Dissertations / Theses on the topic 'Detection of Trojans'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 40 dissertations / theses for your research on the topic 'Detection of Trojans.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Raju, Akhilesh. "Trojan Detection in Hardware Designs." University of Cincinnati / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1504781162418081.
Full textDharmadhikari, Pranav Hemant. "Hardware Trojan Detection in Sequential Logic Designs." University of Cincinnati / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1543919236213844.
Full textBhamidipati, Harini. "SINGLE TROJAN INJECTION MODEL GENERATION AND DETECTION." Case Western Reserve University School of Graduate Studies / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=case1253543191.
Full textHoque, Tamzidul. "Ring Oscillator Based Hardware Trojan Detection." University of Toledo / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1430413190.
Full textBanga, Mainak. "Partition based Approaches for the Isolation and Detection of Embedded Trojans in ICs." Thesis, Virginia Tech, 2008. http://hdl.handle.net/10919/34924.
Full textThe inherent stealthy nature of Trojans makes it difficult to detect them at normal IC outputs. More so, with the restriction that one cannot visually inspect the internals of an IC after it has been manufactured. This obviates the use of side-channel signal(s) that acts like a signature of the IC as a means to assess its internal behavior under operational conditions.
In this work, we have selected power as the side-channel signal to characterize the internal
behavior of the ICs. We have used two circuit partitioning based approaches for isolating and
enhancing the behavioral difference between parts of a genuine IC and one with a sequence
detector Trojan in it. Experimental results reveal that these approaches are effective in
exposing anomalous behavior between the targeted ICs. This is reflected as difference in
power-profiles of the genuine and maligned ICs that is magnified above the process variation
ensuring that the discrepancies are observable.
Master of Science
Amsaad, Fathi Hassan Mohamed. "A Trusted and Efficient Security Approach for the Detection of Hardware Trojans and Authentication of FPGA-based Systems." University of Toledo / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1512494875469127.
Full textWeidler, Nathanael R. "Built-In Return-Oriented Programs in Embedded Systems and Deep Learning for Hardware Trojan Detection." DigitalCommons@USU, 2019. https://digitalcommons.usu.edu/etd/7620.
Full textHarris, Matthew Joshua. "Accelerating Reverse Engineering Image Processing Using FPGA." Wright State University / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=wright155535529307322.
Full textBowman, David C. "Image Stitching and Matching Tool in the Automated Iterative Reverse Engineer (AIRE) Integrated Circuit Analysis Suite." Wright State University / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=wright1533766175549951.
Full textHill, Jeremy Michael Olivar. "Detection of Avionics Supply Chain Non-control-flow Malware Using Binary Decompilation and Wavelet Analysis." University of Dayton / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1628159084278194.
Full textCaravut, Sinchai. "MULTIPLE LOGS ANALYSIS FOR DETECTING ZERO-DAY BACKDOOR TROJANS." Cleveland State University / OhioLINK, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=csu1210831685.
Full textLafrenz, Nicholas K. "Trojan Circuit Simulation and Evaluation." Cleveland, Ohio : Case Western Reserve University, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=case1265900150.
Full textDepartment of EECS - Computer Engineering Title from PDF (viewed on 2010-05-25) Includes abstract Includes bibliographical references and appendices Available online via the OhioLINK ETD Center
Du, Dongdong. "Hardware Trojan Detection Using Multiple-Parameter Side-Channel Analysis." Case Western Reserve University School of Graduate Studies / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=case1278702158.
Full textZareen, Farhath. "Detecting RTL Trojans Using Artificial Immune Systems and High Level Behavior Classification." Scholar Commons, 2019. https://scholarcommons.usf.edu/etd/7992.
Full textPenumetcha, Dinesh Varma. "Hardware Trojan Detection in Cryptography IP Cores by Library Encoding Method." Wright State University / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=wright1439326557.
Full textLenox, Joseph Daniel. "PARALLEL DELAY FAULT GRADING HEURISTIC AND TESTING APPROACHES TO TROJAN IC DETECTION." OpenSIUC, 2016. https://opensiuc.lib.siu.edu/dissertations/1315.
