scispace - formally typeset
Search or ask a question
Topic

Trojan

About: Trojan is a research topic. Over the lifetime, 2028 publications have been published within this topic receiving 33209 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: The form of lamentation in Greek tragedy has been identified as a gendered genre in the Trojan Women as discussed by the authors, and the authors of this paper apply these criteria to the Trojan women and conclude that virtually every scene in the play shows the characteristics of lament.
Abstract: This article summarizes the findings of an unpublished PhD dissertation, "The Form of Lament in Greek Tragedy" by E Wright, which provide for the first time objective criteria for identification of lamentation in tragedy It applies these criteria to the Trojan Women , and argues, on the basis of metrical and stylistic devices, that virtually every scene in the Trojan Women shows the characteristics of lament The play is, from both the minute technical, and the overall structural, point of view, a lament This provides explanations for some of the long-standing critical issues of the play, eg, no unity, no plot, an ill-conceived prologue The article then considers also how the Trojan Women fits into current discussions of lament as a gendered genre It replies especially to work on the development of 5th-century Athenian attitudes towards female lament, in which a pattern of increased criticism and restriction, it is argued, is reflected in the changing treatment of lament in Athenian tragedy The treatment of lament in the Trojan Women does not conform to this perceived development This suggests that there were still a variety of attitudes current and influential in late 5th-century Athens towards female lamentation

49 citations

Proceedings ArticleDOI
18 Oct 2009
TL;DR: This paper presents a Trojan-resistant system bus architecture suitable across a wide range of SoC bus systems, and shows that use of this bus and associated embedded software is highly effective in reducing IC Trojan vulnerabilities without loss of bus performance.
Abstract: Communications systems are increasingly reliant on system-on-chip (SoC) solutions. As the complexity and size of SoCs continues to grow, so does the risk of “Trojan” attacks, in which an integrated circuit (IC) design is surreptitiously and maliciously altered at some point during the design or manufacturing process. Despite the risks that such an attack entail, relatively little attention has been given in the literature to methods enabling detection of and response to run-time Trojan attacks. In the present paper, we present a Trojan-resistant system bus architecture suitable across a wide range of SoC bus systems. The system detects malicious bus behaviors associated Trojan hardware, protects the system and system bus from them and reports the malicious behaviors to the CPU. We show that use of this bus and associated embedded software is highly effective in reducing IC Trojan vulnerabilities without loss of bus performance.

48 citations

Journal ArticleDOI
TL;DR: In this paper, the authors present a simple, plausible hypothesis for the origin and evolution of the two Trojan color sub-populations, which suggest a common primordial progenitor population for both Trojans and Kuiper belt objects.
Abstract: One of the most enigmatic and hitherto unexplained properties of Jupiter Trojans is their bimodal color distribution. This bimodality is indicative of two sub-populations within the Trojans, which have distinct size distributions. In this paper, we present a simple, plausible hypothesis for the origin and evolution of the two Trojan color sub-populations. In the framework of dynamical instability models of early Solar System evolution, which suggest a common primordial progenitor population for both Trojans and Kuiper belt objects, we use observational constraints to assert that the color bimodalities evident in both minor body populations developed within the primordial population prior to the onset of instability. We show that, beginning with an initial composition of rock and ices, location-dependent volatile loss through sublimation in this primordial population could have led to sharp changes in the surface composition with heliocentric distance. We propose that the depletion or retention of H$_{2}$S ice on the surface of these objects was the key factor in creating an initial color bimodality. Objects that retained H$_{2}$S on their surfaces developed characteristically redder colors upon irradiation than those that did not. After the bodies from the primordial population were scattered and emplaced into their current positions, they preserved this primordial color bimodality to the present day. We explore predictions of the volatile loss model - in particular, the effect of collisions within the Trojan population on the size distributions of the two sub-populations - and propose further experimental and observational tests of our hypothesis

48 citations

Journal ArticleDOI
01 Jul 2016
TL;DR: This paper presents a taxonomy of FPGA-specific hardware Trojan attacks based on activation and payload characteristics along with Trojan models that can be inserted by an attacker, and proposes a novel design approach, referred to as Adapted Triple Modular Redundancy (ATMR), to reliably protect against Trojan circuits of varying forms in FPGAs.
Abstract: Field programmable gate arrays (FPGAs) are being increasingly used in a wide range of critical applications, including industrial, automotive, medical, and military systems. Since FPGA vendors are typically fabless, it is more economical to outsource device production to off-shore facilities. This introduces many opportunities for the insertion of malicious alterations of FPGA devices in the foundry, referred to as hardware Trojan attacks, that can cause logical and physical malfunctions during field operation. The vulnerability of these devices to hardware attacks raises serious security concerns regarding hardware and design assurance. In this paper, we present a taxonomy of FPGA-specific hardware Trojan attacks based on activation and payload characteristics along with Trojan models that can be inserted by an attacker. We also present an efficient Trojan detection method for FPGA based on a combined approach of logic-testing and side-channel analysis. Finally, we propose a novel design approach, referred to as Adapted Triple Modular Redundancy (ATMR), to reliably protect against Trojan circuits of varying forms in FPGA devices. We compare ATMR with the conventional TMR approach. The results demonstrate the advantages of ATMR over TMR with respect to power overhead, while maintaining the same or higher level of security and performances as TMR. Further improvement in overhead associated with ATMR is achieved by exploiting reconfiguration and time-sharing of resources.

48 citations

Proceedings ArticleDOI
05 Nov 2012
TL;DR: This work analyzes the impact of Trojans with varied partial activity, area, and location on the proposed ring oscillator structure and demonstrates that stealthyTrojans can be efficiently detected with this technique even while obfuscated by process variations, background noise, and environment noise.
Abstract: The modern integrated circuit (IC) manufacturing process has exposed chip designers to hardware Trojans which threaten circuits bound for critical applications. This paper details the implementation and analysis of a novel ring oscillator network technique for Trojan detection in an application specific integrated circuit (ASIC). The ring oscillator network serves as a power supply monitor by detecting fluctuations in characteristic frequencies due to malicious modifications (i.e. hardware Trojans) in the circuit under authentication. The ring oscillator network was implemented and fabricated in 40 IBM 90nm ASICs with controlled hardware Trojans. This work analyzes the impact of Trojans with varied partial activity, area, and location on the proposed ring oscillator structure and demonstrates that stealthy Trojans can be efficiently detected with this technique even while obfuscated by process variations, background noise, and environment noise.

48 citations


Network Information
Related Topics (5)
Cloud computing
156.4K papers, 1.9M citations
70% related
Cache
59.1K papers, 976.6K citations
70% related
Planet
27K papers, 980.6K citations
68% related
Compiler
26.3K papers, 578.5K citations
66% related
Key (cryptography)
60.1K papers, 659.3K citations
66% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023136
2022282
2021111
2020139
2019144
2018168