scispace - formally typeset
Search or ask a question
Topic

Trojan

About: Trojan is a research topic. Over the lifetime, 2028 publications have been published within this topic receiving 33209 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: In this article, the authors presented updated/new thermal model fits for 478 Jovian Trojan asteroids observed with the Wide-Field Infrared Survey Explorer (WISE) and derived albedos of a significant fraction of these objects in these bands.
Abstract: We present updated/new thermal model fits for 478 Jovian Trojan asteroids observed with the Wide-field Infrared Survey Explorer (WISE). Using the fact that the two shortest bands used by WISE, centered on 3.4 and $4.6\mu$m, are dominated by reflected light, we derive albedos of a significant fraction of these objects in these bands. While the visible albedos of both the C-, P- and D-type asteroids are strikingly similar, the WISE data reveal that the albedo at $3.4\mu$m is different between C-/P- and D-types. The albedo at 3.4$\mu$m can be thus be used to classify the objects, with C-/P-types having values less than 10%, and D-types have values larger than 10%. Classifying all objects larger than 50km shows that the D-type objects dominate both the leading cloud ($L_4$), with a fraction of 84%, and trailing cloud ($L_5$), with a fraction of 71-80%. The two clouds thus have very similar taxonomic distribution for these large objects, but the leading cloud has a larger number of of these large objects, $L_4/L_5 = 1.34$. The taxonomic distribution of the Jovian Trojans are found to be different than that of the large Hildas, which is dominated by C- and P-type objects. At smaller sizes, the fraction of D-type Hildas starts increasing, showing more similarities with the Jovian Trojans. If this similarity is confirmed through deeper surveys, it could hold important clues to the formation and evolution of the two populations. The Jovian Trojans does have similar taxonomic distribution to that of the Jovian irregular satellites, but lacks the ultra red surfaces found among the Saturnian irregular satellites and Centaur population.

8 citations

Book ChapterDOI
01 Jan 2018
TL;DR: This book chapter explains how attackers can insert Trojans into FPGAs, and presents a Trojan taxonomy that is tailored to FPGA supply chain.
Abstract: Field-programmable gate arrays (FPGAs) are integrated circuits (ICs) containing programmable logic components that can be reconfigured by an end-user post manufacturing. Similar to ICs, FPGAs are also susceptible to supply-chain attacks, especially insertion of hardware Trojans. In this book chapter, we explain how attackers can insert Trojans into FPGAs. We present a Trojan taxonomy that is tailored to FPGA supply chain. We then discuss the main classes of Trojans in FPGAs and explain the different ways of inserting these Trojans in detail. Finally, we present the various countermeasures that have been developed to target Trojans that are FPGA specific.

8 citations

Proceedings ArticleDOI
27 May 2018
TL;DR: A transparent side channel trigger mechanism triggering Power/Area/Architecture and Signature Transparent (PAAST) analog hardware Trojans is discussed in this paper.
Abstract: A transparent side channel trigger mechanism triggering Power/Area/Architecture and Signature Transparent (PAAST) analog hardware Trojans is discussed in this paper. By applying this trigger mechanism through normal supply bus, the circuit can be triggered to the Trojan state. Same as the stealth nature of PAAST Trojans, it doesn't require any additional area, any additional power, any structure modifications and it doesn't leave any signatures in either power domains or signal paths. This trigger mechanism can be applied on circuits with static Trojans or circuits with dynamic Trojans.

8 citations

01 Jan 2005

8 citations


Network Information
Related Topics (5)
Cloud computing
156.4K papers, 1.9M citations
70% related
Cache
59.1K papers, 976.6K citations
70% related
Planet
27K papers, 980.6K citations
68% related
Compiler
26.3K papers, 578.5K citations
66% related
Key (cryptography)
60.1K papers, 659.3K citations
66% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023136
2022282
2021111
2020139
2019144
2018168