Academic literature on the topic 'Trojans'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Trojans.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Trojans"

1

Kakkara, Varsha, Karthi Balasubramanian, B. Yamuna, Deepak Mishra, Karthikeyan Lingasubramanian, and Senthil Murugan. "A Viterbi decoder and its hardware Trojan models: an FPGA-based implementation study." PeerJ Computer Science 6 (March 2, 2020): e250. http://dx.doi.org/10.7717/peerj-cs.250.

Full text
Abstract:
Integrated circuits may be vulnerable to hardware Trojan attacks during its design or fabrication phases. This article is a case study of the design of a Viterbi decoder and the effect of hardware Trojans on a coded communication system employing the Viterbi decoder. Design of a Viterbi decoder and possible hardware Trojan models for the same are proposed. An FPGA-based implementation of the decoder and the associated Trojan circuits have been discussed. The noise-added encoded input data stream is stored in the block RAM of the FPGA and the decoded data stream is monitored on the PC through an universal asynchronous receiver transmitter interface. The implementation results show that there is barely any change in the LUTs used (0.5%) and power dissipation (3%) due to the insertion of the proposed Trojan circuits, thus establishing the surreptitious nature of the Trojan. In spite of the fact that the Trojans cause negligible changes in the circuit parameters, there are significant changes in the bit error rate (BER) due to the presence of Trojans. In the absence of Trojans, BER drops down to zero for signal to noise rations (SNRs) higher than 6 dB, but with the presence of Trojans, BER doesn’t reduce to zero even at a very high SNRs. This is true even with the Trojan being activated only once during the entire duration of the transmission.
APA, Harvard, Vancouver, ISO, and other styles
2

Hazra, Suvadip, and Mamata Dalui. "CA-Based Detection of Coherence Exploiting Hardware Trojans." Journal of Circuits, Systems and Computers 29, no. 08 (October 18, 2019): 2050120. http://dx.doi.org/10.1142/s0218126620501200.

Full text
Abstract:
Nowadays, Hardware Trojan threats have become inevitable due to the growing complexities of Integrated Circuits (ICs) as well as the current trend of Intellectual Property (IP)-based hardware designs. An adversary can insert a Hardware Trojan during any of its life cycle phases — the design, fabrication or even at manufacturing phase. Once a Trojan is inserted into a system, it can cause an unwanted modification to system functionality which may degrade system performance or sometimes Trojans are implanted with the target to leak secret information. Once Trojans are implanted, they are hard to detect and impossible to remove from the system as they are already fabricated into the chip. In this paper, we propose three stealthy Trojan models which affect the coherence mechanism of Chip Multiprocessors’ (CMPs) cache system by arbitrarily modifying the cache block state which in turn may leave the cache line states as incoherent. We have evaluated the payload of such modeled Trojans and proposed a cellular automaton (CA)-based solution for detection of such Trojans.
APA, Harvard, Vancouver, ISO, and other styles
3

Pirani, Simona, Anders Johansen, and Alexander J. Mustill. "On the inclinations of the Jupiter Trojans." Astronomy & Astrophysics 631 (October 25, 2019): A89. http://dx.doi.org/10.1051/0004-6361/201936600.

Full text
Abstract:
Jupiter Trojans are a resonant asteroidal population characterised by photometric colours that are compatible with trans-Neptunian objects, high inclinations, and an asymmetric distribution of the number of asteroids between the two swarms. Different models have been proposed to explain the high inclination of the Trojans and to interpret their relation with the Trans-Neptunian objects, but none of these models can also satisfactorily explain the asymmetry ratio between the number of asteroids in the two swarms. It has recently been found that the asymmetry ratio can arise if Jupiter has migrated inwards through the protoplanetary disc by at least a few astronomical units during its growth. The more numerous population of the leading swarm and the dark photometric colours of the Trojans are natural outcomes of this new model, but simulations with massless unperturbed disc particles led to a flat distribution of the Trojan inclinations and a final total mass of the Trojans that was 3–4 orders of magnitude larger than the current mass. We here investigate the possible origin of the peculiar inclination distribution of the Trojans in the scenario where Jupiter migrates inwards. We analyse different possibilities: (a) the secular evolution of an initially flat Trojan population, (b) the presence of planetary embryos among the Trojans, and (c) capture of the Trojans from a pre-stirred planetesimal population in which Jupiter grows and migrates. We find that the secular evolution of the Trojans and secular perturbations from Saturn do not affect the inclination distribution of the Trojans appreciably, nor is there any significant mass depletion over the age of the Solar System. Embryos embedded in the Trojan swarms, in contrast, can stir the Trojans to their current degree of excitation and can also deplete the swarms efficiently, but it is very difficult to remove all of the massive bodies in 4.5 Gyr of evolution. We propose that the disc where Jupiter’s core was forming was already stirred to high inclination values by other planetary embryos competing in the feeding zone of Jupiter’s core. We show that the trapped Trojans preserve their high inclination through the gas phase of the protoplanetary disc and that Saturn’s perturbations are more effective on highly inclined Trojans, leading to a lower capture efficiency and to a substantial depletion of the swarms during 4.5 Gyr of evolution.
APA, Harvard, Vancouver, ISO, and other styles
4

