Topic
Trojan
About: Trojan is a research topic. Over the lifetime, 2028 publications have been published within this topic receiving 33209 citations.
Papers published on a yearly basis
Papers
More filters
••
18 Mar 2013TL;DR: The results reveal that the new methodology can detect Trojans with 3–4 orders of magnitude smaller power consumptions than the total power usage of the chip, while it scales very well because of the spatial view to the ICs internals by the thermal mapping.
Abstract: Vulnerability of modern integrated circuits (ICs) to hardware Trojans has been increasing considerably due to the globalization of semiconductor design and fabrication processes. The large number of parts and decreased controllability and observability to complex ICs internals make it difficult to efficiently perform Trojan detection using typical structural tests like path latency and leakage power. In this paper, we present new accurate methods for Trojan detection that are based upon post-silicon multimodal thermal and power characterization techniques. Our approach first estimates the detailed post-silicon spatial power consumption using thermal maps of the IC, then applies 2DPCA to extract features of the spatial power consumption, and finally uses statistical tests against the features of authentic ICs to detect the Trojan. To characterize real-world ICs accurately, we perform our experiments in presence of 20% - 40% CMOS process variation. Our results reveal that our new methodology can detect Trojans with 3-4 orders of magnitude smaller power consumptions than the total power usage of the chip, while it scales very well because of the spatial view to the ICs internals by the thermal mapping.
73 citations
••
01 Jan 2008
73 citations
••
TL;DR: In this article, the authors derived the geometric albedos and radii of the Trojan asteroids 617 Patroclus, 624 Hektor, 1172 Aeneas, and 1173 Anchises, and the outer Jovian satellites Himalia (J6) and Elara (J7).
72 citations
••
TL;DR: Based on W M Keck adaptive optics observations, this paper found a unique and stable orbital solution, which is uncommon in comparison to the orbits of other large multiple asteroid systems studied so far from lightcurve observations recorded since 1957.
Abstract: Asteroids with satellites are natural laboratories to constrain the formation and evolution of our solar system The binary Trojan asteroid (624) Hektor is the only known Trojan asteroid to possess a small satellite Based on W M Keck adaptive optics observations, we found a unique and stable orbital solution, which is uncommon in comparison to the orbits of other large multiple asteroid systems studied so far From lightcurve observations recorded since 1957, we showed that because the large Req = 125 km primary may be made of two joint lobes, the moon could be ejecta of the low-velocity encounter, which formed the system The inferred density of Hektor's system is comparable to the L5 Trojan doublet (617) Patroclus but due to their difference in physical properties and in reflectance spectra, both captured Trojan asteroids could have a different composition and origin Key words: instrumentation: adaptive optics – minor planets, asteroids: general – minor planets, asteroids: individual (624 Hektor) – planets and satellites: detection – planets and satellites: dynamical evolution and stability
70 citations
••
TL;DR: A method based on information-flow tracking uses gate-level logic to detect hardware Trojans that violate the confidentiality and integrity properties of third-party IP cores.
Abstract: A method based on information-flow tracking uses gate-level logic to detect hardware Trojans that violate the confidentiality and integrity properties of third-party IP cores. Experiments on trust-HUB benchmarks show that the method reveals Trojan behavior and unintentional design vulnerabilities that functional testing cannot pinpoint.
70 citations