scispace - formally typeset
Search or ask a question
Topic

Trojan

About: Trojan is a research topic. Over the lifetime, 2028 publications have been published within this topic receiving 33209 citations.


Papers
More filters
Proceedings ArticleDOI
01 Jun 2014
TL;DR: This paper proposes design rules to assist run-time Trojan detection and fast recovery by exploring diversity of untrusted third party IP cores and shows the optimization approach to minimize the cost of implementation in terms of the number of different IP cores used by the implementation.
Abstract: Current Integrated Circuit (IC) development process raises security concerns about hardware Trojan which are maliciously inserted to alter functional behavior or leak sensitive information. Most of the hardware Trojan detection techniques rely on a golden (trusted) IC against which to compare a suspected one. Hence they cannot be applied to designs using third party Intellectual Property (IP) cores where golden IP is unavailable. Moreover, due to the stealthy nature of hardware Trojan, there is no technique that can guarantee Trojan-free after manufacturing test. As a result, Trojan detection and recovery at run time acting as the last line of defense is necessary especially for mission-critical applications. In this paper, we propose design rules to assist run-time Trojan detection and fast recovery by exploring diversity of untrusted third party IP cores. With these design rules, we show the optimization approach to minimize the cost of implementation in terms of the number of different IP cores used by the implementation.

47 citations

Journal ArticleDOI
TL;DR: In this article, an analysis of the long term stability of Trojan type orbits of both Uranus and Neptune has been presented by employing the Frequency Map Analysis (hereinafter FMA) method.
Abstract: We present in this paper an analysis of the long term stability of Trojan type orbits of both Uranus and Neptune. Employing the Frequency Map Analysis (hereinafter FMA) we measure the diffusion speed in the phase space for a large sample of Trojan orbits with short numerical integrations. High resolution diffusion maps are derived for different values of initial inclination. These maps outline where the most stable orbits can be found in the Trojan clouds of the two planets. The orbit of the newly discovered Neptune Trojan 2001 QR322 has been analysed in detail with the FMA method. In the phase space the body is located close to the border of a stable region for low inclination Neptune Trojans. Numerical integrations over 4.5 Gyr of clone orbits generated from the covariance matrix show that only 10% of the clones escape from the Trojan cloud. The proper frequencies of the Trojan motion computed with the FMA algorithm allow us to to derive a numerical secular theory. From this theory it is possible to locate in the phase space the main secular resonances that can perturb Trojan orbits of the two planets and lead to instability.

47 citations

Journal ArticleDOI
TL;DR: This work analyzes the impact of both sequential and combinational Trojans with varied partial activity, area, and location on the proposed on-chip structure and demonstrates that stealthy Trojan can be effectively detected with this technique, even when obfuscated by circuit switching activity and process and environmental variations.
Abstract: The modern integrated circuit (IC) manufacturing process has exposed the fabless semiconductor industry to hardware Trojans that threaten circuits bound for critical applications. This paper investigates an on-chip sensor's effectiveness for Trojan detection in an application specific integrated circuit (ASIC) and proposes new techniques to improve the sensor's sensitivity to Trojan switching activity. The sensors serve as power supply monitors by detecting fluctuations in their characteristic frequencies due to malicious inclusions (i.e. hardware Trojans) in the circuit under authentication. Our proposed on-chip structure was implemented and fabricated on an ASIC test chip using IBM 90nm technology with controlled hardware Trojans. This work analyzes the impact of both sequential and combinational Trojans with varied partial activity, area, and location on the proposed on-chip structure and demonstrates that stealthy Trojans can be effectively detected with this technique, even when obfuscated by circuit switching activity and process and environmental variations.

47 citations

Proceedings ArticleDOI
04 Jan 2016
TL;DR: This work proposes to formally verify third party IPs (3PIPs) for unauthorized information leakage and validates the technique using Trojan benchmarks from the Trust-Hub.
Abstract: Globalization of the system-on-chip (SoC) design flow has created opportunities for rogue intellectual property (IP) vendors to insert malicious circuits (a.k.a. hardware Trojans) into their IPs. We propose to formally verify third party IPs (3PIPs) for unauthorized information leakage. We validate our technique using Trojan benchmarks from the Trust-Hub.

46 citations

Journal ArticleDOI
01 Feb 1992-Icarus
TL;DR: In this article, a bias-corrected analysis of lightcurve amplitude distributions for all published data on 23 Trojan, Hilda, and Cybele asteroids is presented. But the largest Trojans are found to have a higher mean-lightcurve magnitude than their low-albedo, main-belt counterparts.

46 citations


Network Information
Related Topics (5)
Cloud computing
156.4K papers, 1.9M citations
70% related
Cache
59.1K papers, 976.6K citations
70% related
Planet
27K papers, 980.6K citations
68% related
Compiler
26.3K papers, 578.5K citations
66% related
Key (cryptography)
60.1K papers, 659.3K citations
66% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023136
2022282
2021111
2020139
2019144
2018168