Li, Dejian, Qizhi Zhang, Dongyan Zhao, Lei Li, Jiaji He, Yidong Yuan, and Yiqiang Zhao. "Hardware Trojan Detection Using Effective Property-Checking Method." Electronics 11, no. 17 (August 24, 2022): 2649. http://dx.doi.org/10.3390/electronics11172649.

Full text
Abstract:
Hardware Trojans refer to additional logic maliciously implanted by attackers in integrated circuits (ICs). Because of the potential security threat of hardware Trojans, they have attracted extensive attention to security issues. As a formal verification method, property checking has been proved to be a powerful solution for hardware Trojan detection. However, existing property-checking methods are limited by the unity of security properties and the model explosion problem of formal models. The limitations above hinder the practical applications of these methods. To alleviate these challenges, we propose an effective property-checking method for hardware Trojan detection. Specifically, we establish the formal model based on the principle of finite state machine (FSM), and the method can alleviate the model explosion problem. For property writing, we extract the core behavior characteristics of hardware Trojans and then generate properties for the verification of certain types of hardware Trojans. Experimental results demonstrate that our approach is applicable to detect information leakage and denial of service (DoS) hardware Trojans by verifying security properties.
APA, Harvard, Vancouver, ISO, and other styles
5

Zhao, Meng Meng, and Lian Hai Wang. "Research on Trojan Detection Method of Computer Memory Mirroring." Applied Mechanics and Materials 701-702 (December 2014): 1013–17. http://dx.doi.org/10.4028/www.scientific.net/amm.701-702.1013.

Full text
Abstract:
Trojan detection plays an important role in the discovery and treatment of Trojans. Acquisition and analysis of memory mirroring is a new research topic of computer live forensics. Computer forensics often need Trojan detection to determine whether target machine has been controlled. This paper proposed a Trojan detection method based on computer live forensics. Construct probabilistic fuzzy cognitive map(PFCM) through analysis of memory mirroring, use memory mirroring Trojan detection algorithm, calculate the probability of the existence of Trojan. The results showed that this method can effectively determine whether there were Trojan in memory mirroring. Detect Trojans through the analysis of various aspects of memory and numerical computation, proposed method improve the accuracy and reliability of Trojan detection.
APA, Harvard, Vancouver, ISO, and other styles
6

Napier, Kevin J., Larissa Markwardt, Fred C. Adams, David W. Gerdes, and Hsing Wen Lin. "A Collision Mechanism for the Removal of Earth's Trojan Asteroids." Planetary Science Journal 3, no. 5 (May 1, 2022): 121. http://dx.doi.org/10.3847/psj/ac6958.

Full text
Abstract:
Abstract Due to their strong resonances with their host planet, Trojan asteroids can remain in stable orbits for billions of years. As a result, they are powerful probes for constraining the dynamical and chemical history of the solar system. Although we have detected thousands of Jupiter Trojans and dozens of Neptune Trojans, there are currently no known long-term stable Earth Trojans (ETs). Dynamical simulations show that the parameter space for stable ETs is substantial, so their apparent absence poses a mystery. This work uses a large ensemble of N-body simulations to explore how the Trojan population dynamically responds if Earth suffers large collisions, such as those thought to have occurred to form the Moon and/or to have given Earth its late veneer. We show that such collisions can be highly disruptive to the primordial Trojan population, and could have eliminated it altogether. More specifically, if Earth acquired the final 1% of its mass through  ( 10 ) collisions, then only ∼1% of the previously bound Trojan population would remain.
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Lian Hai, and Qiu Liang Xu. "An APT Trojan Detection Method Based on Memory Forensics Techniques." Applied Mechanics and Materials 701-702 (December 2014): 927–34. http://dx.doi.org/10.4028/www.scientific.net/amm.701-702.927.