Full textStaub, Dillon. "Bio-Inspired Hardware Security Defenses: A CRISPR-Cas-Based Approach for Detecting Trojans in FPGA Systems." University of Cincinnati / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1563872470616901.
Full textBell, Christopher William. "A Multi-Parameter Functional Side Channel Analysis Method for Hardware Trojan Detection in Untrusted FPGA Bitstreams." Scholar Commons, 2013. http://scholarcommons.usf.edu/etd/4437.
Full textWang, Xinmu. "HARDWARE TROJAN ATTACKS: THREAT ANALYSIS AND LOW-COST COUNTERMEASURES THROUGH GOLDEN-FREE DETECTION AND SECURE DESIGN." Case Western Reserve University School of Graduate Studies / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=case1378489509.
Full textTheerthagiri, Dinesh. "Reversing Malware : A detection intelligence with in-depth security analysis." Thesis, Linköping University, Department of Electrical Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-52058.
Full textMore money nowadays moves online and it is very understandable that criminals want to make more money online aswell, because these days’ banks don’t have large sums of money in their cash box. Since there are many other internalrisks involved in robbing a bank, criminals have found many other ways to commit crimes and much lower risMore money nowadays moves online and it is very understandable that criminals want to make more money online as well, because these days’ banks don’t have large sums of money in their cash box. Since there are many other internal risks involved in robbing a bank, criminals have found many other ways to commit crimes and much lower risk in online crime. The first level of change involved was email-based phishing, but later circumstances changed again.
Authentication methods and security of online bank has been improved over the period. This will drastically reduce effects of phishing based on emails and fraudulent website. The next level of online bank fraud is called banking Trojans. These Trojans infect the online customers of banks. These Trojans monitors customer’s activities and uses their authenticated session to steal customers’ money.
A lot of money is made by these kinds of attacks. Comparatively few perpetrators have been caught, and the problem is getting worse day by day. To have a better understanding of this problem, I have selected a recent malware sample named as SilentBanker. It had the capability of attacking more than 400 banks. This thesis presents the problem in general and includes my results in studying the behaviour of the SilentBanker Trojan.
Vissamsetty, Kanchan. "Hardware Security and Side Channel Power Analysis for 16X16 Booth Multiplier in 65nm CMOS Technology." Wright State University / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=wright1630106063345183.
Full textDesai, Avinash R. "Anti-Counterfeit and Anti-Tamper Hardware Implementation using Hardware Obfuscation." Thesis, Virginia Tech, 2013. http://hdl.handle.net/10919/23756.
Full textMaster of Science
Loperfido, Francesco. "Progettazione e implementazione di un sistema dinamico per la gestione del packet filtering." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2010. http://amslaurea.unibo.it/2668/.
Full textMakarov, Vadim. "Quantum cryptography and quantum cryptanalysis." Doctoral thesis, Norwegian University of Science and Technology, Faculty of Information Technology, Mathematics and Electrical Engineering, 2007. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-1473.
Full textThis doctoral thesis summarizes research in quantum cryptography done at the Department of Electronics and Telecommunications at the Norwegian University of Science and Technology (NTNU) from 1998 through 2007.
The opening parts contain a brief introduction into quantum cryptography as well as an overview of all existing single photon detection techniques for visible and near infrared light. Then, our implementation of a fiber optic quantum key distribution (QKD) system is described. We employ a one-way phase coding scheme with a 1310 nm attenuated laser source and a polarization-maintaining Mach-Zehnder interferometer. A feature of our scheme is that it tracks phase drift in the interferometer at the single photon level instead of employing hardware phase control measures. An optimal phase tracking algorithm has been developed, implemented and tested. Phase tracking accuracy of +-10 degrees is achieved when approximately 200 photon counts are collected in each cycle of adjustment. Another feature of our QKD system is that it uses a single photon detector based on a germanium avalanche photodiode gated at 20 MHz. To make possible this relatively high gating rate, we have developed, implemented and tested an afterpulse blocking technique, when a number of gating pulses is blocked after each registered avalanche. This technique allows to increase the key generation rate nearly proportionally to the increase of the gating rate. QKD has been demonstrated in the laboratory setting with only a very limited success: by the time of the thesis completion we had malfunctioning components in the setup, and the quantum bit error rate remained unstable with its lowest registered value of about 4%.
