scispace - formally typeset
Search or ask a question
Topic

Trojan

About: Trojan is a research topic. Over the lifetime, 2028 publications have been published within this topic receiving 33209 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: The Trojan horse problem is considered, which is important when a program is received from the outside; and a method of protection against Trojan horses is proposed, which can prevent security violations which cannot be regulated by controlling access and flow.
Abstract: The technology of security in computer networks has far-reaching implications. In this paper, assuming a UNIX network system, which is the most popular currently, we enumerate the threats against security and classify the problems. Among the problems so defined, we consider particularly the Trojan horse problem, which is important when a program is received from the outside; and we propose a method of protection against Trojan horses. In the proposed protection method, objects which have been modified by the source program are extracted and are compared with a previously prepared list (the condition list) of objects which should not have been modified. In this method, verification of the security of the program needs to be done only at the time of its installation, so there is no loss in efficiency of performance at run time. Also, we can prevent security violations which cannot be regulated by controlling access and flow. In the proposed method, the major problem is determining the extent to which altered objects can be detected. In this regard, we perform soine experiments on the free software X11R4 and TeX. Finally, based on the results of the experiments, we evaluate the proposed protection method on the security of programs imported from the outside.

7 citations

Posted Content
TL;DR: Bounds to the Nordtvedt parameter are obtained from the motion of the first twelve Trojan asteroids in the period 1906-1990, from the analysis performed, they derive a value for the inverse of the Saturn mass 3497.
Abstract: Bounds to the Nordtvedt parameter are obtained from the motion of the first twelve Trojan asteroids in the period 1906-1990. From the analysis performed, we derive a value for the inverse of the Saturn mass 3497.80 \pm 0.81 and the Nordtvedt parameter -0.56 \pm 0.48, from a simultaneous solution for all asteroids.

7 citations

Proceedings ArticleDOI
01 Jan 2017
TL;DR: A hardware Trojan circuit detection method is proposed based on a pair of non-transition lines and unset values generated as the results of acceptance verification, which is likely to reduce the reliability of VLSIs.
Abstract: Recently, the increased utilization of outsourcing services for a part of designing VLSIs might reduce the reliability of VLSIs. There is a risk that hardware Trojan circuits are inserted into VLSIs by attackers at design phases. It is difficult to detect Trojan circuits by functional verification and testing. In this paper, we propose a hardware Trojan circuit detection method based on a pair of non-transition lines and unset values generated as the results of acceptance verification.

7 citations

Proceedings ArticleDOI
29 Dec 2011
TL;DR: An improved bus architecture for hardware Trojan protection is presented, which can prevent data from runtime Trojan attacking in the digital circuits and shows that the structure is efficient at thwarting the leaking of confidential information and signals.
Abstract: Hardware Trojan, similar to the computer viruses, is a new threat in modern System-On-Chips (SOCs) such as security chips and trusted computer systems. Despite the risks that such an attack entails, little attention has been given to the methods of run-time Trojan detection. In this paper, the defects in existing security chips are analyzed and an improved bus architecture for hardware Trojan protection is presented, which can prevent data from runtime Trojan attacking in the digital circuits. A novel bus controller and random number generator (RNG) are used to implement the mechanism and the experimental results shows that the structure is efficient at thwarting the leaking of confidential information and signals.

7 citations

Journal Article
TL;DR: In this article, the authors raise the awareness of vulnerabilities in the maritime transportation systems sector and to ask those involved in security and emergency management to answer for themselves, "What are your acceptable risks?" In particular, the review alerts security managers to the Trojan Horse risks that expose maritime organizations, including shippers, mariners, and port employees, to dangers from physical, personnel, and cyber security problems and from natural and man-made disasters, which may appear as Trojan horses.
Abstract: This article sought to raise the awareness of vulnerabilities in the maritime transportation systems sector and to ask those involved in security and emergency management to answer for themselves, “What are your acceptable risks?” In particular, the review alerts security and emergency managers to the Trojan Horse risks that expose maritime organizations, including shippers, mariners, and port employees, to dangers from physical, personnel, and cyber security problems and from natural and man-made disasters, which may appear as Trojan horses. The article first discusses maritime threat actors, motives, tactics, and targets. Next, vulnerabilities of the maritime transportation systems sector that could be exploited by those seeking to conduct a Trojan horse attack are examined. Finally, a variety of security measures used to protect the maritime transportation systems sector from Trojan horse attacks are described. Advice to those in security and emergency management for maritime organizations on how to recognize, plan, and mitigate Trojan horse issues is provided.

7 citations


Network Information
Related Topics (5)
Cloud computing
156.4K papers, 1.9M citations
70% related
Cache
59.1K papers, 976.6K citations
70% related
Planet
27K papers, 980.6K citations
68% related
Compiler
26.3K papers, 578.5K citations
66% related
Key (cryptography)
60.1K papers, 659.3K citations
66% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023136
2022282
2021111
2020139
2019144
2018168