Full text
Abstract:
Advanced Persistent Threat (APT) is currently reported to be one of the most serious threats. It is very important to detect the APT Trojan as early as possible. There are three types of approaches to conduct APT detection: network traffic analysis, change controlling and sandboxing. Unfortunately, all these approaches have limitations in detecting unknown APT Trojans. This paper proposes a novel APT Trojan detection method by utilizing memory forensics techniques. The proposed method first acquires the raw physical memory image from a target running system and then finds the APT’s traces in the memory image based on the ATP’s characteristics and memory forensics techniques. If enough traces are found, we can judge that there must be Trojans in the target system. Experimental results show that the proposed method can effectively detect new APT Trojans.
APA, Harvard, Vancouver, ISO, and other styles
8

Yoshikawa, Masaya, Yusuke Mori, and Takeshi Kumaki. "Implementation Aware Hardware Trojan Trigger." Advanced Materials Research 933 (May 2014): 482–86. http://dx.doi.org/10.4028/www.scientific.net/amr.933.482.

Full text
Abstract:
Recently, the threat of hardware Trojans has garnered attention. Hardware Trojans are malicious circuits that are incorporated into large-scale integrations (LSIs) during the manufacturing process. When predetermined conditions specified by an attacker are satisfied, the hardware Trojan is triggered and performs subversive activities without the LSI users even being aware of these activities. In previous studies, a hardware Trojan was incorporated into a cryptographic circuit to estimate confidential information. However, Trojan triggers have seldom been studied. The present study develops several new Trojan triggers and each of them is embedded in a field-programmable gate array (FPGA). Subsequently, the ease of detection of each trigger is verified from the standpoint of area.
APA, Harvard, Vancouver, ISO, and other styles
9

Prathivi, Rastri, and Vensy Vydia. "ANALISA PENDETEKSIAN WORM dan TROJAN PADA JARINGAN INTERNET UNIVERSITAS SEMARANG MENGGUNAKAN METODE KALSIFIKASI PADA DATA MINING C45 dan BAYESIAN NETWORK." Jurnal Transformatika 14, no. 2 (January 30, 2017): 77. http://dx.doi.org/10.26623/transformatika.v14i2.440.

Full text
Abstract:
<p>Worm attacks become a dangerous threat and cause damage in the Internet network. If the Internet network worms and trojan attacks the very disruption of traffic data as well as create bandwidth capacity has increased and wasted making the Internet connection is slow. Detecting worms and trojan on the Internet network, especially new variants of worms and trojans and worms and trojans hidden is still a challenging problem. Worm and trojan attacks generally occur in computer networks or the Internet which has a low level of security and vulnerable to infection. The detection and analysis of the worm and trojan attacks in the Internet network can be done by looking at the anomalies in Internet traffic and internet protocol addresses are accessed.<br />This research used experimental research applying C4.5 and Bayesian Network methods to accurately classify anomalies in network traffic internet. Analysis of classification is applied to an internet address, internet protocol and internet bandwidth that allegedly attacked and trojan worm attacks.<br />The results of this research is a result of analysis and classification of internet addresses, internet protocol and internet bandwidth to get the attack worms and trojans.</p>
APA, Harvard, Vancouver, ISO, and other styles
10

Rooney, Catherine, Amar Seeam, and Xavier Bellekens. "Creation and Detection of Hardware Trojans Using Non-Invasive Off-The-Shelf Technologies." Electronics 7, no. 7 (July 22, 2018): 124. http://dx.doi.org/10.3390/electronics7070124.

Full text
Abstract:
As a result of the globalisation of the semiconductor design and fabrication processes, integrated circuits are becoming increasingly vulnerable to malicious attacks. The most concerning threats are hardware trojans. A hardware trojan is a malicious inclusion or alteration to the existing design of an integrated circuit, with the possible effects ranging from leakage of sensitive information to the complete destruction of the integrated circuit itself. While the majority of existing detection schemes focus on test-time, they all require expensive methodologies to detect hardware trojans. Off-the-shelf approaches have often been overlooked due to limited hardware resources and detection accuracy. With the advances in technologies and the democratisation of open-source hardware, however, these tools enable the detection of hardware trojans at reduced costs during or after production. In this manuscript, a hardware trojan is created and emulated on a consumer FPGA board. The experiments to detect the trojan in a dormant and active state are made using off-the-shelf technologies taking advantage of different techniques such as Power Analysis Reports, Side Channel Analysis and Thermal Measurements. Furthermore, multiple attempts to detect the trojan are demonstrated and benchmarked. Our simulations result in a state-of-the-art methodology to accurately detect the trojan in both dormant and active states using off-the-shelf hardware.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Trojans"

1

Karlsson, Ola. "A Study of Jupiter Trojans." Doctoral thesis, Uppsala universitet, Institutionen för fysik och astronomi, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-172151.