More than half of the thesis is devoted to various security aspects of QKD. We have studied several attacks that exploit component imperfections and loopholes in optical schemes. In a large pulse attack, settings of modulators inside Alice's and Bob's setups are read out by external interrogating light pulses, without interacting with quantum states and without raising security alarms. An external measurement of phase shift at Alice's phase modulator in our setup has been demonstrated experimentally. In a faked states attack, Eve intercepts Alice's qubits and then utilizes various optical imperfections in Bob's scheme to construct and resend light pulses in such a way that Bob does not distinguish his detection results from normal, whereas they give Bob the basis and bit value chosen at Eve's discretion. Construction of such faked states using several different imperfections is discussed. Also, we sketch a practical workflow of breaking into a running quantum cryptolink for the two abovementioned classes of attacks. A special attention is paid to a common imperfection when sensitivity of Bob's two detectors relative to one another can be controlled by Eve via an external parameter, for example via the timing of the incoming pulse. This imperfection is illustrated by measurements on two different single photon detectors. Quantitative results for a faked states attack on the Bennett-Brassard 1984 (BB84) and the Scarani-Acin-Ribordy-Gisin 2004 (SARG04) protocols using this imperfection are obtained. It is shown how faked states can in principle be constructed for quantum cryptosystems that use a phase-time encoding, the differential phase shift keying (DPSK) and the Ekert protocols. Furthermore we have attempted to integrate this imperfection of detectors into the general security proof for the BB84 protocol. For all attacks, their applicability to and implications for various known QKD schemes are considered, and countermeasures against the attacks are proposed.
The thesis incorporates published papers [J. Mod. Opt. 48, 2023 (2001)], [Appl. Opt. 43, 4385 (2004)], [J. Mod. Opt. 52, 691 (2005)], [Phys. Rev. A 74, 022313 (2006)], and [quant-ph/0702262].
Chang, Yuan-Heng, and 張源亨. "A Study on Sequential Hardware Trojans Detection." Thesis, 2019. http://ndltd.ncl.edu.tw/cgi-bin/gs32/gsweb.cgi/login?o=dnclcdr&s=id=%22107NCHU5394019%22.&searchmode=basic.
Full text國立中興大學
資訊科學與工程學系所
107
In recent years, manufacturers and governments have studied the possibility of Hardware Trojan insertions to tamper original circuit among the supply chain of integrated circuits. Hardware Trojans lead to incorrect functionality of circuits and leakage of important information. Most of the Hardware Trojan detections are based on observation of unexpected output signals for circuit and side channel analysis which detects the abnormal signals of side channels. Thus, the time for an activation of a Hardware Trojan is a significant issue for Hardware Trojan detectors. In this thesis, we propose an automatic method to accelerate the Hardware Trojan detection. In the proposed method, logic gates are inserted into proper locations of a circuit with corresponding control signals. Therefore, the probabilities of signal transitions are increased so that they are higher than given threshold, which improves the detectability of both combinational and sequential Hardware Trojans. Experimental results show that the proposed method increases the activity of Hardware Trojans and reduces the required time for Hardware Trojan activations while the hardware overhead is low.
Wei, Jhih-Yu, and 魏志育. "A Study on Hardware Trojans and Detection." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/20216554988524760505.
Full textHuang, Shih-Heng, and 黃仕亨. "A Study on Detection Method for Hardware Trojans." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/03733452554825707764.
