scispace - formally typeset
Search or ask a question
Topic

Trojan

About: Trojan is a research topic. Over the lifetime, 2028 publications have been published within this topic receiving 33209 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: In this paper, the first known Mars Trojan asteroid (5261) Eureka was determined to be stable at least on megayear timescales by strong perturbations by other planets other than Mars.
Abstract: Observations and results of orbit determination of the first known Mars Trojan asteroid (5261) Eureka are presented. We have numerically calculated the evolution of the orbital elements, and have analyzed the behavior of the motion during the next 2 Myr. Strong perturbations by planets other than Mars seem to stabilize the eccentricity of the asteroid by stirring the high order resonances present in the elliptic restricted problem. As a result, the orbit appears stable at least on megayear timescales. The difference of the mean longitudes of Mars and Eureka and the semimajor axis of the asteroid form a pair of variables that essentially behave in an adiabatic manner, while the evolution of the other orbital elements is largely determined by the perturbations due to other planets.

30 citations

Journal ArticleDOI
TL;DR: The TROY project as discussed by the authors used archival radial velocity data of 46 planetary systems to place upper limits on the mass of possible trojans and investigate the presence of co-orbital planets down to several tens of Earth masses.
Abstract: Context. The detection of Earth-like planets, exocomets or Kuiper belts show that the different components found in the solar system should also be present in other planetary systems. Trojans are one of these components and can be considered fossils of the first stages in the life of planetary systems. Their detection in extrasolar systems would open a new scientific window to investigate formation and migration processes. Aims. In this context, the main goal of the TROY project is to detect exotrojans for the first time and to measure their occurrence rate ( η -Trojan). In this first paper, we describe the goals and methodology of the project. Additionally, we used archival radial velocity data of 46 planetary systems to place upper limits on the mass of possible trojans and investigate the presence of co-orbital planets down to several tens of Earth masses. Methods. We used archival radial velocity data of 46 close-in ( P Results. We identify nine systems for which the archival data provide >1 σ evidence for a mass imbalance between L 4 and L 5 . Two of these systems provide >2 σ detection, but no significant detection is found among our sample. We also report upper limits to the masses at L 4 / L 5 in all studied systems and discuss the results in the context of previous findings.

30 citations

Proceedings ArticleDOI
22 Apr 2018
TL;DR: This paper proposes a new class of hardware Trojans designed to evade industry standard post-manufacturing memory tests while enabling targeted data tampering after deployment and demonstrates various forms of Trojan circuits in SRAM that cause diverse malicious effects and have diverse activation conditions while incurring minimal overhead in power, performance, and stability.
Abstract: Embedded memory, typically implemented with Static Random Access Memory (SRAM) technology, is an integral part of modern processors and System-on-Chips (SoCs). The reliability and integrity of embedded SRAM arrays are essential to ensure dependable and trustworthy computing. In the past, significant research has been conducted to develop automated test algorithms aimed at comprehensively detecting SRAM faults. While such tests have advanced our ability to detect manufacturing imperfection induced faults, they cannot ensure detection of deliberately implemented design modifications, also known as hardware Trojans, in an SRAM array by untrusted entities in the design and fabrication flow. Indeed, these attacks constitute an emerging concern, since they can affect the integrity of fabricated ICs and cause severe consequences in the field. While a growing body of research addresses Trojan attacks in logic circuits, little to no research has explored these attacks in embedded memory arrays. In this paper, for the first time to our knowledge, we propose a new class of hardware Trojans targeting embedded SRAM arrays. The Trojans are designed to evade industry standard post-manufacturing memory tests (e.g. March test) while enabling targeted data tampering after deployment. We demonstrate various forms of Trojan circuits in SRAM that cause diverse malicious effects and have diverse activation conditions while incurring minimal overhead in power, performance, and stability. Further, the proposed layouts preserve the SRAM cell footprint and incur negligible silicon area overhead.

30 citations

Proceedings ArticleDOI
02 Nov 2020
TL;DR: This approach is the first attempt in applying reinforcement learning for efficient test generation to detect Trojans using delay-based analysis, and can significantly improve both side-channel sensitivity and test generation time compared to state-of-the-art test generation techniques.
Abstract: Reliability and trustworthiness are dominant factors in designing System-on-Chips (SoCs) for a variety of applications. Malicious implants, such as hardware Trojans, can lead to undesired information leakage or system malfunction. To ensure trustworthy computing, it is critical to develop efficient Trojan detection techniques. While existing delay-based side-channel analysis is promising, it is not effective due to two fundamental limitations: (i) The difference in path delay between the golden design and Trojan inserted design is negligible compared with environmental noise and process variations. (ii) Existing approaches rely on manually crafted rules for test generation, and require a large number of simulations, making it impractical for industrial designs. In this paper, we propose a novel test generation method using reinforcement learning for delay-based Trojan detection. This paper makes three important contributions. 1) Unlike existing methods that rely on the delay difference of a few gates, our proposed approach utilizes critical path analysis to generate test vectors that can maximize the side-channel sensitivity. 2) To the best of our knowledge, our approach is the first attempt in applying reinforcement learning for efficient test generation to detect Trojans using delay-based analysis. 3) Our experimental results demonstrate that our method can significantly improve both side-channel sensitivity (59% on average) and test generation time (17x on average) compared to state-of-the-art test generation techniques.

30 citations

Journal ArticleDOI
TL;DR: In this article, the authors revisited the long-term dynamical evolution of the previously known Mars Trojans and showed that 2011 SC191, 2011 SL25 and 2011 UN63 are also trailing (L4 and L5).
Abstract: Mars was second to Jupiter in being recognized as the host of a population of Trojan minor bodies. Since 1990, five asteroids - 5261 Eureka, (101429) 1998 VF31, (121514) 1999 UJ7, 2001 DH47 and (311999) 2007 NS2 - have been identified as Mars Trojans, one L4 and four L5. Dynamical and spectroscopic evidence suggests that some Mars Trojans may be remnants of the original planetesimal population that formed in the terrestrial planets region. Here we revisit the long-term dynamical evolution of the previously known Mars Trojans and show that 2011 SC191, 2011 SL25 and 2011 UN63 are also trailing (L5) Mars Trojans. They appear to be as stable as Eureka and may have been Trojans over the age of the Solar system. The fact that five Trojans move in similar orbits and one of them is a binary may point to the disruption of a larger body early in the history of the Solar system. Such a catastrophic event may also explain the apparently strong asymmetry in terms of number of objects (one versus seven) between the L4 and L5 regions. Future spectroscopic observations should be able to reject or confirm a putative common chemical signature that may lend further support to collisional scenario.

30 citations


Network Information
Related Topics (5)
Cloud computing
156.4K papers, 1.9M citations
70% related
Cache
59.1K papers, 976.6K citations
70% related
Planet
27K papers, 980.6K citations
68% related
Compiler
26.3K papers, 578.5K citations
66% related
Key (cryptography)
60.1K papers, 659.3K citations
66% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023136
2022282
2021111
2020139
2019144
2018168