Full text
Abstract:
Jupiter Trojan asteroid dynamics have been studied for a long time but it is only within the last decades that the known population has become large enough to make other studies meaningful. In four articles I have been scratching the surface of the unknown Trojan knowledge space. Paper I presents photometric observations confirming a larger variety in surface redness for the smaller Trojans compared to the larger ones, in line with the groups in the outer main asteroid belt. However, the largest Trojans are significantly redder compared to the largest Cybele and Hilda asteroids. Paper II is an investigation of the Trojan discovery completeness. The analysis shows that all Trojans down to a limiting absolute magnitude of H=11.5 mag have been discovered. Missing Trojans in the almost discovery-completed section should have inclinations above the mean of the same group. The faintest Trojans are discovery biased due to orbit orientations similar to the Milky Way. Paper III is a general review of dynamical and physical properties of the discovery-completed sample of Jupiter Trojans found in Paper II. The two Trojan swarms are often treated as being equal, but are different in a number of details. Two known facts are that the L5 swarm is less rich, while the L4 swarm has a larger fraction of low inclination Trojans. Trojans are in general red objects but the mean redness is higher for Trojans which have not collided compared to Trojans in families. Paper IIII is an investigation of Trojan collisions, family detection and evolution. Collision circumstances were mapped using numerical simulations and recorded Trojan close approaches. Synthetic families were created and evolved numerically. The result suggests that the HCM family detection technique can find Trojan families even in a densely populated parameter space. However, interlopers cannot be avoided at any level but their contribution should be less than 30%. Synthetic families can be identified with backwards orbital integrations for times up to a Gyr-scale. However, there are discrepancies between real Trojan families and my synthetic families.
APA, Harvard, Vancouver, ISO, and other styles
2

Raju, Akhilesh. "Trojan Detection in Hardware Designs." University of Cincinnati / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1504781162418081.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Dharmadhikari, Pranav Hemant. "Hardware Trojan Detection in Sequential Logic Designs." University of Cincinnati / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1543919236213844.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Caravut, Sinchai. "MULTIPLE LOGS ANALYSIS FOR DETECTING ZERO-DAY BACKDOOR TROJANS." Cleveland State University / OhioLINK, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=csu1210831685.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Collins, Zachary. "Hardware Trojans in FPGA Device IP: Solutions Through Evolutionary Computation." University of Cincinnati / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1554217182155068.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Almeida, Álvaro José Caseiro de. "Study of the possible collisions between Plutinos and Neptune trojans." Master's thesis, Universidade de Aveiro, 2008. http://hdl.handle.net/10773/2607.

Full text
Abstract:
Mestrado em Física
As propriedades físicas e dinâmicas dos asteróides oferecem uma das poucas limitações na formação, evolução e migração dos planetas gigantes. Os asteróides Troianos partilham o semi-eixo maior da órbita do planeta, mas seguem-no cerca de 60º à frente e atrás, próximo dos dois pontos triangulares de equilíbrio gravitacional de Lagrange (Sheppard & Trujillo (2006)). Na chamada Cintura de Edgeworth-Kuiper (EKB), encontra-se um grupo de asteróides denominados de Plutinos e que pertencem ao grupo dos designados objectos Trans-Neptunianos (TNOs). Estes partilham uma ressonância de movimento médio 3/2 com Neptuno, e alguns deles (como Plutão) chegam mesmo a cruzar a órbita deste planeta. Como objectivo principal deste trabalho, iremos estudar a possibilidade destes dois grupos de asteróides poderem vir a colidir entre si, o que poderia levar a uma mistura entre os dois tipos e ajudar a explicar as cores que ambos apresentam. ABSTRACT: The dynamical and physical properties of asteroids offer one of the few constraints on the formation, evolution, and migration of the giant planets. Trojan asteroids share a planet’s semi-major axis but lead or follow it by about 60º near the two triangular Lagrangian points of gravitational equilibrium (Sheppard & Trujillo (2006)). In the so-called Edgeworth-Kuiper Belt (EKB), there’s a group of asteroids called Plutinos which belong to the group of the designated Trans-Neptunian objects (TNOs). These TNOs share a mean motion resonance of 3/2 with Neptune, and some of them (like Pluto) even cross the orbit of this planet. As the main subject of this work, we will study the possibility that these two groups of asteroids could collide with each other, which could lead to a mixing between the two (types) and help to explain the colors that both present.
APA, Harvard, Vancouver, ISO, and other styles
7

Bruzzeguez, Gustavo Andrade. "Estudo sobre hardware trojans e suas ameaças à Administração Pública Federal." reponame:Repositório Institucional da UnB, 2017. http://repositorio.unb.br/handle/10482/32352.

