Academic literature on the topic 'Trojans'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Trojans.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Trojans"
Kakkara, Varsha, Karthi Balasubramanian, B. Yamuna, Deepak Mishra, Karthikeyan Lingasubramanian, and Senthil Murugan. "A Viterbi decoder and its hardware Trojan models: an FPGA-based implementation study." PeerJ Computer Science 6 (March 2, 2020): e250. http://dx.doi.org/10.7717/peerj-cs.250.
Full textHazra, Suvadip, and Mamata Dalui. "CA-Based Detection of Coherence Exploiting Hardware Trojans." Journal of Circuits, Systems and Computers 29, no. 08 (October 18, 2019): 2050120. http://dx.doi.org/10.1142/s0218126620501200.
Full textPirani, Simona, Anders Johansen, and Alexander J. Mustill. "On the inclinations of the Jupiter Trojans." Astronomy & Astrophysics 631 (October 25, 2019): A89. http://dx.doi.org/10.1051/0004-6361/201936600.
Full textLi, Dejian, Qizhi Zhang, Dongyan Zhao, Lei Li, Jiaji He, Yidong Yuan, and Yiqiang Zhao. "Hardware Trojan Detection Using Effective Property-Checking Method." Electronics 11, no. 17 (August 24, 2022): 2649. http://dx.doi.org/10.3390/electronics11172649.
Full textZhao, Meng Meng, and Lian Hai Wang. "Research on Trojan Detection Method of Computer Memory Mirroring." Applied Mechanics and Materials 701-702 (December 2014): 1013–17. http://dx.doi.org/10.4028/www.scientific.net/amm.701-702.1013.
Full textNapier, Kevin J., Larissa Markwardt, Fred C. Adams, David W. Gerdes, and Hsing Wen Lin. "A Collision Mechanism for the Removal of Earth's Trojan Asteroids." Planetary Science Journal 3, no. 5 (May 1, 2022): 121. http://dx.doi.org/10.3847/psj/ac6958.
Full textWang, Lian Hai, and Qiu Liang Xu. "An APT Trojan Detection Method Based on Memory Forensics Techniques." Applied Mechanics and Materials 701-702 (December 2014): 927–34. http://dx.doi.org/10.4028/www.scientific.net/amm.701-702.927.
Full textYoshikawa, Masaya, Yusuke Mori, and Takeshi Kumaki. "Implementation Aware Hardware Trojan Trigger." Advanced Materials Research 933 (May 2014): 482–86. http://dx.doi.org/10.4028/www.scientific.net/amr.933.482.
Full textPrathivi, Rastri, and Vensy Vydia. "ANALISA PENDETEKSIAN WORM dan TROJAN PADA JARINGAN INTERNET UNIVERSITAS SEMARANG MENGGUNAKAN METODE KALSIFIKASI PADA DATA MINING C45 dan BAYESIAN NETWORK." Jurnal Transformatika 14, no. 2 (January 30, 2017): 77. http://dx.doi.org/10.26623/transformatika.v14i2.440.
Full textRooney, Catherine, Amar Seeam, and Xavier Bellekens. "Creation and Detection of Hardware Trojans Using Non-Invasive Off-The-Shelf Technologies." Electronics 7, no. 7 (July 22, 2018): 124. http://dx.doi.org/10.3390/electronics7070124.
Full textDissertations / Theses on the topic "Trojans"
Karlsson, Ola. "A Study of Jupiter Trojans." Doctoral thesis, Uppsala universitet, Institutionen för fysik och astronomi, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-172151.
Full textRaju, Akhilesh. "Trojan Detection in Hardware Designs." University of Cincinnati / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1504781162418081.
Full textDharmadhikari, Pranav Hemant. "Hardware Trojan Detection in Sequential Logic Designs." University of Cincinnati / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1543919236213844.
Full textCaravut, Sinchai. "MULTIPLE LOGS ANALYSIS FOR DETECTING ZERO-DAY BACKDOOR TROJANS." Cleveland State University / OhioLINK, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=csu1210831685.
