scispace - formally typeset
Search or ask a question
Topic

Trojan

About: Trojan is a research topic. Over the lifetime, 2028 publications have been published within this topic receiving 33209 citations.


Papers
More filters
Patent
28 Oct 2009
TL;DR: In this article, a method for detecting network theft Trojan is presented, which comprises the following steps that: first, a network data stream is obtained; secondly, through the analysis of a communication address, a communication protocol, communication action and communication relation, the connection between a highly-suspected Trojan communication data packet and a corresponding destination IP address is established according to a network communication protocol adopted by the highly-suspended Trojan communication; a detection data packet is constructed according to the corresponding communication protocol and sent to the opposite party; and if a response packet returned by the party
Abstract: The invention discloses a method for detecting network theft Trojan, which comprises the following steps that: firstly, a network data stream is obtained; secondly, through the analysis of a communication address, a communication protocol, communication action and communication relation, the connection between a highly-suspected Trojan communication data packet and a corresponding destination IP address is established according to a network communication protocol adopted by the highly-suspended Trojan communication; a detection data packet is constructed according to the corresponding communication protocol and sent to the opposite party; and if a response packet returned by the party contains contents not stipulated by the protocol, namely the node is determined as the Trojan control end. As the analysis of the network data stream is adopted, the method detects the network theft Trojan and can detect and find the theft action based on Trojan from mass network data according to the network communication and behavioral characteristics and effectively restrains the actions of network theft and breach.

11 citations

Proceedings ArticleDOI
24 Jun 2014
TL;DR: Circuit-level Homotopy methods are used to find all operating points and detect Trojan states, and the temperature characteristic of the positive feedback loop circuits can also identify the Trojan state.
Abstract: The circuit structures with positive feedback loops are likely to have multiple operating points, and the unwanted Trojan state is easy to be triggered by process, voltage, and temperature variation or user's action. In this paper, circuit-level Homotopy methods are used to find all operating points and detect Trojan states. Furthermore, the temperature characteristic of the positive feedback loop circuits can also identify the Trojan state. Examples are given to show both Homotopy and temperature methods are valid.

11 citations

Journal ArticleDOI
01 Dec 1992-Icarus
TL;DR: In this article, the use of new observational methods for exploring solar system evolutionary processes is evaluated, focusing on illustrative cases from the constraining of near-earth asteroid sources and the discovery of main-belt asteroid fragments which indicate Vesta to be a source of basaltic achondrite meteorites.

11 citations

Proceedings ArticleDOI
03 Nov 2014
TL;DR: This work investigates general power-based TSC designs and discusses the tradeoff between their hardware cost and the complexity of the key cracking process, and presents a new hardware Trojan detection technique based on the correlation between the key and the covert physical side channels used by attackers.
Abstract: Trojan side channels (TSCs) are serious threats to the security of cryptographic systems because they facilitate to leak secret keys to attackers via covert side channels that are unknown to designers. To tackle this problem, we present a new hardware Trojan detection technique for TSCs. To be specific, we first investigate general power-based TSC designs and discuss the tradeoff between their hardware cost and the complexity of the key cracking process. Next, we present our TSC identification technique based on the correlation between the key and the covert physical side channels used by attackers. Experimental results demonstrate the effectiveness of the proposed solution.

11 citations


Network Information
Related Topics (5)
Cloud computing
156.4K papers, 1.9M citations
70% related
Cache
59.1K papers, 976.6K citations
70% related
Planet
27K papers, 980.6K citations
68% related
Compiler
26.3K papers, 578.5K citations
66% related
Key (cryptography)
60.1K papers, 659.3K citations
66% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023136
2022282
2021111
2020139
2019144
2018168