Full text
Abstract:
Dissertação (mestrado)—Universidade de Brasília, Instituto de Ciências Exatas, Departamento de Ciência da Computação, 2017.
Submitted by Raquel Viana (raquelviana@bce.unb.br) on 2018-07-23T16:36:11Z No. of bitstreams: 1 2017_GustavoAndradeBruzzeguez.pdf: 2394160 bytes, checksum: c28f3f1d732b548a557f1a9cc46f87d8 (MD5)
Approved for entry into archive by Raquel Viana (raquelviana@bce.unb.br) on 2018-07-24T19:35:27Z (GMT) No. of bitstreams: 1 2017_GustavoAndradeBruzzeguez.pdf: 2394160 bytes, checksum: c28f3f1d732b548a557f1a9cc46f87d8 (MD5)
Made available in DSpace on 2018-07-24T19:35:27Z (GMT). No. of bitstreams: 1 2017_GustavoAndradeBruzzeguez.pdf: 2394160 bytes, checksum: c28f3f1d732b548a557f1a9cc46f87d8 (MD5) Previous issue date: 2018-07-23
Nos últimos anos, pesquisadores vêm demonstrando a possibilidade de implementação de códigos maliciosos em circuitos integrados durante a fabricação destes dispositivos. A ameaça, que ficou conhecida como hardware trojan, vem atraindo a atenção dos governos e da indústria, dado que potencialmente envolve questões de espionagem e guerra cibernética. Diversos estudos vem sendo desenvolvidos na comunidade acadêmica mundial, em particular nos últimos 5 anos, conforme se constatou no levantamento bibliográfico com uso do enfoque meta-analítico. Não obstante, no Brasil, pouco se tem falado sobre o tema. Recentemente, o Gabinete de Segurança Institucional da Presidência da República publicou a Estratégia de Segurança da Informação e Comunicações e de Segurança Cibernética da Administração Pública Federal 2015-2018, o que demonstra a vontade do Estado brasileiro em equacionar os problemas afetos à área cibernética, por meio do planejamento e da coordenação de esforços dos órgãos públicos, em parceria com a sociedade. Trabalhando a partir dos Objetivos Estratégicos declarados nessa Estratégia, e utilizando-se de conceitos do Balanced Scorecard e da metodologia 5W2H, o trabalho propôs desdobramentos, no nível tático, de tais Objetivos, de forma que a Estratégia possa também abordar as questões associadas à ameaça do hardware Trojan. Não obstante os avanços notados na área cibernética, observa-se que o país encontra-se vulnerável à ameaça do hardware Trojan, seja pela incapacidade de detecção da ameaça, seja pela ausência de ações governamentais focando especificamente o problema.
In recent years, researchers have been demonstrating the possibility of malicious code being introduced into integrated circuits during the fabrication of these devices. The threat, which has become known as hardware Trojan, has attracted the attention of governments and industry as it potentially involves espionage and cyber warfare issues. Several studies have been developed in the world academic community, in particular in the last 5 years, as was verified in the bibliographical survey using the meta-analytic approach. Nevertheless, in Brazil, little has been said about the subject. Recently, the Office of Institutional Security of the brazilian Presidency of the Republic has published the Strategy for Information Security and Cybersecurity of the Federal Public Administration 2015-2018, which demonstrates the Brazilian State’s willingness to address the problems to the cybernetic area, through the planning and coordination of efforts of public agencies, in partnership with society. Working from the Strategic Objectives stated in this Strategy, and using concepts from the Balanced Scorecard and the 5W2H methodology, the work proposed a tactical level development of these Objectives, so that the Strategy could also address issues associated with the hardware Trojan threat. Despite the notable advances in the area of cybernetics, it’s noted that the country is vulnerable to the threat of hardware Trojan, either by the inability to detect the threat or by the absence of government actions specifically focusing on the problem.
APA, Harvard, Vancouver, ISO, and other styles
8

Bhamidipati, Harini. "SINGLE TROJAN INJECTION MODEL GENERATION AND DETECTION." Case Western Reserve University School of Graduate Studies / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=case1253543191.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zareen, Farhath. "Detecting RTL Trojans Using Artificial Immune Systems and High Level Behavior Classification." Scholar Commons, 2019. https://scholarcommons.usf.edu/etd/7992.

Full text
Abstract:
Security assurance in a computer system can be viewed as distinguishing between self and non-self. Artificial Immune Systems (AIS) are a class of machine learning (ML) techniques inspired by the behavior of innate biological immune systems, which have evolved to accurately classify self-behavior from non-self-behavior. This work aims to leverage AIS-based ML techniques for identifying certain behavioral traits in high level hardware descriptions, including unsafe or undesirable behaviors, whether such behavior exists due to human error during development or due to intentional, malicious circuit modifications, known as hardware Trojans, without the need fora golden reference model. We explore the use of Negative Selection and Clonal Selection Algorithms, which have historically been applied to malware detection on software binaries, to detect potentially unsafe or malicious behavior in hardware. We present a software tool which analyzes Trojan-inserted benchmarks, extracts their control and data-flow graphs (CDFGs), and uses this to train an AIS behavior model, against which new hardware descriptions may be tested.
APA, Harvard, Vancouver, ISO, and other styles
10

Banga, Mainak. "Partition based Approaches for the Isolation and Detection of Embedded Trojans in ICs." Thesis, Virginia Tech, 2008. http://hdl.handle.net/10919/34924.