Full textCollins, Zachary. "Hardware Trojans in FPGA Device IP: Solutions Through Evolutionary Computation." University of Cincinnati / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1554217182155068.
Full textAlmeida, Álvaro José Caseiro de. "Study of the possible collisions between Plutinos and Neptune trojans." Master's thesis, Universidade de Aveiro, 2008. http://hdl.handle.net/10773/2607.
Full textAs propriedades físicas e dinâmicas dos asteróides oferecem uma das poucas limitações na formação, evolução e migração dos planetas gigantes. Os asteróides Troianos partilham o semi-eixo maior da órbita do planeta, mas seguem-no cerca de 60º à frente e atrás, próximo dos dois pontos triangulares de equilíbrio gravitacional de Lagrange (Sheppard & Trujillo (2006)). Na chamada Cintura de Edgeworth-Kuiper (EKB), encontra-se um grupo de asteróides denominados de Plutinos e que pertencem ao grupo dos designados objectos Trans-Neptunianos (TNOs). Estes partilham uma ressonância de movimento médio 3/2 com Neptuno, e alguns deles (como Plutão) chegam mesmo a cruzar a órbita deste planeta. Como objectivo principal deste trabalho, iremos estudar a possibilidade destes dois grupos de asteróides poderem vir a colidir entre si, o que poderia levar a uma mistura entre os dois tipos e ajudar a explicar as cores que ambos apresentam. ABSTRACT: The dynamical and physical properties of asteroids offer one of the few constraints on the formation, evolution, and migration of the giant planets. Trojan asteroids share a planet’s semi-major axis but lead or follow it by about 60º near the two triangular Lagrangian points of gravitational equilibrium (Sheppard & Trujillo (2006)). In the so-called Edgeworth-Kuiper Belt (EKB), there’s a group of asteroids called Plutinos which belong to the group of the designated Trans-Neptunian objects (TNOs). These TNOs share a mean motion resonance of 3/2 with Neptune, and some of them (like Pluto) even cross the orbit of this planet. As the main subject of this work, we will study the possibility that these two groups of asteroids could collide with each other, which could lead to a mixing between the two (types) and help to explain the colors that both present.
Bruzzeguez, Gustavo Andrade. "Estudo sobre hardware trojans e suas ameaças à Administração Pública Federal." reponame:Repositório Institucional da UnB, 2017. http://repositorio.unb.br/handle/10482/32352.
Full textSubmitted by Raquel Viana (raquelviana@bce.unb.br) on 2018-07-23T16:36:11Z No. of bitstreams: 1 2017_GustavoAndradeBruzzeguez.pdf: 2394160 bytes, checksum: c28f3f1d732b548a557f1a9cc46f87d8 (MD5)
Approved for entry into archive by Raquel Viana (raquelviana@bce.unb.br) on 2018-07-24T19:35:27Z (GMT) No. of bitstreams: 1 2017_GustavoAndradeBruzzeguez.pdf: 2394160 bytes, checksum: c28f3f1d732b548a557f1a9cc46f87d8 (MD5)
Made available in DSpace on 2018-07-24T19:35:27Z (GMT). No. of bitstreams: 1 2017_GustavoAndradeBruzzeguez.pdf: 2394160 bytes, checksum: c28f3f1d732b548a557f1a9cc46f87d8 (MD5) Previous issue date: 2018-07-23
Nos últimos anos, pesquisadores vêm demonstrando a possibilidade de implementação de códigos maliciosos em circuitos integrados durante a fabricação destes dispositivos. A ameaça, que ficou conhecida como hardware trojan, vem atraindo a atenção dos governos e da indústria, dado que potencialmente envolve questões de espionagem e guerra cibernética. Diversos estudos vem sendo desenvolvidos na comunidade acadêmica mundial, em particular nos últimos 5 anos, conforme se constatou no levantamento bibliográfico com uso do enfoque meta-analítico. Não obstante, no Brasil, pouco se tem falado sobre o tema. Recentemente, o Gabinete de Segurança Institucional da Presidência da República publicou a Estratégia de Segurança da Informação e Comunicações e de Segurança Cibernética da Administração Pública Federal 2015-2018, o que demonstra a vontade do Estado brasileiro em equacionar os problemas afetos à área cibernética, por meio do planejamento e da coordenação de esforços dos órgãos públicos, em parceria com a sociedade. Trabalhando a partir dos Objetivos Estratégicos declarados nessa Estratégia, e utilizando-se de conceitos do Balanced Scorecard e da metodologia 5W2H, o trabalho propôs desdobramentos, no nível tático, de tais Objetivos, de forma que a Estratégia possa também abordar as questões associadas à ameaça do hardware Trojan. Não obstante os avanços notados na área cibernética, observa-se que o país encontra-se vulnerável à ameaça do hardware Trojan, seja pela incapacidade de detecção da ameaça, seja pela ausência de ações governamentais focando especificamente o problema.