Full text國立中興大學
資訊科學與工程學系
104
Hardware Trojans become a security threat to the integrated circuit supply chain. Known Trojan detection methods try to activate Trojans so as to observe either erroneous output responses or abnormal side-channel signals. Detecting hardware Trojans is very difficult as such circuits are stealthy in nature and triggered only under rare conditions. Traditional ATPG patterns are not useful for Trojan activation, and in general random patterns have to be applied for Trojan detection. In this paper we will first analyze how combinational rare conditions can be constructed in a systemic way, so that a Trojan circuit with a desired triggering probability can be synthesized accordingly. A watch list of Trojan candidates can be constructed according to the analysis. A set of test cubes can be generated from the candidates, and experimental results that the number of test cubes is restricted in most cases. The number of test vectors can be further reduced when physical layout information is taken into account. In addition, we can augment the test cubes with random assignment of X-bits to deal with addition trigger signals other than the target events. The results of this study should be helpful to the development of Trojan detection methods
Hsu, Kuo-Yang, and 許國揚. "A Study on Hardware Trojans Construction and Detection Based on Layout Information." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/v6t9ru.
Full text國立中興大學
資訊科學與工程學系
106
In recent years, the semiconductor industry and the government agencies on national security and defense are starting to pay attention to hardware security issues, including the idea of inserting malicious logic gates into integrated circuit, which we call hardware Trojans. Since hardware Trojans are stealthy in nature and triggered only under rare conditions, which make them hard to detect. Traditional Trojan activation methods rely on applying random patterns to trigger Trojan circuit; unfortunately, this approach is not efficient in general. In this paper, we discuss how to construct combinational Trojans efficiently. A set of candidate trigger signals is obtained first, and then dependency among those signals is analyzed so that efficient trigger conditions can be constructed. Since many trigger conditions are not valid when layout constraints are taken into account, we propose a layout-aware approach for Trojan construction and activation vector generation. According to the experimental results, the number of activation vectors is significantly reduced with the help of layout information. The results of this study should be helpful to the development of Trojan detection methods.
Moein, Samer. "Systematic Analysis and Methodologies for Hardware Security." Thesis, 2015. http://hdl.handle.net/1828/6954.
Full textGraduate
0544
0984
samerm@uvic.ca
Lo, Sheng-Feng, and 羅晟峯. "Trojan virus detection on Windows 7 by using host-based intrusion detection." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/20818620553254179697.
Full text健行科技大學
資訊工程系碩士班
102
Windows 7 is one of the most popular operating system, because of its popularity often become the target of attacks, and Trojan virus is one of them. Trojans hope to be able to hide itself and boot automatically execute reached keyloggers to steal data, control, and so behavior. Therefore, our study presents a method to detect viruses, boot registry keys will be automatically executed and the program has a function to remove registry keys are classified into two rules. These two rules will be to determine whether the main basis for the Trojans, and use host-based intrusion detection system for detection is based on these two rules will be changed in the registry keys to record and count the results. Finally, the statistical results of normal programs and Trojan viruses to compare and analyze changes to registry key behavior. Statistics from the experimental results that the majority of the Trojan virus will tamper with the boot registry keys automatically. In this study, 94% of detection rate, and the false alarm rate of 6%.
Pai, Fu-Wei, and 白馥瑋. "A Workbench for Hybrid Gate-Level Hardware Trojan Detection." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/sne75f.
Full text國立中山大學
資訊工程學系研究所
107
Nowadays, a SoC chip has complex functions and huge circuits. Therefore, designers usually integrate several 3rd IPs and their own design IP into system chips to accelerate overall system development time. However, it is impossible to determine whether there is any hidden Hardware Trojans inserted in 3rd IP during the design or manufacturing stage. The hidden Hardware Trojans may leak inner information or reduce the overall system performance. Therefore, it is necessary to verify hardware logic gate level netlists. Hardware Trojan detection methods can be divided into two types. The first method is to detect rare trigger circuits. In this circuit design, the hardware Trojan netlist is triggered at a specific time. And most of the execution time will be the implementation of the original circuit it is difficult to be explored by the user. The second method is analyzed the gate level netlists. If there are some pre-defined Trojan features found in one of the gate level netlist’s nets. This net would be treated as a Trojan horse circuit. Therefore, this thesis proposes a comprehensive hardware Trojan detection platform. There are two methods for the user to detect whether there is a hardware Trojan in the hardware Gate-level code. The first method detects rare trigger circuit, which requires the user to provide a testbench to observe whether there is a circuit that is rarely triggered during the execution of the circuit. Circuits that are not detected by testbench may be Trojan. The second method is to directly analyze the gate level netlist. Define the possible Trojan characteristics in advance and look for a net like the Trojan features. Guiding designers to focus on high-probability Trojan features. After that, we will select eighteen of the hardware Trojan benchmarks for experiment and will further insert the Trojan horse into the common open-source circuit to test the accuracy of its own platform.
