scispace - formally typeset
Search or ask a question
Topic

Trojan

About: Trojan is a research topic. Over the lifetime, 2028 publications have been published within this topic receiving 33209 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: The construction of Trojan squares both for unstructured and for factorial treatment sets is discussed and the utility of Trojan square designs for practical crop research is demonstrated.
Abstract: Latin square and near-Latin square designs are valuable row-and-column designs for crop research but the practical size range of such designs is severely limited. Semi-Latin square designs extend this range but not all semi-Latin squares are suitable for experimental designs. Trojan square designs are a special class of optimal semi-Latin squares that generalizes the class of Latin square designs. The construction of Trojan squares both for unstructured and for factorial treatment sets is discussed and the utility of Trojan square designs for practical crop research is demonstrated. The corpus of available designs is further extended by a discussion of incomplete Trojan square designs obtained by omitting one main row or one main column from a complete Trojan square design. Some advantages of Trojan square and incomplete Trojan square designs for crop research are discussed and some suggestions for further design research are made.

26 citations

Journal ArticleDOI
TL;DR: This work gives Trojan channel circuitry specifics for AMBA AXI4 and advanced peripheral bus (APB), and creates an SoC design running a multiuser Linux OS to demonstrate how a Trojan channel can allow an unprivileged user access to root-user data.
Abstract: On-chip bus implementations must be bug-free and secure to provide the functionality and performance required by modern system-on-a-chip (SoC) designs. Regardless of the specific topology and protocol, bus behavior is never fully specified, meaning there exist cycles/conditions where some bus signals are irrelevant, and ignored by the verification effort. We highlight the susceptibility of current bus implementations to Hardware Trojans hiding in this partially specified behavior, and present a model for creating a covert Trojan communication channel between SoC components for any bus topology and protocol. By only altering existing bus signals during the period where their behaviors are unspecified , the Trojan channel is very difficult to detect. We give Trojan channel circuitry specifics for AMBA AXI4 and advanced peripheral bus (APB), then create a simple system comprised of several master and slave units connected by an AXI4-Lite interconnect to quantify the overhead of the Trojan channel and illustrate the ability of our Trojans to evade a suite of protocol compliance checking assertions from ARM. We also create an SoC design running a multiuser Linux OS to demonstrate how a Trojan communication channel can allow an unprivileged user access to root-user data. We then outline several detection strategies for this class of Hardware Trojan.

26 citations

Proceedings ArticleDOI
01 Dec 2016
TL;DR: This paper presents a novel automated hardware Trojan detection technique based on enhanced two-class classification while eliminating the need of golden chips after fabrication, and shows that the proposed technique can detect both known Trojans and various unknown Trojan with high accuracy and recall.
Abstract: Recently, integrated circuits (ICs) are becoming increasing vulnerable to hardware Trojans. Most of existing works require golden chips to provide references for hardware Trojan detection. However, obtaining a golden chip is extremely difficult or even not exists. This paper presents a novel automated hardware Trojan detection technique based on enhanced two-class classification while eliminating the need of golden chips after fabrication. We formulate the Trojan detection problem into a classification problem, and train the algorithms using simulated ICs during IC design flow. The algorithm will form a classifier which can automatically identify Trojan-free and Trojan-inserted ICs during test-time. Moreover, we propose several optional optimized methods to enhance the technique: 1) we propose adaptive iterative optimization of one algorithm by focusing on errors, in which the weight-adjusting are based on how successful the algorithm was in the previous iteration; 2) we analyze the misclassified ICs' numbers of certain algorithms and present the matched algorithm-pairs; 3) we alter the algorithms to take into account of the costs of making different detection decisions, called cost-sensitive detection; 4) we present the suitable algorithm settings against high level of process variations. Experiment results on benchmark circuits show that the proposed technique can detect both known Trojans and various unknown Trojans with high accuracy and recall (90%∼100%). Since we didn't add any extra circuit to the design, there is no overhead of this approach.

26 citations

Journal ArticleDOI
01 Jul 1965-Icarus
TL;DR: In this paper, the authors present an analytical continuation of the family of long period orbits at L4 representing the normal Castesian coordinates of the asteroid as d'Alembert series in function of an orbital parameter.

26 citations

Journal ArticleDOI
TL;DR: In this paper, the authors carried out an extensive study of the possibility of the detection of Earth-mass and super-Earth Trojan planets using transit timing variation method with the Kepler space telescope.
Abstract: We have carried out an extensive study of the possibility of the detection of Earth-mass and super-Earth Trojan planets using transit timing variation method with the Kepler space telescope. We have considered a system consisting of a transiting Jovian-type planet in a short period orbit, and determined the induced variations in its transit timing due to an Earth-mass/super-Earth Trojan planet. We mapped a large section of the phase space around the 1:1 mean-motion resonance and identified regions corresponding to several other mean-motion resonances where the orbit of the planet would be stable. We calculated transit timing variations (TTVs) for different values of the mass and orbital elements of the transiting and perturbing bodies as well as the mass of central star, and identified orbital configurations of these objects (ranges of their orbital elements and masses) for which the resulted TTVs would be within the range of the variations of the transit timing of Kepler’s planetary candidates. Results of our study indicate that in general, the amplitudes of the TTVs fall within the detectable range of timing precision obtained from the Kepler’s long-cadence data, and depending on the parameters of the system, their magnitudes may become as large as a few hours. The probability of detection is higher for super-Earth Trojans with slightly eccentric orbits around short-period Jovian-type planets with masses slightly smaller than Jupiter. We present the details of our study and discuss the implications of its results.

26 citations


Network Information
Related Topics (5)
Cloud computing
156.4K papers, 1.9M citations
70% related
Cache
59.1K papers, 976.6K citations
70% related
Planet
27K papers, 980.6K citations
68% related
Compiler
26.3K papers, 578.5K citations
66% related
Key (cryptography)
60.1K papers, 659.3K citations
66% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023136
2022282
2021111
2020139
2019144
2018168