Topic
Trojan
About: Trojan is a research topic. Over the lifetime, 2028 publications have been published within this topic receiving 33209 citations.
Papers published on a yearly basis
Papers
More filters
••
11 citations
•
28 Oct 2009
TL;DR: In this article, a method for detecting network theft Trojan is presented, which comprises the following steps that: first, a network data stream is obtained; secondly, through the analysis of a communication address, a communication protocol, communication action and communication relation, the connection between a highly-suspected Trojan communication data packet and a corresponding destination IP address is established according to a network communication protocol adopted by the highly-suspended Trojan communication; a detection data packet is constructed according to the corresponding communication protocol and sent to the opposite party; and if a response packet returned by the party
Abstract: The invention discloses a method for detecting network theft Trojan, which comprises the following steps that: firstly, a network data stream is obtained; secondly, through the analysis of a communication address, a communication protocol, communication action and communication relation, the connection between a highly-suspected Trojan communication data packet and a corresponding destination IP address is established according to a network communication protocol adopted by the highly-suspended Trojan communication; a detection data packet is constructed according to the corresponding communication protocol and sent to the opposite party; and if a response packet returned by the party contains contents not stipulated by the protocol, namely the node is determined as the Trojan control end. As the analysis of the network data stream is adopted, the method detects the network theft Trojan and can detect and find the theft action based on Trojan from mass network data according to the network communication and behavioral characteristics and effectively restrains the actions of network theft and breach.
11 citations
••
24 Jun 2014TL;DR: Circuit-level Homotopy methods are used to find all operating points and detect Trojan states, and the temperature characteristic of the positive feedback loop circuits can also identify the Trojan state.
Abstract: The circuit structures with positive feedback loops are likely to have multiple operating points, and the unwanted Trojan state is easy to be triggered by process, voltage, and temperature variation or user's action. In this paper, circuit-level Homotopy methods are used to find all operating points and detect Trojan states. Furthermore, the temperature characteristic of the positive feedback loop circuits can also identify the Trojan state. Examples are given to show both Homotopy and temperature methods are valid.
11 citations
••
TL;DR: In this article, the use of new observational methods for exploring solar system evolutionary processes is evaluated, focusing on illustrative cases from the constraining of near-earth asteroid sources and the discovery of main-belt asteroid fragments which indicate Vesta to be a source of basaltic achondrite meteorites.
11 citations
••
03 Nov 2014TL;DR: This work investigates general power-based TSC designs and discusses the tradeoff between their hardware cost and the complexity of the key cracking process, and presents a new hardware Trojan detection technique based on the correlation between the key and the covert physical side channels used by attackers.
Abstract: Trojan side channels (TSCs) are serious threats to the security of cryptographic systems because they facilitate to leak secret keys to attackers via covert side channels that are unknown to designers. To tackle this problem, we present a new hardware Trojan detection technique for TSCs. To be specific, we first investigate general power-based TSC designs and discuss the tradeoff between their hardware cost and the complexity of the key cracking process. Next, we present our TSC identification technique based on the correlation between the key and the covert physical side channels used by attackers. Experimental results demonstrate the effectiveness of the proposed solution.
11 citations