Full text
Abstract:
This thesis aims towards devising a non-destructive testing methodology for ICs fabricated by a third party manufacturer to ensure the integrity of the chip. With the growing trend of outsourcing, the sanity of the final product has emerged to be a prime concern for the end user. This is especially so if the components are to be used in mission-critical applications such as space-exploration, medical diagnosis and treatment, defense equipments such as missiles etc., where a single failure can lead to a disaster. Thus, any extraneous parts (Trojans) that might have been implanted by the third party manufacturer with a malicious intent during the fabrication process must be diagnosed before the component is put to use.

The inherent stealthy nature of Trojans makes it difficult to detect them at normal IC outputs. More so, with the restriction that one cannot visually inspect the internals of an IC after it has been manufactured. This obviates the use of side-channel signal(s) that acts like a signature of the IC as a means to assess its internal behavior under operational conditions.

In this work, we have selected power as the side-channel signal to characterize the internal behavior of the ICs. We have used two circuit partitioning based approaches for isolating and enhancing the behavioral difference between parts of a genuine IC and one with a sequence detector Trojan in it. Experimental results reveal that these approaches are effective in exposing anomalous behavior between the targeted ICs. This is reflected as difference in power-profiles of the genuine and maligned ICs that is magnified above the process variation ensuring that the discrepancies are observable.
Master of Science

APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Trojans"

1

Gentry, Charles. Trojans. Placentia, Calf: Poetry Masters, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

USC Trojans. Minneapolis, MN: ABDO Pub. Co., 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Holub, Joan. Surprise, Trojans!: The story of the Trojan horse. New York: Simon Spotlight, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Belous, Anatoly, and Vitali Saladukha. Viruses, Hardware and Software Trojans. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-47218-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bryce, Trevor. The Trojans and their neighbours. London: Routledge, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

J. O. de Graft Hanson. The coming of the Trojans. Accra: Ghana Universities Press, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Tom, Kelly. Tales from the USC Trojans. Champaign, IL: Sports Pub. L.L.C., 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Fight on!: The USC Trojans story. Mankato, Minn: Creative Education, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bryce, Trevor. The Trojans and their neighbours: An introduction. New York, NY: Routledge, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Block, Bill. Trojans, 1962: John Mckay's First National Championship. Bloomington, Indiana: Iuniverse Inc., 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Trojans"

1

Barucci, Maria Antonietta. "Trojans (Asteroids)." In Encyclopedia of Astrobiology, 1712. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-11274-4_1615.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Barucci, Maria Antonietta. "Trojans (Asteroids)." In Encyclopedia of Astrobiology, 2554. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-44185-5_1615.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sisejkovic, Dominik, and Rainer Leupers. "Hardware Trojans." In Logic Locking, 13–24. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-19123-7_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Krieg, Christian, Adrian Dabrowski, Heidelinde Hobel, Katharina Krombholz, and Edgar Weippl. "Hardware Trojans." In Hardware Malware, 7–30. Cham: Springer International Publishing, 2013. http://dx.doi.org/10.1007/978-3-031-02338-5_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Liu, Yuntao, Ankit Mondal, Abhishek Chakraborty, Michael Zuzak, Nina Jacobsen, Daniel Xing, and Ankur Srivastava. "Neural Trojans." In Encyclopedia of Cryptography, Security and Privacy, 1–8. Berlin, Heidelberg: Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_1654-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Barucci, Maria Antonietta. "Trojans (Asteroids)." In Encyclopedia of Astrobiology, 1–2. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-27833-4_1615-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Barucci, Maria Antonietta, and Sonia Fornasier. "Trojans (Asteroids)." In Encyclopedia of Astrobiology, 1–2. Berlin, Heidelberg: Springer Berlin Heidelberg, 2022. http://dx.doi.org/10.1007/978-3-642-27833-4_1615-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Belous, Anatoly, and Vitali Saladukha. "Hardware Trojans in Microcircuits." In Viruses, Hardware and Software Trojans, 277–452. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-47218-4_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Belous, Anatoly, and Vitali Saladukha. "Countermeasures Against Hardware Trojans." In Viruses, Hardware and Software Trojans, 647–729. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-47218-4_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Vosatka, Jason. "Introduction to Hardware Trojans." In The Hardware Trojan War, 15–51. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-68511-3_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Trojans"

1

Vashistha, Nidish, Hangwei Lu, Qihang Shi, M. Tanjidur Rahman, Haoting Shen, Damon L. Woodard, Navid Asadizanjani, and Mark Tehranipoor. "Trojan Scanner: Detecting Hardware Trojans with Rapid SEM Imaging Combined with Image Processing and Machine Learning." In ISTFA 2018. ASM International, 2018. http://dx.doi.org/10.31399/asm.cp.istfa2018p0256.

