scispace - formally typeset
Search or ask a question
Topic

Trojan

About: Trojan is a research topic. Over the lifetime, 2028 publications have been published within this topic receiving 33209 citations.


Papers
More filters
Proceedings ArticleDOI
03 May 2016
TL;DR: A physical prototype of a Memory Hardware Trojan that only requires 230 slices, performs physical page address redirection, operates in standard systems, and can be leveraged by an unprivileged software process to bypass memory protection is presented.
Abstract: The trustworthiness of electronic components procured and deployed in critical infrastructure can not be guaranteed. These components may contain Hardware Trojans. Understanding the threat characteristics of these Hardware Trojans is critical to the development of future security risk mitigations. One key threat is posed by Hardware Trojans located in System Memory chips, such as those found in DIMM memory. We present a physical prototype of a Memory Hardware Trojan that only requires 230 slices, performs physical page address redirection, operates in standard systems, and can be leveraged by an unprivileged software process to bypass memory protection. We demonstrate the effectiveness of our trojan with privilege escalation and virtual machine breakout use cases. Based on our designs and experimental findings, we identify insights and discuss mitigation strategies.

6 citations

Journal ArticleDOI
TL;DR: The case for a fourth actor can be made much stronger if we take into consideration the location of the Thracian, Trojan, and Greek camps as presented in the play as mentioned in this paper.
Abstract: Many scholars argue that only three actors were needed in this problematic scene. I believe four are required. The case for a fourth actor can be made much stronger if we take into consideration the location of the Thracian, Trojan, and Greek camps as presented in the play. This argument has been overlooked in previous discussions of the passage.

6 citations

Proceedings ArticleDOI
01 Aug 2017
TL;DR: This paper provides a proof-of-concept demonstration of the potential benefit of using logical implications for detection of combinational hardware trojans using logic simulation.
Abstract: This paper provides a proof-of-concept demonstration of the potential benefit of using logical implications for detection of combinational hardware trojans. Using logic simulation, valid logic implications are selected and added to to the checker circuitry to detect payload delivery by a combinational hardware trojan. Using combinational circuits from the ISCAS benchmark suite, and a modest hardware budget for the checker, simulation results show that the probability of a trojan escaping detection using our approach was only 16%.

6 citations

Journal ArticleDOI
TL;DR: The Jovian Trojans are two swarms of small objects that share Jupiter's orbit, clustered around the leading and trailing Lagrange points, L4 and L5 as mentioned in this paper.
Abstract: The Jovian Trojans are two swarms of small objects that share Jupiter's orbit, clustered around the leading and trailing Lagrange points, L4 and L5. In this work, we investigate the Jovian Trojan population using the technique of astrocladistics, an adaptation of the 'tree of life' approach used in biology. We combine colour data from WISE, SDSS, Gaia DR2, and MOVIS surveys with knowledge of the physical and orbital characteristics of the Trojans, to generate a classification tree composed of clans with distinctive characteristics. We identify 48 clans, indicating groups of objects that possibly share a common origin. Amongst these are several that contain members of the known collisional families, though our work identifies subtleties in that classification that bear future investigation. Our clans are often broken into subclans, and most can be grouped into 10 superclans, reflecting the hierarchical nature of the population. Outcomes from this project include the identification of several high priority objects for additional observations and as well as providing context for the objects to be visited by the forthcoming Lucy mission. Our results demonstrate the ability of astrocladistics to classify multiple large and heterogeneous composite survey data sets into groupings useful for studies of the origins and evolution of our Solar system.

6 citations

Journal ArticleDOI
TL;DR: In this article, the authors investigate whether the Trojans swarms are observationally biased and place a completion limit on their absolute magnitude, which is known to be H = 11.5mag.
Abstract: Aims. I investigate whether the Trojan swarms are observationally biased and place a completion limit on their absolute magnitude. Methods. Observations including Trojans from a number of observation sites are cross-checked with orbital integration of known Trojans and a set of fictitious Trojan orbits. Results. The completion limit for the Trojans swarms can be set to be H = 11.5mag.TheL 5 swarm is 71% of the L4 size down to this limit. It is not likely that any existing set of orbital elements can have escaped detections. However, parts of the orbital element space, especially in the inclination, are biased for Trojans fainter than the completion limit. In the absolute magnitude interval 11.5−13mag, 65% of new objects should have inclinations 15−40 ◦ , while this inclination interval currently contains 49% of Trojans in the complete interval 9.5−11.5mag. Trojans fainter than an absolute magnitude of 13mag are also clearly biased in the ascending node at values coinciding with the Milky Way.

6 citations


Network Information
Related Topics (5)
Cloud computing
156.4K papers, 1.9M citations
70% related
Cache
59.1K papers, 976.6K citations
70% related
Planet
27K papers, 980.6K citations
68% related
Compiler
26.3K papers, 578.5K citations
66% related
Key (cryptography)
60.1K papers, 659.3K citations
66% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023136
2022282
2021111
2020139
2019144
2018168