In recent years, researchers have been demonstrating the possibility of malicious code being introduced into integrated circuits during the fabrication of these devices. The threat, which has become known as hardware Trojan, has attracted the attention of governments and industry as it potentially involves espionage and cyber warfare issues. Several studies have been developed in the world academic community, in particular in the last 5 years, as was verified in the bibliographical survey using the meta-analytic approach. Nevertheless, in Brazil, little has been said about the subject. Recently, the Office of Institutional Security of the brazilian Presidency of the Republic has published the Strategy for Information Security and Cybersecurity of the Federal Public Administration 2015-2018, which demonstrates the Brazilian State’s willingness to address the problems to the cybernetic area, through the planning and coordination of efforts of public agencies, in partnership with society. Working from the Strategic Objectives stated in this Strategy, and using concepts from the Balanced Scorecard and the 5W2H methodology, the work proposed a tactical level development of these Objectives, so that the Strategy could also address issues associated with the hardware Trojan threat. Despite the notable advances in the area of cybernetics, it’s noted that the country is vulnerable to the threat of hardware Trojan, either by the inability to detect the threat or by the absence of government actions specifically focusing on the problem.
Bhamidipati, Harini. "SINGLE TROJAN INJECTION MODEL GENERATION AND DETECTION." Case Western Reserve University School of Graduate Studies / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=case1253543191.
Full textZareen, Farhath. "Detecting RTL Trojans Using Artificial Immune Systems and High Level Behavior Classification." Scholar Commons, 2019. https://scholarcommons.usf.edu/etd/7992.
Full textBanga, Mainak. "Partition based Approaches for the Isolation and Detection of Embedded Trojans in ICs." Thesis, Virginia Tech, 2008. http://hdl.handle.net/10919/34924.
Full textThe inherent stealthy nature of Trojans makes it difficult to detect them at normal IC outputs. More so, with the restriction that one cannot visually inspect the internals of an IC after it has been manufactured. This obviates the use of side-channel signal(s) that acts like a signature of the IC as a means to assess its internal behavior under operational conditions.
In this work, we have selected power as the side-channel signal to characterize the internal
behavior of the ICs. We have used two circuit partitioning based approaches for isolating and
enhancing the behavioral difference between parts of a genuine IC and one with a sequence
detector Trojan in it. Experimental results reveal that these approaches are effective in
exposing anomalous behavior between the targeted ICs. This is reflected as difference in
power-profiles of the genuine and maligned ICs that is magnified above the process variation
ensuring that the discrepancies are observable.
Master of Science
Books on the topic "Trojans"
Holub, Joan. Surprise, Trojans!: The story of the Trojan horse. New York: Simon Spotlight, 2014.
Find full textBelous, Anatoly, and Vitali Saladukha. Viruses, Hardware and Software Trojans. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-47218-4.
