scispace - formally typeset
Search or ask a question
Topic

Trojan

About: Trojan is a research topic. Over the lifetime, 2028 publications have been published within this topic receiving 33209 citations.


Papers
More filters
Book ChapterDOI
01 Jan 2019
TL;DR: The paper shows that it is easy to identify genuine nodes and Trojan-infected nodes based on controllability and transition probability values of a given Trojan- infected circuit.
Abstract: A method to detect hardware Trojan in gate-level netlist is proposed using deep learning technique. The paper shows that it is easy to identify genuine nodes and Trojan-infected nodes based on controllability and transition probability values of a given Trojan-infected circuit. The controllability and transition probability characteristics of Trojan-infected nodes show large inter-cluster distance from the genuine nodes so that it is easy to cluster the nodes as Trojan-infected nodes and genuine nodes. From a given circuit, controllability and transition probability values are extracted as Trojan features using deep learning algorithm and clustering the data using k-means clustering. The technique is validated on ISCAS’85 benchmark circuits, and it does not require any golden model as reference. The proposed method can detect all Trojan-infected nodes in less than 6 s with zero false positive and zero false negative detection accuracy.

21 citations

Journal ArticleDOI
TL;DR: In this article, a systematic search for extrasolar trojan companions to 2244 known Kepler Objects of Interest (KOIs), with epicyclic orbital characteristics similar to those of the Jovian trojan families, was conducted, and no convincing trojan candidates are found, despite a typical sensitivity down to Earth-size objects.
Abstract: Trojans are circumstellar bodies that reside in characteristic 1:1 orbital resonances with planets. While all the trojans in our Solar System are small (< ~100 km), stable planet-size trojans may exist in extrasolar planetary systems, and the Kepler telescope constitutes a formidable tool to search for them. Here we report on a systematic search for extrasolar trojan companions to 2244 known Kepler Objects of Interest (KOIs), with epicyclic orbital characteristics similar to those of the Jovian trojan families. No convincing trojan candidates are found, despite a typical sensitivity down to Earth-size objects. This fact can however not be used to stringently exclude the existence of trojans in this size range, since stable trojans need not necessarily share the same orbital plane as the planet, and thus may not transit. Following this reasoning, we note that if Earth-sized trojans exist at all, they are almost certainly both present and in principle detectable in the full set of Kepler data, although a very substantial computational effort would be required to detect them. On the same token, we also note that some of the existing KOIs could in principle be trojans themselves, with a primary planet orbiting outside of the transiting plane. A few examples are given for which this is a readily testable scenario.

21 citations

Journal ArticleDOI
TL;DR: This paper examines hardware trojan threats to semiconductor chips, which is particularly important for chips intended for vital infrastructure and critical applications, and proposes an approach to characterize hardware trojans from both the attacker and defender perspectives.
Abstract: This paper examines hardware trojan threats to semiconductor chips, which is particularly important for chips intended for vital infrastructure and critical applications. The phases of the chip production life-cycle are considered in terms of the opportunities for trojan insertion. Trojans are examined based on eight attribute categories. A matrix identifying the relationships between these attributes is defined. This matrix is used to characterize hardware trojans from both the attacker and defender perspectives. Two case studies are given to illustrate the usefulness of the proposed approach.

21 citations

Journal ArticleDOI
TL;DR: In this paper, the authors investigate the stability of the two Trojan swarms, with a particular focus on these collisional families, and find that the members of Trojan swarm escape the population at a linear rate, with the primordial L4 (23.35 per cent escape) and L5 (24.89 per percent escape) population sizes likely 1.31 and 1.35 times larger than today.
Abstract: The Jovian Trojans are two swarms of objects located around the L4 and L5 Lagrange points. The population is thought to have been captured by Jupiter during the Solar system’s youth. Within the swarms, six collisional families have been identified in previous work, with four in the L4 swarm, and two in the L5. Our aim is to investigate the stability of the two Trojan swarms, with a particular focus on these collisional families. We find that the members of Trojan swarms escape the population at a linear rate, with the primordial L4 (23.35 per cent escape) and L5 (24.89 per cent escape) population sizes likely 1.31 and 1.35 times larger than today. Given that the escape rates were approximately equal between the two Trojan swarms, our results do not explain the observed asymmetry between the two groups, suggesting that the numerical differences are primordial in nature, supporting previous studies. Upon leaving the Trojan population, the escaped objects move on to orbits that resemble those of the Centaur and short-period comet populations. Within the Trojan collisional families, the 1996 RJ and 2001 UV209 families are found to be dynamically stable over the lifetime of the Solar system, whilst the Hektor, Arkesilos and Ennomos families exhibit various degrees of instability. The larger Eurybates family shows 18.81 per cent of simulated members escaping the Trojan population. Unlike the L4 swarm, the escape rate from the Eurybates family is found to increase as a function of time, allowing an age estimation of approximately 1.045 ± 0.364 × 109 yr.

21 citations

Proceedings ArticleDOI
09 Aug 2010
TL;DR: This paper presents a framework to determine if a given binary program is vulnerable to this attack and to construct a concrete trojan if so, and demonstrates that the reuse-oriented camouflaging trojans are a real threat and vulnerabilities of this type in legal binaries can be effectively revealed and confirmed.
Abstract: We introduce the reuse-oriented camouflaging trojan — a new threat to legitimate software binaries. To perform a malicious action, such a trojan identifies and reuses an existing function in a legal binary program instead of implementing the function itself. Furthermore, this trojan is stealthy in that the malicious invocation of a targeted function usually takes place in a location where it is legal to do so, closely mimicking a legal invocation. At the network level, the victim binary can still follow its communication protocol without exhibiting any anomalous behavior. Meanwhile, many close-source shareware binaries are rich in functions that can be maliciously “reused”, making them attractive targets of this type of attack. In this paper, we present a framework to determine if a given binary program is vulnerable to this attack and to construct a concrete trojan if so. Our experiments with a number of real-world software binaries demonstrate that the reuse-oriented camouflaging trojans are a real threat and vulnerabilities of this type in legal binaries can be effectively revealed and confirmed.

21 citations


Network Information
Related Topics (5)
Cloud computing
156.4K papers, 1.9M citations
70% related
Cache
59.1K papers, 976.6K citations
70% related
Planet
27K papers, 980.6K citations
68% related
Compiler
26.3K papers, 578.5K citations
66% related
Key (cryptography)
60.1K papers, 659.3K citations
66% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023136
2022282
2021111
2020139
2019144
2018168