Houghton, Nicholas. "Automated trojan detection and analysis in field programmable gate arraysa." Thesis, 2016. http://hdl.handle.net/1828/7673.
Full textGraduate
0537
0544
0984
nhoughto@uvic.ca
Chang, Tin-Wei, and 張庭瑋. "An Efficient Trojan Circuit Detection Method by Using Path Tracking Algorithm." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/57758988732662816556.
Full text國立中興大學
資訊科學與工程學系所
100
Due to globalization of the semiconductor design and fabrication process in recent years, integrated circuits become vulnerable to malicious alterations and detection capabilities of malicious behavior become weaker. For example, malicious circuits implantation in the circuit will cause the circuit function change or leakage the key messages, and this malicious circuit are referred to “Hardware Trojan” . In this work, we use the ring oscillator to increase the testability of the circuit. In the circuit, we partition the circuit to many blocks and combine the ring oscillator into blocks, then use ring oscillator’s characteristics to detect malicious circuits to achieve the Hardware Trojan detection. In order to optimize circuit partitioning block, it is essential important to allocate the wires appropriately. We propose a path tracing algorithm that can achieve average allocation of wires and high coverage with high testability on detection
Zhou, Boyou. "A multi-layer approach to designing secure systems: from circuit to software." Thesis, 2019. https://hdl.handle.net/2144/36149.
Full textTsai, Pei-Wen, and 蔡佩彣. "Using code signing in the detection of malware – A Trojan horse case study." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/40557602528150744568.
Full text華梵大學
資訊管理學系碩士班
99
Anti-virus software is major for the computer of malware defense mechanism, its operation based on Signature-based to detect malware. However, it needs some time to product of virus pattern, publish batch and update the computer. It makes the Anti-virus software latency a period, and the user's computer will suffer the threat of malware attack. So we solve anti-virus software’s window period, resulting malware intrusion’s problem. We use malware intrusion and behavioral module, analysis and analysis tool, and use Code Signing to verify PE’s integrity. This conduct detect the computer have malware to intrusion or not. That could assist anti-virus software to protect the computer. The subject of the study will be based Trojan for Windows operating system environment, system and network monitoring program of activities. Reduce the system security of the Anti-virus latency risk. This case study was to install AntiVir in Windows operating system environment. The result above methods has proved that this method can assist anti-virus software, reducing the Anti-virus latency risk.
Pan, Ming. "Research on detecting mechanism for Trojan horse based on PE file." Thèse, 2009. http://constellation.uqac.ca/138/1/030120792.pdf.
Full textChen, Jian-You, and 陳建佑. "Using Path Features for Hardware Trojan Detection and Localization Based on Machine Learning Techniques." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/ep24r5.
Full text國立交通大學
資訊科學與工程研究所
107
In this work, we proposed a hardware trojan detection method by using path features and machine learning techniques to localize the trojan gates of the untrusted circuits. First of all, we extract the \textit{path features} which are highly relative to the malicious trojan circuit. In order to reduce the complexity of path counts in the training set of data and the classification/validation set of data, we use \textit{path filter} to filter out the paths which are very unlikely to be the trojan paths. For our machine learning models, we use the random forest (RF) and support vector machine (SVM) as our path classifiers. Due to the promising result of trojan path classification, we score the \textit{suspected trojan gates} which are on the \textit{suspected trojan paths} identified by the path classifier. Finally, we rank the suspected trojan gates in decreasing order of score, and show how suspicious a gate is in terms of being a trojan gate. On average, we obtain 94.57\% true positive rate (TPR) and 98.54\% true negative rate (TNR) of the \textit{trojan gate localization} of all trojan circuits.