Full textJ. O. de Graft Hanson. The coming of the Trojans. Accra: Ghana Universities Press, 1994.
Find full textBryce, Trevor. The Trojans and their neighbours: An introduction. New York, NY: Routledge, 2005.
Find full textBlock, Bill. Trojans, 1962: John Mckay's First National Championship. Bloomington, Indiana: Iuniverse Inc., 2012.
Find full textBook chapters on the topic "Trojans"
Barucci, Maria Antonietta. "Trojans (Asteroids)." In Encyclopedia of Astrobiology, 1712. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-11274-4_1615.
Full textBarucci, Maria Antonietta. "Trojans (Asteroids)." In Encyclopedia of Astrobiology, 2554. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-44185-5_1615.
Full textSisejkovic, Dominik, and Rainer Leupers. "Hardware Trojans." In Logic Locking, 13–24. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-19123-7_3.
Full textKrieg, Christian, Adrian Dabrowski, Heidelinde Hobel, Katharina Krombholz, and Edgar Weippl. "Hardware Trojans." In Hardware Malware, 7–30. Cham: Springer International Publishing, 2013. http://dx.doi.org/10.1007/978-3-031-02338-5_2.
Full textLiu, Yuntao, Ankit Mondal, Abhishek Chakraborty, Michael Zuzak, Nina Jacobsen, Daniel Xing, and Ankur Srivastava. "Neural Trojans." In Encyclopedia of Cryptography, Security and Privacy, 1–8. Berlin, Heidelberg: Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_1654-1.
Full textBarucci, Maria Antonietta. "Trojans (Asteroids)." In Encyclopedia of Astrobiology, 1–2. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-27833-4_1615-2.
Full textBarucci, Maria Antonietta, and Sonia Fornasier. "Trojans (Asteroids)." In Encyclopedia of Astrobiology, 1–2. Berlin, Heidelberg: Springer Berlin Heidelberg, 2022. http://dx.doi.org/10.1007/978-3-642-27833-4_1615-3.
Full textBelous, Anatoly, and Vitali Saladukha. "Hardware Trojans in Microcircuits." In Viruses, Hardware and Software Trojans, 277–452. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-47218-4_4.
Full textBelous, Anatoly, and Vitali Saladukha. "Countermeasures Against Hardware Trojans." In Viruses, Hardware and Software Trojans, 647–729. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-47218-4_7.
Full textVosatka, Jason. "Introduction to Hardware Trojans." In The Hardware Trojan War, 15–51. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-68511-3_2.
Full textConference papers on the topic "Trojans"
Vashistha, Nidish, Hangwei Lu, Qihang Shi, M. Tanjidur Rahman, Haoting Shen, Damon L. Woodard, Navid Asadizanjani, and Mark Tehranipoor. "Trojan Scanner: Detecting Hardware Trojans with Rapid SEM Imaging Combined with Image Processing and Machine Learning." In ISTFA 2018. ASM International, 2018. http://dx.doi.org/10.31399/asm.cp.istfa2018p0256.
Full textZhou, Xinzhe, Wenhao Jiang, Sheng Qi, and Yadong Mu. "Multi-Target Invisibly Trojaned Networks for Visual Recognition and Detection." In Thirtieth International Joint Conference on Artificial Intelligence {IJCAI-21}. California: International Joint Conferences on Artificial Intelligence Organization, 2021. http://dx.doi.org/10.24963/ijcai.2021/477.
Full textBecker, Georg T., Ashwin Lakshminarasimhan, Lang Lin, Sudheendra Srivathsa, Vikram B. Suresh, and Wayne Burelson. "Implementing hardware Trojans: Experiences from a hardware Trojan challenge." In 2011 IEEE 29th International Conference on Computer Design (ICCD 2011). IEEE, 2011. http://dx.doi.org/10.1109/iccd.2011.6081414.
