Topic
Trojan
About: Trojan is a research topic. Over the lifetime, 2028 publications have been published within this topic receiving 33209 citations.
Papers published on a yearly basis
Papers
More filters
••
TL;DR: This work introduces a fully automatic method to detect the presence of HW Trojans in third party behavioral IPs (3PBIPs) using formal verification methods and performs High-Level Synthesis on these IPs and re-constructing the C code in order to perform the verification on them.
Abstract: This work introduces a fully automatic method to detect the presence of HW Trojans in third party behavioral IPs (3PBIPs) using formal verification methods. In particular, property checking at the behavioral level. Some state of the art High-Level Synthesis (HLS) tools now also include advanced formal verification tools. This work leverages these tools to detect the malicious alteration of 3PIPs when no golden reference IP is available. This work has also been extended to detect HW Trojans built into encrypted 3PBIPs by performing High-Level Synthesis on these IPs and re-constructing the C code in order to perform the verification on them. We present three case studies of two of the most typical HW Trojans with different trigger and payload mechanisms. The first leads to the malfunction of the IP, the second leaks information while the third leads to the denial of service. In all three cases, our proposed method was able to detect the HW Trojan in a fully automatic way.
31 citations
••
31 citations
••
Harvard University1, Southwest Research Institute2, Carnegie Learning3, National Research Council4, Carnegie Institution for Science5, Massachusetts Institute of Technology6, Northern Arizona University7, University of Franche-Comté8, University of Hawaii9, University of Florida10, Lowell Observatory11
TL;DR: A long-term stable L5 (trailing) Neptune Trojan was discovered in data acquired to search for candidate trans-Neptunian objects for the New Horizons spacecraft to fly by during an extended post-Pluto mission as mentioned in this paper.
Abstract: We present the discovery of a long-term stable L5 (trailing) Neptune Trojan in data acquired to search for candidate trans-Neptunian objects for the New Horizons spacecraft to fly by during an extended post-Pluto mission. This Neptune Trojan, 2011 HM102, has the highest inclination (29.°4) of any known member of this population. It is intrinsically brighter than any single L5 Jupiter Trojan at HV ~ 8.18. We have determined its gri colors (a first for any L5 Neptune Trojan), which we find to be similar to the moderately red colors of the L4 Neptune Trojans, suggesting similar surface properties for members of both Trojan clouds. We also present colors derived from archival data for two L4 Neptune Trojans (2006 RJ103 and 2007 VL305), better refining the overall color distribution of the population. In this document we describe the discovery circumstances, our physical characterization of 2011 HM102, and this object's implications for the Neptune Trojan population overall. Finally, we discuss the prospects for detecting 2011 HM102 from the New Horizons spacecraft during its close approach in mid- to late-2013.
31 citations
••
01 Jun 2014TL;DR: An RTL security metric is designed in order to evaluate the quality of IP cores and counter Trojan attacks at the pre-fabrication stages of the IP design flow to address the concern that a complete detection scheme for effective hardware Trojan identification is lacking.
Abstract: To address the concern that a complete detection scheme for effective hardware Trojan identification is lacking, we have designed an RTL security metric in order to evaluate the quality of IP cores (with the same or similar functionality) and counter Trojan attacks at the pre-fabrication stages of the IP design flow. The proposed security metric is constructed on top of two criteria, from which a quantitative security value can be assigned to the target circuit: 1) Distribution of controllability; 2) Existence of rare events. The proposed metric, called FIGHT, is an automated tool whereby malicious modifications to ICs and/or the vulnerability of the IP core can be identified, by monitoring both internal node controllability and the corresponding control value distribution plotted as a histogram. Experimentation on an RS232 module was performed to demonstrate our dual security criteria and proved security degradation to the IP module upon hardware Trojan insertion.
31 citations
••
TL;DR: In this paper, the authors examined the optical color distribution of the Neptunian Trojans using a combination of new optical photometry and published data and found a color distribution that is statistically indistinguishable from that of the Jovian trojans but unlike any subpopulation in the Kuiper belt.
Abstract: The Trojan asteroids of Jupiter and Neptune are likely to have been captured from original heliocentric orbits in the dynamically excited ("hot") population of the Kuiper belt. However, it has long been known that the optical color distributions of the Jovian Trojans and the hot population are not alike. This difference has been reconciled with the capture hypothesis by assuming that the Trojans were resurfaced (for example, by sublimation of near-surface volatiles) upon inward migration from the Kuiper belt (where blackbody temperatures are $\sim$40 K) to Jupiter's orbit ($\sim$125 K). Here, we examine the optical color distribution of the \textit{Neptunian} Trojans using a combination of new optical photometry and published data. We find a color distribution that is statistically indistinguishable from that of the Jovian Trojans but unlike any sub-population in the Kuiper belt. This result is puzzling, because the Neptunian Trojans are very cold (blackbody temperature $\sim$50 K) and a thermal process acting to modify the surface colors at Neptune's distance would also affect the Kuiper belt objects beyond, where the temperatures are nearly identical. The distinctive color distributions of the Jovian and Neptunian Trojans thus present us with a conundrum: they are very similar to each other, suggesting either capture from a common source or surface modification by a common process. However, the color distributions differ from any plausible common source population, and there is no known modifying process that could operate equally at both Jupiter and Neptune.
31 citations