Cheng, Jung-Pei, and 鄭容沛. "Android SMS Trojan Malware Detection Using User Intent Leak Tracing and Frequent Episode Rule Mining." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/ynu2z5.
Full text國立臺灣科技大學
資訊工程系
102
Due to the development of smartphones, the number of Android-based applications expands quite rapid, which offers people the convenience of mobile communications. Short message service (SMS) is basic communication component and one of the most frequently used services in the mobile phones so malware can send message to subscribe premium service without the user's awareness so as to cause financial charges. This study proposes the user intent leak tracing and frequent episode rule mining to provide a static analysis for detecting the Android SMS Trojan malware. User intent leak would indicate that sensitive function call be performed without the user’s awareness and can be traced in API Call usage to produce the event sequences. These event sequences, then, can be used in frequent episode rule mining to find out the frequent episode patterns, also called frequent attack episode patterns. Moreover, this paper leverages the proposed mechanism to develop a system, named SMSDroidCare. First, API Call usage information can be extracted from SMS Trojan malwares or begin apps using reverse engineering tool. And then, the user intent leak flow that occurs in API Call usage can be traced to produce the event sequences as well as event type has pre-defined according to how android SMS premium-rate fraud works. Next, frequent episode rules are mined from the event sequences, which identifies meaningful attack rule patterns. Finally, these rule patterns is be used to determine whether the application is malicious or not and detect malicious SMS premium-rate fraud behavior. In the experiments, we demonstrate that SMS Trojan malwares can be detected by considering user intent leak. In addition, our proposed method can improve detecting rate of the SMS Trojan malwares.
"Detecting Unauthorized Activity in Lightweight IoT Devices." Doctoral diss., 2020. http://hdl.handle.net/2286/R.I.62744.
Full textDissertation/Thesis
Doctoral Dissertation Electrical Engineering 2020
(9034049), Miguel Villarreal-Vasquez. "Anomaly Detection and Security Deep Learning Methods Under Adversarial Situation." Thesis, 2020.
Find full textAdvances in Artificial Intelligence (AI), or more precisely on Neural Networks (NNs), and fast processing technologies (e.g. Graphic Processing Units or GPUs) in recent years have positioned NNs as one of the main machine learning algorithms used to solved a diversity of problems in both academia and the industry. While they have been proved to be effective in solving many tasks, the lack of security guarantees and understanding of their internal processing disrupts their wide adoption in general and cybersecurity-related applications. In this dissertation, we present the findings of a comprehensive study aimed to enable the absorption of state-of-the-art NN algorithms in the development of enterprise solutions. Specifically, this dissertation focuses on (1) the development of defensive mechanisms to protect NNs against adversarial attacks and (2) application of NN models for anomaly detection in enterprise networks.
In this state of affairs, this work makes the following contributions. First, we performed a thorough study of the different adversarial attacks against NNs. We concentrate on the attacks referred to as trojan attacks and introduce a novel model hardening method that removes any trojan (i.e. misbehavior) inserted to the NN models at training time. We carefully evaluate our method and establish the correct metrics to test the efficiency of defensive methods against these types of attacks: (1) accuracy with benign data, (2) attack success rate, and (3) accuracy with adversarial data. Prior work evaluates their solutions using the first two metrics only, which do not suffice to guarantee robustness against untargeted attacks. Our method is compared with the state-of-the-art. The obtained results show our method outperforms it. Second, we proposed a novel approach to detect anomalies using LSTM-based models. Our method analyzes at runtime the event sequences generated by the Endpoint Detection and Response (EDR) system of a renowned security company running and efficiently detects uncommon patterns. The new detecting method is compared with the EDR system. The results show that our method achieves a higher detection rate. Finally, we present a Moving Target Defense technique that smartly reacts upon the detection of anomalies so as to also mitigate the detected attacks. The technique efficiently replaces the entire stack of virtual nodes, making ongoing attacks in the system ineffective.