scispace - formally typeset
Search or ask a question
Topic

Trojan

About: Trojan is a research topic. Over the lifetime, 2028 publications have been published within this topic receiving 33209 citations.


Papers
More filters
Patent
02 Jun 2010
TL;DR: In this paper, an on-screen keyboard input system for preventing Trojan programs and a method thereof, which aims to solve the problem of keystroke logging easily by the Trojan programs wheninputting confidential and private data.
Abstract: The invention discloses an on-screen keyboard input system for preventing Trojan programs and a method thereof, which aims to solve the problem of keystroke logging easily by the Trojan programs wheninputting confidential and private data. By allocating with random numbers and performing the process of hide display via keys of the on-screen keyboard, the method is used to prevent Trojan programswith functions of logging keystrokes and image acquisition.

8 citations

Journal ArticleDOI
TL;DR: In this paper, numerical integrations have been performed for orbits of Venus', Earth's and Mars' Trojan-asteroid test particles in a self consistent model of the solar system to study the stability of inclined Trojan orbits.
Abstract: Numerical integrations have been performed for orbits of Venus', Earth's and Mars' Trojan-asteroid test particles in a self consistent model of the solar system to study the stability of inclined Trojan orbits. In the case of Mars low inclination orbits tend to be unstable while the contrary seems to apply to Venus and Earth, although the stability of some very high inclination orbits may not be excluded on the basis of these computations.

8 citations

Book ChapterDOI
01 Jan 1983
TL;DR: In this paper, the long periods caused by Jupiter or Jupiter and Saturn in the motion of a Trojan are studied by numerical integration, and results on the length of the periods and on their main effects in the osculating elements are presented.
Abstract: The long periods caused by Jupiter, or Jupiter and Saturn in the motion of a Trojan are studied by numerical integration. Orbital inclinations between 0° and 50° are considered. Results on the length of the periods and on their main effects in the osculating elements are presented. It turns out that secular resonances can be important for the evolution of Trojan orbits.

8 citations

Journal ArticleDOI
01 Jan 2020-Icarus
TL;DR: In this article, the authors explore the hypothesis that the population of Martian Trojans is the result of a balance between the production of new asteroids through the YORP effect and their eventual escape from the Trojan clouds through Yarkovsky-driven orbital evolution.

8 citations

Proceedings ArticleDOI
16 Nov 2014
TL;DR: A high-resolution Trojan detection method for digital logic based on pulse propagation is developed that exhibits 25X -- 30X higher diagnostic resolution as compared to current path delay based Trojan detection techniques in the presence of significant manufacturing process variations.
Abstract: Insertion of malicious Trojans into outsourced chip manufacturing generally results in increased capacitances of internal circuit nodes that have been tapped for node controllability and observability by malicious circuitry. Current path delay measurement and side channel Trojan detection techniques are unable to detect Trojans that present low loading to such tapped circuit nodes, especially in the presence of large manufacturing process variations. In this paper, a high-resolution Trojan detection method for digital logic based on pulse propagation is developed. The method exhibits 25X--30X higher diagnostic resolution (ability to measure small capacitive loads on internal circuit nodes) as compared to current path delay based Trojan detection techniques in the presence of significant manufacturing process variations. Further, a key benefit is that theoretically, as opposed to path delay measurement based methods, the diagnostic resolution of the test approach is independent of circuit logic depth over and above the benefits already mentioned above. Test methods and test infrastructure compatible with existing scan based techniques are described. Simulation results are presented to prove the viability and effectiveness of the proposed Trojan detection scheme and especially for circuits with large logic depths (35-70 gates) suffering from worst case process variation effects.

8 citations


Network Information
Related Topics (5)
Cloud computing
156.4K papers, 1.9M citations
70% related
Cache
59.1K papers, 976.6K citations
70% related
Planet
27K papers, 980.6K citations
68% related
Compiler
26.3K papers, 578.5K citations
66% related
Key (cryptography)
60.1K papers, 659.3K citations
66% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023136
2022282
2021111
2020139
2019144
2018168