scispace - formally typeset
Search or ask a question
Topic

Trojan

About: Trojan is a research topic. Over the lifetime, 2028 publications have been published within this topic receiving 33209 citations.


Papers
More filters
Patent
20 Nov 2018
TL;DR: In this paper, a hardware Trojan horse real-time detection system and a design method thereof is presented, which consists of Trojan probes, a data transmission controller and a safety monitoring kernel.
Abstract: The invention provides a hardware Trojan horse real-time detection system and a design method thereof. The system comprises Trojan probes, a data transmission controller and a safety monitoring kernel. The Trojan probes acquire voltage bypass signals on power supply constraint lines inside an integrated circuit chip, and transmit the voltage bypass signals to the safety monitoring kernel for Trojan detection through the data transmission controller. The method comprises the following steps: the Trojan probes are implanted on the integrated circuit chip at the initial design stage to establishthe data transmission controller; a principal component analysis method is used to optimize the number of the Trojan probes and the optimal coordinates of the Trojan probes are obtained; a third-partyIP core is designed and integrated on the integrated circuit chip layout with the Trojan probe optimal coordinates; a security monitoring kernel is established to monitor the working state of IP corein real time; the abnormal behavior is identified by a support vector machine classification algorithm and the IP core with the Trojan is detected. The invention can detect and locate the IP core containing the Trojan in real time, and can find the Trojan behavior triggered under the low probability condition.

6 citations

Dissertation
01 Jan 2005
TL;DR: Willett et al. as mentioned in this paper examined the interpretation of a classical text in performance by examining the practical elements (directorial and design choices: set, costumes, lighting, music, etc.) and promotional materials (programmes, press releases, photographs, etc.).
Abstract: Euripides' Trojan Women: A 20th Century War Play in Performance Avery T. Willis, Balliol College Faculty of Classics, Sub-Faculty of Classical Languages and Literature Submitted for Degree of Doctor of Philosophy, Trinity Term 2005 Supervisor: Professor Oliver Taplin, Magdalen College In this dissertation, I approach the interpretation of a classical text in performance by examining the practical elements (directorial and design choices: set, costumes, lighting, music, etc.) and promotional materials (programmes, press releases, photographs, etc.) for a selection of significant test cases in order to determine how these production decisions engage with external factors of political, intellectual, and cultural import. Trojan Women is a particularly useful case study to explore within the parameters of this method because the dynamism and immediacy of the play is most powerfully articulated when production choices allow for it to be wielded as a weapon of protest or reaction against contemporary policy, especially the waging of war. Using a chronological approach, this analysis of Trojan Women as a text for performance provides a broad and in-depth discussion of the reception of the play in the twentieth century, the period in which the ancient text was most frequently performed. Through the investigation of several influential productions on the international stage, and through an examination of the roles of key players (particularly Gilbert Murray and Jean-Paul Sartre), Trojan Women emerges as a play that offers theatre artists a unique and effective forum for debating issues of human responsibility in times of war a central theme in the play and a considerable preoccupation during a century of armed conflict. Chapter One discusses how the play was used to criticize imperial activity and promote ideological causes in the first half of the century. Chapters Two and Three draw attention to a major cluster of performances reflecting the spirit of international war protest in the 1960s and 1970s. Chapter Four addresses productions of the play affected by delayed responses to the Holocaust. Chapter Five features performances in the 1990s that respond to crises of civil conflict and genocide.

6 citations

Journal ArticleDOI
TL;DR: The first full military history of the Trojan War was published by as discussed by the authors, which is a striking claim for a topic that was long thought to belong to a “fabulous age of Greece...
Abstract: According to the publisher's announcement, this book is the first full military history of the Trojan War, a striking claim for a topic that was long thought to belong to a “fabulous age of Greece ...

6 citations

01 Jan 2005
TL;DR: In this article, the interpretation of a classical text in performance is examined by examining the practical elements (directorial and design choices: set, costumes, lighting, music, etc.) and promotional materials (programmes, press releases, photographs, etc.).
Abstract: In this dissertation, I approach the interpretation of a classical text in performance by examining the practical elements (directorial and design choices: set, costumes, lighting, music, etc.) and promotional materials (programmes, press releases, photographs, etc.) for a selection of significant test cases in order to determine how these production decisions engage with external factors of political, intellectual, and cultural import. Trojan Women is a particularly useful case study to explore within the parameters of this method because the dynamism and immediacy of the play is most powerfully articulated when production choices allow for it to be wielded as a weapon of protest or reaction against contemporary policy, especially the waging of war. Using a chronological approach, this analysis of Trojan Women as a text for performance provides a broad and in-depth discussion of the reception of the play in the twentieth century, the period in which the ancient text was most frequently performed. Through the investigation of several influential productions on the international stage, and through an examination of the roles of key players (particularly Gilbert Murray and Jean-Paul Sartre), Trojan Women emerges as a play that offers theatre artists a unique and effective forum for debating issues of human responsibility in times of war a central theme in the play and a considerable preoccupation during a century of armed conflict. Chapter One discusses how the play was used to criticize imperial activity and promote ideological causes in the first half of the century. Chapters Two and Three draw attention to a major cluster of performances reflecting the spirit of international war protest in the 1960s and 1970s. Chapter Four addresses productions of the play affected by delayed responses to the Holocaust. Chapter Five features performances in the 1990s that respond to crises of civil conflict and genocide.

6 citations

Proceedings ArticleDOI
23 May 2021
TL;DR: Bomberman as discussed by the authors is a dynamic verification tool for detecting Ticking Timebomb Trojans (TTTs) in hardware, which is based on the functional behavior of the TTTs.
Abstract: To cope with ever-increasing design complexities, integrated circuit designers increase both the size of their design teams and their reliance on third-party intellectual property (IP). Both come at the expense of trust: it is computationally infeasible to exhaustively verify that a design is free of all possible malicious modifications (i.e., hardware Trojans). Making matters worse, unlike software, hardware modifications are permanent: there is no "patching" mechanism for hardware; and powerful: they serve as a foothold for subverting software that sits above.To counter this threat, prior work uses both static and dynamic analysis techniques to verify hardware designs are Trojan-free. Unfortunately, researchers continue to reveal weaknesses in these "one-size-fits-all", heuristic-based approaches. Instead of attempting to detect all possible hardware Trojans, we take the first step in addressing the hardware Trojan threat in a divide-and-conquer fashion: defining and eliminating Ticking Timebomb Trojans (TTTs), forcing attackers to implement larger Trojan designs detectable via existing verification and side-channel defenses. Like many system-level software defenses (e.g., Address Space Layout Randomization (ASLR) and Data Execution Prevention (DEP)), our goal is to systematically constrict the hardware attacker’s design space.First, we construct a definition of TTTs derived from their functional behavior. Next, we translate this definition into fundamental components required to realize TTT behavior in hardware. Using these components, we expand the set of all known TTTs to a total of six variants—including unseen variants. Leveraging our definition, we design and implement a TTT-specific dynamic verification toolchain extension, called Bomber-man. Using four real-world hardware designs, we demonstrate Bomberman’s ability to detect all TTT variants, where previous defenses fail, with <1.2% false positives.

6 citations


Network Information
Related Topics (5)
Cloud computing
156.4K papers, 1.9M citations
70% related
Cache
59.1K papers, 976.6K citations
70% related
Planet
27K papers, 980.6K citations
68% related
Compiler
26.3K papers, 578.5K citations
66% related
Key (cryptography)
60.1K papers, 659.3K citations
66% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023136
2022282
2021111
2020139
2019144
2018168