scispace - formally typeset
Search or ask a question
Topic

Trojan

About: Trojan is a research topic. Over the lifetime, 2028 publications have been published within this topic receiving 33209 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: In this paper, the authors investigated families of non-symmetric periodic orbits of the restricted four-body problem where the three primary bodies are set in the stable Lagrangian equilateral triangle configuration.

37 citations

Journal ArticleDOI
TL;DR: In this article, the first Earth Trojan has been observed and found to be on an interesting orbit close to the Lagrange point L4, and a detailed investigation of the stability of its orbit and moreover extend the study to give an idea of the probability of finding additional Earth Trojans.
Abstract: The first Earth Trojan has been observed and found to be on an interesting orbit close to the Lagrange point L4. In the present study, we therefore perform a detailed investigation of the stability of its orbit and moreover extend the study to give an idea of the probability of finding additional Earth Trojans. Our results are derived using three different approaches. In the first, we derive an analytical mapping in the spatial elliptic restricted three-body problem to find the phase space structure of the dynamical problem. We then explore the stability of the asteroid in the context of the phase space geometry, including the indirect influence of the additional planets of our Solar system. In the second approach, we use precise numerical methods to integrate the orbit forward and backward in time in different dynamical models. On the basis of a set of 400 clone orbits, we derive the probability of capture and escape of the Earth Trojan asteroid 2010 TK7. To this end, in the third approach we perform an extensive numerical investigation of the stability region of the Earth’s Lagrangian points. We present a detailed parameter study of possible stable tadpole and horseshoe orbits of additional Earth Trojans, i.e. with respect to the semi-major axes and inclinations of thousands of fictitious Trojans. All three approaches lead to the conclusion that the Earth Trojan asteroid 2010 TK7 finds itself in an unstable region on the edge of a stable zone; additional Earth Trojan asteroids may be found in this regime of stability.

37 citations

Proceedings ArticleDOI
05 Nov 2012
TL;DR: A novel minimal test point insertion methodology that provisions a provably complete detection of hardware Trojans by noninvasive timing characterization by creating a satisfiability-based input vector selection for sensitizing and characterizing each single timing path.
Abstract: This paper proposes a novel minimal test point insertion methodology that provisions a provably complete detection of hardware Trojans by noninvasive timing characterization. The objective of test point insertion is to break the reconvergent paths so that target routes for Trojan delay testing are specifically observed. We create a satisfiability-based input vector selection for sensitizing and characterizing each single timing path. Evaluations on benchmark circuits demonstrate that the test point-based Trojan detection can cover all circuit locations and can detect Trojans accurately with less than 5% performance overhead.

36 citations

Proceedings ArticleDOI
01 Oct 2017
TL;DR: In this paper, a Trojan detection framework based on information flow security (IFS) verification is proposed to detect violation of IFS policies caused by Trojans without the need of white-box knowledge of the IP.
Abstract: Semiconductor design houses are increasingly becoming dependent on third party vendors to procure intellectual property (IP) and meet time-to-market constraints. However, these third party IPs cannot be trusted as hardware Trojans can be maliciously inserted into them by untrusted vendors. While different approaches have been proposed to detect Trojans in third party IPs, their limitations have not been extensively studied. In this paper, we analyze the limitations of the state-of-the-art Trojan detection techniques and demonstrate with experimental results how to defeat these detection mechanisms. We then propose a Trojan detection framework based on information flow security (IFS) verification. Our framework detects violation of IFS policies caused by Trojans without the need of white-box knowledge of the IP. We experimentally validate the efficacy of our proposed technique by accurately identifying Trojans in the trust-hub benchmarks. We also demonstrate that our technique does not share the limitations of the previously proposed Trojan detection techniques.

36 citations

Book ChapterDOI
TL;DR: In this paper, a new paradigm has been developed in which the Trojans formed in the proto-Kuiper Belt, and they were scattered inward and captured in the Trojan swarms as a result of resonant interactions of the giant planets.
Abstract: The Trojan asteroids provide a unique perspective on the history of Solar System. As a large population of small bodies, they record important gravitational interactions and dynamical evolution of the Solar System. In the past decade, significant advances have been made in understanding physical properties, and there has been a revolution in thinking about the origin of Trojans. The ice and organics generally presumed to be a significant part of Trojan compositions have yet to be detected directly, though low density of the binary system Patroclus (and possibly low density of the binary/moonlet system Hektor) is consistent with an interior ice component. By contrast, fine-grained silicates that appear to be similar to cometary silicates in composition have been detected, and a color bimodality may indicate distinct compositional groups among the Trojans. Whereas Trojans had traditionally been thought to have formed near 5 AU, a new paradigm has developed in which the Trojans formed in the proto-Kuiper Belt, and they were scattered inward and captured in the Trojan swarms as a result of resonant interactions of the giant planets. Whereas the orbital and population distributions of current Trojans are consistent with this origin scenario, there are significant differences between current physical properties of Trojans and those of Kuiper Belt objects. These differences may be indicative of surface modification due to the inward migration of objects that became the Trojans, but understanding of appropriate modification mechanisms is poor and would benefit from additional laboratory studies. Many open questions remain, and the future promises significant strides in our understanding of Trojans. The time is ripe for a spacecraft mission to the Trojans, to turn these objects into geologic worlds that can be studied in detail to unravel their complex history.

36 citations


Network Information
Related Topics (5)
Cloud computing
156.4K papers, 1.9M citations
70% related
Cache
59.1K papers, 976.6K citations
70% related
Planet
27K papers, 980.6K citations
68% related
Compiler
26.3K papers, 578.5K citations
66% related
Key (cryptography)
60.1K papers, 659.3K citations
66% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023136
2022283
2021112
2020140
2019144
2018168