scispace - formally typeset
Search or ask a question
Topic

Trojan

About: Trojan is a research topic. Over the lifetime, 2028 publications have been published within this topic receiving 33209 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: Stability analysis of long period Trojan librations treated as short period oscillations about long period reference solution is described in this paper, where the authors consider the Trojan Librations as short periods of time.
Abstract: Stability analysis of long period Trojan librations treated as short period oscillations about long period reference solution

21 citations

Proceedings ArticleDOI
21 Oct 2006
TL;DR: Harrier is an efficient run-time monitor that dynamically collects execution-related data that allows for accurate identification of abnormal program behavior and is 3-4 times faster than comparable information flow tracking systems.
Abstract: HTH (Hunting Trojan Horses) is a security framework developed for detecting difficult types of intrusions. HTH is intended as a complement to anti-virus software in that it targets unknown and zero-day Trojan Horses and Backdoors. In order to accurately identify these types of attacks HTH utilizes runtime information available during execution. The information collected includes fine-grained information flow, program execution flow and resources used.In this paper we present Harrier, an Application Security Monitor at the heart of our HTH framework. Harrier is an efficient run-time monitor that dynamically collects execution-related data. Harrier is capable of collecting information across different abstraction levels including architectural, system and library APIs. To date, Harrier is 3-4 times faster than comparable information flow tracking systems.Using the collected information, Harrier allows for accurate identification of abnormal program behavior. Preliminary results show a good detection rate with a low rate of false positives.

21 citations

Proceedings ArticleDOI
19 May 2013
TL;DR: A current sensing circuit is presented that converts the current activity on local power grid to a timing pulse to detect if an IC is Trojan-infected and this new approach increases the Trojan detection sensitivity.
Abstract: With the globalization of integrated circuit (IC) design and fabrication, there is a growing concern on the devastating impact of subverted chip supply. This paper presents a current sensing circuit that converts the current activity on local power grid to a timing pulse to detect if an IC is Trojan-infected. This new approach increases the Trojan detection sensitivity by combining the switching activity and path sensitization abnormalities into a single side-channel signal that can be easily monitored by existing scan test structure. One main advantage of the proposed regional Trojan detector is that the current comparator threshold can be calibrated against the quiescent current noise floor to reduce the impacts of process variations. Experiments are performed on a Trojan-infected benchmark circuit to demonstrate the feasibility of the proposed technique.

21 citations

Journal ArticleDOI
TL;DR: A runtime hardware Trojan detection method which is geared toward detecting such advanced Trojans as well as guard a set of concerned signals, and initiate a hardware interrupt request when abnormal toggling events occur in these guarded signals.
Abstract: With the globalization of semiconductor industry, hardware security issues have been gaining increasing attention. Among all hardware security threats, the insertion of hardware Trojans is one of the main concerns. Meanwhile, many current Trojan detection solutions follow the assumption that the hardware Trojan itself should be composed of digital logic. This assumption is invalidated by recently proposed analog Trojans which are extremely small and can detect rare events. This paper proposes a runtime hardware Trojan detection method which is geared toward detecting such advanced Trojans. The principle of this method is to guard a set of concerned signals, and initiate a hardware interrupt request when abnormal toggling events occur in these guarded signals. To prove the effectiveness of this method, we design a processor based on ARMv7-A&R ISA, and insert an analog Trojan into the processor. We fabricated the design in an SMIC 130-nm process and demonstrate the effectiveness of the proposed methodology.

21 citations

Journal ArticleDOI
TL;DR: L latch-based structures as a self-reference detection technique which uses in-circuit path delays as golden reference models can achieve high accuracy in detection resolution by addressing process variation.
Abstract: Hardware Trojan detection has been the subject of many studies in the realm of hardware security in the recent years. The effectiveness of current techniques proposed for Trojan detection is limited by some factors, process variation noise being a major one. This paper introduces latch-based structures as a self-reference detection technique which uses in-circuit path delays as golden reference models. By addressing process variation, these structures can achieve high accuracy in detection resolution. The proposed method is a complementary approach to current side-channel techniques to cover their poor performance in detecting small Trojans. Simulation results show that this technique can detect small Trojans at the scale of only one logical gate with 90 percent probability on average.

21 citations


Network Information
Related Topics (5)
Cloud computing
156.4K papers, 1.9M citations
70% related
Cache
59.1K papers, 976.6K citations
70% related
Planet
27K papers, 980.6K citations
68% related
Compiler
26.3K papers, 578.5K citations
66% related
Key (cryptography)
60.1K papers, 659.3K citations
66% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023136
2022282
2021111
2020139
2019144
2018168