients. Inserting backdoors into a network alters its decision boundaries which are effectively encoded in their adversarial perturbations. We train a two stream network for Trojan detection from its global ($L_\infty$ and $L_2$ bounded) perturbations and the localized region of high energy within each perturbation. The former encodes decision boundaries of the network and latter encodes the unknown trigger shape. We also propose an anomaly detection method to identify the target class in a Trojaned network. Our methods are invariant to the trigger type, trigger size, training data and network architecture. We evaluate our methods on MNIST, NIST-Round0 and NIST-Round1 datasets, with up to 1,000 pre-trained models making this the largest study to date on Trojaned network detection, and achieve over 92\% detection accuracy to set the new state-of-the-art.

12 citations

Journal ArticleDOI
01 Feb 2009-Icarus
TL;DR: Canup et al. as discussed by the authors explored the fate of objects trapped in the lunar Trojan points, and found that small lunar Trojans can survive the Moon's orbital evolution until they and the Moon reach 38 Earth radii, at which point they are destabilized by a strong solar resonance.

12 citations

Book ChapterDOI
E. Rabe1
01 Jan 1972
TL;DR: In this paper, P/Slaughter-Burnham, the first known comet in temporary 1:1 resonance with Jupiter, sheds some light on the requirements for Trojan captures, and it is suggested that at least some comets of the Jupiter group may have originated among these accumulations around L 4 and L 5.
Abstract: When, in consequence of a close approach, a comet of the Jupiter group changes its osculating semimajor axis from a > 1 to a < 1 (a’ = 1 for Jupiter’s orbit), or vice versa, then the normal case is that of an abrupt change from one side of Jupiter’s orbit to the other one. Under special conditions, however, temporary capture into satellite or ‘Trojan’ status is possible. P/Slaughter-Burnham, the first known comet in temporary 1:1 resonance with Jupiter, sheds some light on the requirements for Trojan captures. In consideration of the recent finding that the Trojan ‘cloud’ around L 4 contains probably as many as 700 Trojans brighter than magnitude 20.9, it is suggested that at least some comets of the Jupiter group may have originated among these accumulations around L 4 and L 5.

12 citations

Proceedings ArticleDOI
05 Jul 2010
TL;DR: A distributed software scheduling prototype, TADS (Trojan Aware Distributed Scheduling), is presented to achieve a Trojan-activation tolerant trustworthy computing system in a multi-core processor potentially containing hardware Trojans.
Abstract: Hardware Trust is an emerging problem in semiconductor integrated circuit (IC) security due to widespread outsourcing and the stealthy nature of hardware Trojans. Conventional post-manufacturing testing, test generation algorithms and test coverage metrics cannot be readily extended to hardware Trojan detection. As a result there is a need to develop approaches that will ensure trusted in-field operation of ICs, and more generally trust in computing. We present a distributed software scheduling prototype, TADS (Trojan Aware Distributed Scheduling), to achieve a Trojan-activation tolerant trustworthy computing system in a multi-core processor potentially containing hardware Trojans. TADS is designed to be transparent to applications and can run on general purpose multicore PEs without modifications to the operating system or underlying hardware. TADS can, with high confidence, continue to correctly execute its specified queue of job subtasks in the presence of hardware Trojans in the multi-core PEs while learning the individual trustworthiness of the individual PEs. Specially crafted self-checking subtasks called bounty hunters are introduced to accelerate PE trust learning. Also, by learning and maintaining individual PE trustworthiness, the scheduler is able to achieve Trojan containment by scheduling subsequent job subtasks to PEs with high learned trust.

12 citations

Journal ArticleDOI
TL;DR: In this paper, the authors compared the frequencies of the motion of the Trojan asteroids in the Restricted Three-Body Problem (RTBP), the Elliptic and the Outer Solar System (OSS) models and concluded that both RTBP and ERTBP are not very accurate models for the long-term dynamics of asteroids.
Abstract: In this note we compare the frequencies of the motion of the Trojan asteroids in the Restricted Three-Body Problem (RTBP), the Elliptic Restricted Three-Body Problem (ERTBP) and the Outer Solar System (OSS) model. The RTBP and ERTBP are well-known academic models for the motion of these asteroids, and the OSS is the standard model used for realistic simulations. Our results are based on a systematic frequency analysis of the motion of these asteroids. The main conclusion is that both the RTBP and ERTBP are not very accurate models for the long-term dynamics, although the level of accuracy strongly depends on the selected asteroid.

12 citations


Network Information
Related Topics (5)
Cloud computing
156.4K papers, 1.9M citations
70% related
Cache
59.1K papers, 976.6K citations
70% related
Planet
27K papers, 980.6K citations
68% related
Compiler
26.3K papers, 578.5K citations
66% related
Key (cryptography)
60.1K papers, 659.3K citations
66% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023136
2022282
2021111
2020139
2019144
2018168