scispace - formally typeset
Search or ask a question
Topic

Trojan

About: Trojan is a research topic. Over the lifetime, 2028 publications have been published within this topic receiving 33209 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: In this paper, the authors analyzed the trajectories of 17 Neptune Trojans and showed that the vast majority of them may survive in the solar system age, except for two temporary members with relatively short lifespans on Trojan orbits.

5 citations

Proceedings Article
18 May 2021
TL;DR: Deep Feature Space Trojan Attack as discussed by the authors proposes a novel deep feature space trojan attack with five characteristics: effectiveness, stealthiness, controllability, robustness and reliance on deep features.
Abstract: Trojan (backdoor) attack is a form of adversarial attack on deep neural networks where the attacker provides victims with a model trained/retrained on malicious data. The backdoor can be activated when a normal input is stamped with a certain pattern called trigger, causing misclassification. Many existing trojan attacks have their triggers being input space patches/objects (e.g., a polygon with solid color) or simple input transformations such as Instagram filters. These simple triggers are susceptible to recent backdoor detection algorithms. We propose a novel deep feature space trojan attack with five characteristics: effectiveness, stealthiness, controllability, robustness and reliance on deep features. We conduct extensive experiments on 9 image classifiers on various datasets including ImageNet to demonstrate these properties and show that our attack can evade state-of-the-art defense.

5 citations

30 Apr 2015
TL;DR: In this paper, the authors argue that IT, still now, has not really entered classrooms because its use constitutes a work overload for teachers and it requires several breaks that teachers must manage: breaks in time, in space and in pedagogy.
Abstract: IT, still now, has not really entered classrooms because its use constitutes a work overload for teachers. It requires several breaks that teachers must manage: breaks in time, in space and in pedagogy. Digital tablets avoid all those breaks; this is why they should be soon omnipresent in classrooms. Therefore, we have to try, right now, to see how this will change the educational landscape and how the roles of students and teachers should evolve.

5 citations

Proceedings ArticleDOI
Yongchang Ren1, Tao Xing, Guanghui Cao, E Xu, Xiaoji Chen 
30 May 2010
TL;DR: The current commonly used Trojan horse hiding technology, the traditional implementation method Trojan hidden lack of independence, according to concerted hidden thought, given the four threading model under Windows systems and their specific implementation method to explain the problems encountered in the implementation process and solution approach.
Abstract: Trojan is a Trojan horse hiding technology, one of the key technologies, directly determine the viability of Trojan horses This paper describes the current commonly used Trojan horse hiding technology, the traditional implementation method Trojan hidden lack of independence, according to concerted hidden thought, given the four threading model under Windows systems and their specific implementation method to explain the problems encountered in the implementation process and solution approach In response to the four further threading model is just to restore the initial state of the shortcomings of the passive given extension model Experiments show that the four threads together more independent thought hidden Trojan horse has a better prospect

5 citations

Proceedings ArticleDOI
12 May 2019
TL;DR: Experimental results to insert hardware Trojans into asynchronous circuits are shown and several Trojan detection methods using deep learning schemes which have been proposed to detect synchronous hardware Trojan in the netlist level are applied.
Abstract: Hardware Trojan threats caused by malicious designers and untrusted manufacturers have become one of serious issues in modern VLSI systems. In this paper, we show some experimental results to insert hardware Trojans into asynchronous circuits. As a result, the overhead of hardware Trojan insertion in asynchronous circuits may be small for malicious designers who have enough knowledge about the asynchronous circuits. In addition, we also show several Trojan detection methods using deep learning schemes which have been proposed to detect synchronous hardware Trojan in the netlist level. We apply them to asynchronous hardware Trojan circuits and show their results. They have a great potential to detect a hardware Trojan in asynchronous circuits.

5 citations


Network Information
Related Topics (5)
Cloud computing
156.4K papers, 1.9M citations
70% related
Cache
59.1K papers, 976.6K citations
70% related
Planet
27K papers, 980.6K citations
68% related
Compiler
26.3K papers, 578.5K citations
66% related
Key (cryptography)
60.1K papers, 659.3K citations
66% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023136
2022282
2021111
2020139
2019144
2018168