Full text
Abstract:
Abstract Hardware Trojans are malicious changes to the design of integrated circuits (ICs) at different stages of the design and fabrication processes. Different approaches have been developed to detect Trojans namely non-destructive (electrical tests like run-time monitoring, functional and structural tests) and destructive (full chip reverse engineering). However, these methods cannot detect all types of Trojans and they suffer from a number of disadvantages such as slow speed of detection and lack of confidence in detecting all types of Trojans. Majority of hardware Trojans implemented in an IC will leave a footprint at the doping (active) layer. In this paper, we introduce a new version of our previously developed “Trojan Scanner” [1] framework for the untrusted foundry threat model, where a trusted GDSII layout (golden layout) is available. Advanced computer vision algorithms in combination with the supervised machine-learning model are used to classify different features of the golden layout and SEM images from an IC under authentication, as a unique descriptor for each type of gates. These descriptors are compared with each other to detect any subtle changes on the active region, which can raise the flag for the existence of a potential hardware Trojan. The descriptors can differentiate variation due to fabrication process, defects, and common SEM image distortions to rule out the possibility of false detection. Our results demonstrate that Trojan Scanner is more reliable than electrical testing and faster than full chip reverse engineering. Trojan Scanner does not rely on the functionality of the circuit rather focuses on the real physical structure to detect malicious changes inserted by the untrusted foundry.
APA, Harvard, Vancouver, ISO, and other styles
2

Zhou, Xinzhe, Wenhao Jiang, Sheng Qi, and Yadong Mu. "Multi-Target Invisibly Trojaned Networks for Visual Recognition and Detection." In Thirtieth International Joint Conference on Artificial Intelligence {IJCAI-21}. California: International Joint Conferences on Artificial Intelligence Organization, 2021. http://dx.doi.org/10.24963/ijcai.2021/477.

Full text
Abstract:
Visual backdoor attack is a recently-emerging task which aims to implant trojans in a deep neural model. A trojaned model responds to a trojan-invoking trigger in a fully predictable manner while functioning normally otherwise. As a key motivating fact to this work, most triggers adopted in existing methods, such as a learned patterned block that overlays a benigh image, can be easily noticed by human. In this work, we take image recognition and detection as the demonstration tasks, building trojaned networks that are significantly less human-perceptible and can simultaneously attack multiple targets in an image. The main technical contributions are two-folds: first, under a relaxed attack mode, we formulate trigger embedding as an image steganography-and-steganalysis problem that conceals a secret image in another image in a decipherable and almost invisible way. In specific, a variable number of different triggers can be encoded into a same secret image and fed to an encoder module that does steganography. Secondly, we propose a generic split-and-merge scheme for training a trojaned model. Neurons are split into two sets, trained either for normal image recognition / detection or trojaning the model. To merge them, we novelly propose to hide trojan neurons within the nullspace of the normal ones, such that the two sets do not interfere with each other and the resultant model exhibits similar parameter statistics to a clean model. Comprehensive experiments are conducted on the datasets PASCAL VOC and Microsoft COCO (for detection) and a subset of ImageNet (for recognition). All results clearly demonstrate the effectiveness of our proposed visual trojan method.
APA, Harvard, Vancouver, ISO, and other styles
3

Becker, Georg T., Ashwin Lakshminarasimhan, Lang Lin, Sudheendra Srivathsa, Vikram B. Suresh, and Wayne Burelson. "Implementing hardware Trojans: Experiences from a hardware Trojan challenge." In 2011 IEEE 29th International Conference on Computer Design (ICCD 2011). IEEE, 2011. http://dx.doi.org/10.1109/iccd.2011.6081414.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Liu, Yuntao, Yang Xie, and Ankur Srivastava. "Neural Trojans." In 2017 IEEE 35th International Conference on Computer Design (ICCD). IEEE, 2017. http://dx.doi.org/10.1109/iccd.2017.16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Plusquellic, Jim, and Dhruva Acharyya. "Leveraging the Power Grid for Localizing Trojans and Defects." In ISTFA 2010. ASM International, 2010. http://dx.doi.org/10.31399/asm.cp.istfa2010p0338.