Full textLiu, Yuntao, Yang Xie, and Ankur Srivastava. "Neural Trojans." In 2017 IEEE 35th International Conference on Computer Design (ICCD). IEEE, 2017. http://dx.doi.org/10.1109/iccd.2017.16.
Full textPlusquellic, Jim, and Dhruva Acharyya. "Leveraging the Power Grid for Localizing Trojans and Defects." In ISTFA 2010. ASM International, 2010. http://dx.doi.org/10.31399/asm.cp.istfa2010p0338.
Full textNaseem, Raeesa. "On Parametric Hardware Trojans." In 2021 International Bhurban Conference on Applied Sciences and Technologies (IBCAST). IEEE, 2021. http://dx.doi.org/10.1109/ibcast51254.2021.9393203.
Full text"Session 1 Hardware Trojans." In 2008 IEEE International Workshop on Hardware-Oriented Security and Trust. IEEE, 2008. http://dx.doi.org/10.1109/hst.2008.4559036.
Full text"Session 4 Hardware Trojans." In IEEE International Workshop on Hardware-Oriented Security and Trust (HOST 2008). IEEE, 2008. http://dx.doi.org/10.1109/hst.2008.4559046.
Full textPan, Zhixin, and Prabhat Mishra. "Design of AI Trojans for Evading Machine Learning-based Detection of Hardware Trojans." In 2022 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 2022. http://dx.doi.org/10.23919/date54114.2022.9774654.
Full textCohen, Aaron E., Yvette T. Lee, and David A. Heide. "Vocoder susceptibility to baseband Trojans." In 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON). IEEE, 2017. http://dx.doi.org/10.1109/uemcon.2017.8249068.
Full textReports on the topic "Trojans"
Beckert, Chris. Building a Better Trojan Horse. Fort Belvoir, VA: Defense Technical Information Center, August 2000. http://dx.doi.org/10.21236/ada399678.
Full textBulent, Kenes. Jobbik: A Turanist Trojan Horse in Europe? European Center for Populism Studies (ECPS), August 2020. http://dx.doi.org/10.55271/op0002.
Full textGrossman, yuval. Trojan Penguins and Isospin Violation in Hadronic B Decays. Office of Scientific and Technical Information (OSTI), September 1999. http://dx.doi.org/10.2172/12482.
Full textMcCutchen-Maloney, S., and J. Fitch. Investigating the ?Trojan Horse? Mechanism of Yersinia pestis Virulence. Office of Scientific and Technical Information (OSTI), February 2005. http://dx.doi.org/10.2172/957607.
Full textJung, Richard G., and Sr. The European Security and Defense Policy: A European Trojan Horse. Fort Belvoir, VA: Defense Technical Information Center, January 2001. http://dx.doi.org/10.21236/ada393613.
Full textLu, S. C., S. C. Sommer, G. L. Johnson, and H. E. Lambert. Consequence evaluation of radiation embrittlement of Trojan reactor pressure vessel supports. Office of Scientific and Technical Information (OSTI), October 1990. http://dx.doi.org/10.2172/6528827.
Full textBeckert, Christopher H. Building a Better Trojan Horse: Emerging Army Roles in Joint Urban Operations. Fort Belvoir, VA: Defense Technical Information Center, January 2001. http://dx.doi.org/10.21236/ada392081.
Full textNipper, Gregory. Progress and economy: the clash of values over Oregon's Trojan Nuclear Plant. Portland State University Library, January 2000. http://dx.doi.org/10.15760/etd.249.
Full textAsgari, M., M. L. Williams, F. B. K. Kam, and E. D. McGarry. Transport calculations of radiation exposure to vessel support structures in the Trojan Reactor. Office of Scientific and Technical Information (OSTI), July 1994. http://dx.doi.org/10.2172/10168039.
Full textSharifnia, Hamidreza. Safety related model and studies of Trojan Nuclear Power Plant electrical distribution system. Portland State University Library, January 2000. http://dx.doi.org/10.15760/etd.5758.
Full text