Full text
Abstract:
Abstract The finite, non-zero resistance of the metal wires that define the power grid of chips require the insertion of multiple ports between the grid and the external power supply in order to meet voltage stability requirements across the 2-D plane of the chip. The ports connect to the power grid along its edges for peripheral pad configurations, while, for C4 or array pad configurations, the ports are distributed across the 2-D surface of the chip. In either case, the availability of multiple power ports can be leveraged for detecting and localizing defects and/or Trojan circuits. A localization technique is investigated in this paper that analyzes anomalies introduced by defects and/or Trojans in the measured IDDQs from these ports. The localization accuracy of the technique can be improved significantly through the use of calibration and additional information collected from simulation experiments. The method and model are validated using data collected from a set of chips fabricated in an IBM 65 nm SOI process.1
APA, Harvard, Vancouver, ISO, and other styles
6

Naseem, Raeesa. "On Parametric Hardware Trojans." In 2021 International Bhurban Conference on Applied Sciences and Technologies (IBCAST). IEEE, 2021. http://dx.doi.org/10.1109/ibcast51254.2021.9393203.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

"Session 1 Hardware Trojans." In 2008 IEEE International Workshop on Hardware-Oriented Security and Trust. IEEE, 2008. http://dx.doi.org/10.1109/hst.2008.4559036.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

"Session 4 Hardware Trojans." In IEEE International Workshop on Hardware-Oriented Security and Trust (HOST 2008). IEEE, 2008. http://dx.doi.org/10.1109/hst.2008.4559046.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Pan, Zhixin, and Prabhat Mishra. "Design of AI Trojans for Evading Machine Learning-based Detection of Hardware Trojans." In 2022 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 2022. http://dx.doi.org/10.23919/date54114.2022.9774654.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cohen, Aaron E., Yvette T. Lee, and David A. Heide. "Vocoder susceptibility to baseband Trojans." In 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON). IEEE, 2017. http://dx.doi.org/10.1109/uemcon.2017.8249068.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Trojans"

1

Beckert, Chris. Building a Better Trojan Horse. Fort Belvoir, VA: Defense Technical Information Center, August 2000. http://dx.doi.org/10.21236/ada399678.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bulent, Kenes. Jobbik: A Turanist Trojan Horse in Europe? European Center for Populism Studies (ECPS), August 2020. http://dx.doi.org/10.55271/op0002.

Full text
Abstract:
Defined as Turanist, Eurasianist, pro-Russian, pro-Iranian, anti-immigrant but pro-Islam, racist, antisemitic, anti-Roma, Hungarist, and radically populist, Jobbik do not exist in a vacuum. The rise of Jobbik from deep nationalist, antisemitic, and anti-Roma currents in Hungarian politics dates back to the late 1980s and early 1990s. Despite its extensive efforts at “image refurbishment” in recent years, Jobbik remains a populist, revisionist, racist, radical right-wing party that threatens to destabilize Hungary, the neighboring region, and the EU.
APA, Harvard, Vancouver, ISO, and other styles
3

Grossman, yuval. Trojan Penguins and Isospin Violation in Hadronic B Decays. Office of Scientific and Technical Information (OSTI), September 1999. http://dx.doi.org/10.2172/12482.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

McCutchen-Maloney, S., and J. Fitch. Investigating the ?Trojan Horse? Mechanism of Yersinia pestis Virulence. Office of Scientific and Technical Information (OSTI), February 2005. http://dx.doi.org/10.2172/957607.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jung, Richard G., and Sr. The European Security and Defense Policy: A European Trojan Horse. Fort Belvoir, VA: Defense Technical Information Center, January 2001. http://dx.doi.org/10.21236/ada393613.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lu, S. C., S. C. Sommer, G. L. Johnson, and H. E. Lambert. Consequence evaluation of radiation embrittlement of Trojan reactor pressure vessel supports. Office of Scientific and Technical Information (OSTI), October 1990. http://dx.doi.org/10.2172/6528827.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Beckert, Christopher H. Building a Better Trojan Horse: Emerging Army Roles in Joint Urban Operations. Fort Belvoir, VA: Defense Technical Information Center, January 2001. http://dx.doi.org/10.21236/ada392081.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Nipper, Gregory. Progress and economy: the clash of values over Oregon's Trojan Nuclear Plant. Portland State University Library, January 2000. http://dx.doi.org/10.15760/etd.249.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Asgari, M., M. L. Williams, F. B. K. Kam, and E. D. McGarry. Transport calculations of radiation exposure to vessel support structures in the Trojan Reactor. Office of Scientific and Technical Information (OSTI), July 1994. http://dx.doi.org/10.2172/10168039.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sharifnia, Hamidreza. Safety related model and studies of Trojan Nuclear Power Plant electrical distribution system. Portland State University Library, January 2000. http://dx.doi.org/10.15760/etd.5758.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography