To see the other types of publications on this topic, follow the link: Trojans.

Dissertations / Theses on the topic 'Trojans'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Trojans.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Karlsson, Ola. "A Study of Jupiter Trojans." Doctoral thesis, Uppsala universitet, Institutionen för fysik och astronomi, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-172151.

Full text
Abstract:
Jupiter Trojan asteroid dynamics have been studied for a long time but it is only within the last decades that the known population has become large enough to make other studies meaningful. In four articles I have been scratching the surface of the unknown Trojan knowledge space. Paper I presents photometric observations confirming a larger variety in surface redness for the smaller Trojans compared to the larger ones, in line with the groups in the outer main asteroid belt. However, the largest Trojans are significantly redder compared to the largest Cybele and Hilda asteroids. Paper II is an investigation of the Trojan discovery completeness. The analysis shows that all Trojans down to a limiting absolute magnitude of H=11.5 mag have been discovered. Missing Trojans in the almost discovery-completed section should have inclinations above the mean of the same group. The faintest Trojans are discovery biased due to orbit orientations similar to the Milky Way. Paper III is a general review of dynamical and physical properties of the discovery-completed sample of Jupiter Trojans found in Paper II. The two Trojan swarms are often treated as being equal, but are different in a number of details. Two known facts are that the L5 swarm is less rich, while the L4 swarm has a larger fraction of low inclination Trojans. Trojans are in general red objects but the mean redness is higher for Trojans which have not collided compared to Trojans in families. Paper IIII is an investigation of Trojan collisions, family detection and evolution. Collision circumstances were mapped using numerical simulations and recorded Trojan close approaches. Synthetic families were created and evolved numerically. The result suggests that the HCM family detection technique can find Trojan families even in a densely populated parameter space. However, interlopers cannot be avoided at any level but their contribution should be less than 30%. Synthetic families can be identified with backwards orbital integrations for times up to a Gyr-scale. However, there are discrepancies between real Trojan families and my synthetic families.
APA, Harvard, Vancouver, ISO, and other styles
2

Raju, Akhilesh. "Trojan Detection in Hardware Designs." University of Cincinnati / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1504781162418081.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Dharmadhikari, Pranav Hemant. "Hardware Trojan Detection in Sequential Logic Designs." University of Cincinnati / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1543919236213844.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Caravut, Sinchai. "MULTIPLE LOGS ANALYSIS FOR DETECTING ZERO-DAY BACKDOOR TROJANS." Cleveland State University / OhioLINK, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=csu1210831685.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Collins, Zachary. "Hardware Trojans in FPGA Device IP: Solutions Through Evolutionary Computation." University of Cincinnati / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1554217182155068.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Almeida, Álvaro José Caseiro de. "Study of the possible collisions between Plutinos and Neptune trojans." Master's thesis, Universidade de Aveiro, 2008. http://hdl.handle.net/10773/2607.

Full text
Abstract:
Mestrado em Física
As propriedades físicas e dinâmicas dos asteróides oferecem uma das poucas limitações na formação, evolução e migração dos planetas gigantes. Os asteróides Troianos partilham o semi-eixo maior da órbita do planeta, mas seguem-no cerca de 60º à frente e atrás, próximo dos dois pontos triangulares de equilíbrio gravitacional de Lagrange (Sheppard & Trujillo (2006)). Na chamada Cintura de Edgeworth-Kuiper (EKB), encontra-se um grupo de asteróides denominados de Plutinos e que pertencem ao grupo dos designados objectos Trans-Neptunianos (TNOs). Estes partilham uma ressonância de movimento médio 3/2 com Neptuno, e alguns deles (como Plutão) chegam mesmo a cruzar a órbita deste planeta. Como objectivo principal deste trabalho, iremos estudar a possibilidade destes dois grupos de asteróides poderem vir a colidir entre si, o que poderia levar a uma mistura entre os dois tipos e ajudar a explicar as cores que ambos apresentam. ABSTRACT: The dynamical and physical properties of asteroids offer one of the few constraints on the formation, evolution, and migration of the giant planets. Trojan asteroids share a planet’s semi-major axis but lead or follow it by about 60º near the two triangular Lagrangian points of gravitational equilibrium (Sheppard & Trujillo (2006)). In the so-called Edgeworth-Kuiper Belt (EKB), there’s a group of asteroids called Plutinos which belong to the group of the designated Trans-Neptunian objects (TNOs). These TNOs share a mean motion resonance of 3/2 with Neptune, and some of them (like Pluto) even cross the orbit of this planet. As the main subject of this work, we will study the possibility that these two groups of asteroids could collide with each other, which could lead to a mixing between the two (types) and help to explain the colors that both present.
APA, Harvard, Vancouver, ISO, and other styles
7

Bruzzeguez, Gustavo Andrade. "Estudo sobre hardware trojans e suas ameaças à Administração Pública Federal." reponame:Repositório Institucional da UnB, 2017. http://repositorio.unb.br/handle/10482/32352.

Full text
Abstract:
Dissertação (mestrado)—Universidade de Brasília, Instituto de Ciências Exatas, Departamento de Ciência da Computação, 2017.
Submitted by Raquel Viana (raquelviana@bce.unb.br) on 2018-07-23T16:36:11Z No. of bitstreams: 1 2017_GustavoAndradeBruzzeguez.pdf: 2394160 bytes, checksum: c28f3f1d732b548a557f1a9cc46f87d8 (MD5)
Approved for entry into archive by Raquel Viana (raquelviana@bce.unb.br) on 2018-07-24T19:35:27Z (GMT) No. of bitstreams: 1 2017_GustavoAndradeBruzzeguez.pdf: 2394160 bytes, checksum: c28f3f1d732b548a557f1a9cc46f87d8 (MD5)
Made available in DSpace on 2018-07-24T19:35:27Z (GMT). No. of bitstreams: 1 2017_GustavoAndradeBruzzeguez.pdf: 2394160 bytes, checksum: c28f3f1d732b548a557f1a9cc46f87d8 (MD5) Previous issue date: 2018-07-23
Nos últimos anos, pesquisadores vêm demonstrando a possibilidade de implementação de códigos maliciosos em circuitos integrados durante a fabricação destes dispositivos. A ameaça, que ficou conhecida como hardware trojan, vem atraindo a atenção dos governos e da indústria, dado que potencialmente envolve questões de espionagem e guerra cibernética. Diversos estudos vem sendo desenvolvidos na comunidade acadêmica mundial, em particular nos últimos 5 anos, conforme se constatou no levantamento bibliográfico com uso do enfoque meta-analítico. Não obstante, no Brasil, pouco se tem falado sobre o tema. Recentemente, o Gabinete de Segurança Institucional da Presidência da República publicou a Estratégia de Segurança da Informação e Comunicações e de Segurança Cibernética da Administração Pública Federal 2015-2018, o que demonstra a vontade do Estado brasileiro em equacionar os problemas afetos à área cibernética, por meio do planejamento e da coordenação de esforços dos órgãos públicos, em parceria com a sociedade. Trabalhando a partir dos Objetivos Estratégicos declarados nessa Estratégia, e utilizando-se de conceitos do Balanced Scorecard e da metodologia 5W2H, o trabalho propôs desdobramentos, no nível tático, de tais Objetivos, de forma que a Estratégia possa também abordar as questões associadas à ameaça do hardware Trojan. Não obstante os avanços notados na área cibernética, observa-se que o país encontra-se vulnerável à ameaça do hardware Trojan, seja pela incapacidade de detecção da ameaça, seja pela ausência de ações governamentais focando especificamente o problema.
In recent years, researchers have been demonstrating the possibility of malicious code being introduced into integrated circuits during the fabrication of these devices. The threat, which has become known as hardware Trojan, has attracted the attention of governments and industry as it potentially involves espionage and cyber warfare issues. Several studies have been developed in the world academic community, in particular in the last 5 years, as was verified in the bibliographical survey using the meta-analytic approach. Nevertheless, in Brazil, little has been said about the subject. Recently, the Office of Institutional Security of the brazilian Presidency of the Republic has published the Strategy for Information Security and Cybersecurity of the Federal Public Administration 2015-2018, which demonstrates the Brazilian State’s willingness to address the problems to the cybernetic area, through the planning and coordination of efforts of public agencies, in partnership with society. Working from the Strategic Objectives stated in this Strategy, and using concepts from the Balanced Scorecard and the 5W2H methodology, the work proposed a tactical level development of these Objectives, so that the Strategy could also address issues associated with the hardware Trojan threat. Despite the notable advances in the area of cybernetics, it’s noted that the country is vulnerable to the threat of hardware Trojan, either by the inability to detect the threat or by the absence of government actions specifically focusing on the problem.
APA, Harvard, Vancouver, ISO, and other styles
8

Bhamidipati, Harini. "SINGLE TROJAN INJECTION MODEL GENERATION AND DETECTION." Case Western Reserve University School of Graduate Studies / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=case1253543191.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zareen, Farhath. "Detecting RTL Trojans Using Artificial Immune Systems and High Level Behavior Classification." Scholar Commons, 2019. https://scholarcommons.usf.edu/etd/7992.

Full text
Abstract:
Security assurance in a computer system can be viewed as distinguishing between self and non-self. Artificial Immune Systems (AIS) are a class of machine learning (ML) techniques inspired by the behavior of innate biological immune systems, which have evolved to accurately classify self-behavior from non-self-behavior. This work aims to leverage AIS-based ML techniques for identifying certain behavioral traits in high level hardware descriptions, including unsafe or undesirable behaviors, whether such behavior exists due to human error during development or due to intentional, malicious circuit modifications, known as hardware Trojans, without the need fora golden reference model. We explore the use of Negative Selection and Clonal Selection Algorithms, which have historically been applied to malware detection on software binaries, to detect potentially unsafe or malicious behavior in hardware. We present a software tool which analyzes Trojan-inserted benchmarks, extracts their control and data-flow graphs (CDFGs), and uses this to train an AIS behavior model, against which new hardware descriptions may be tested.
APA, Harvard, Vancouver, ISO, and other styles
10

Banga, Mainak. "Partition based Approaches for the Isolation and Detection of Embedded Trojans in ICs." Thesis, Virginia Tech, 2008. http://hdl.handle.net/10919/34924.

Full text
Abstract:
This thesis aims towards devising a non-destructive testing methodology for ICs fabricated by a third party manufacturer to ensure the integrity of the chip. With the growing trend of outsourcing, the sanity of the final product has emerged to be a prime concern for the end user. This is especially so if the components are to be used in mission-critical applications such as space-exploration, medical diagnosis and treatment, defense equipments such as missiles etc., where a single failure can lead to a disaster. Thus, any extraneous parts (Trojans) that might have been implanted by the third party manufacturer with a malicious intent during the fabrication process must be diagnosed before the component is put to use.

The inherent stealthy nature of Trojans makes it difficult to detect them at normal IC outputs. More so, with the restriction that one cannot visually inspect the internals of an IC after it has been manufactured. This obviates the use of side-channel signal(s) that acts like a signature of the IC as a means to assess its internal behavior under operational conditions.

In this work, we have selected power as the side-channel signal to characterize the internal behavior of the ICs. We have used two circuit partitioning based approaches for isolating and enhancing the behavioral difference between parts of a genuine IC and one with a sequence detector Trojan in it. Experimental results reveal that these approaches are effective in exposing anomalous behavior between the targeted ICs. This is reflected as difference in power-profiles of the genuine and maligned ICs that is magnified above the process variation ensuring that the discrepancies are observable.
Master of Science

APA, Harvard, Vancouver, ISO, and other styles
11

Hoque, Tamzidul. "Ring Oscillator Based Hardware Trojan Detection." University of Toledo / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1430413190.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Staub, Dillon. "Bio-Inspired Hardware Security Defenses: A CRISPR-Cas-Based Approach for Detecting Trojans in FPGA Systems." University of Cincinnati / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1563872470616901.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Harris, Matthew Joshua. "Accelerating Reverse Engineering Image Processing Using FPGA." Wright State University / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=wright155535529307322.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Gutierrez, Ramon Roger. "Model for Touchdown Dynamics of a Lander on the Solar Power Sail Mission." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-60501.

Full text
Abstract:
The ISAS/JAXA Solar Power Sail mission, bound to explore the Jupiter trojans, will face many challenges during its journey. The landing manoeuvre is one of the most critical parts of any space mission that plans to investigate the surface of celestial bodies. Asteroids are mostly unknown bodies and in order to plan a successful landing on their surface, a great number of landing scenarios need to be taken into account. For the future mission to the Jupiter trojans, a study of the landing dynamics and their effects on the lander has to be done. A simple model of a lander has been created based on a design for the ISAS/JAXA Solar Power Sail mission, and the possible landing scenarios have been simulated. For this case, only the last part of the landing, which will be a free-fall has been taken into account. The lander is modelled as a rigid structure with a landing gear composed of four legs. The surface has been modelled as a flat plane with different inclinations and the possibility of including small obstacles or terrain roughness has been implemented. In the model, the lander is allowed 6 degrees of freedom. Several landing possibilities are tested with residual velocities and deviations in the starting point, and the stability of the lander is evaluated respect its geometry. Damping strategies have been considered to protect the instruments and reduce the impact, allowing for a safer landing. The effect of including crushable honeycomb dampers in the legs is also implemented, simulated and evaluated, by using a model of crushable honeycombs with different characteristics. In addition, the model includes also the position, direction and characteristics of the thrusters. Thus, it could be used to study other phases of the landing sequence where active control of the lander is needed, and evaluate the behaviour and response of different control-loop algorithms for attitude and position control of the lander.
APA, Harvard, Vancouver, ISO, and other styles
15

Amsaad, Fathi Hassan Mohamed. "A Trusted and Efficient Security Approach for the Detection of Hardware Trojans and Authentication of FPGA-based Systems." University of Toledo / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1512494875469127.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Dubell, Michael, and David Johansson. "Nätverkssäkerhet med IPS : Förbättrad nätverkssäkerhet med Intrusion Prevention Systems." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-23347.

Full text
Abstract:
Att skydda sin IT-miljö mot olika typer av intrång och attacker som till exempel trojaner,skadliga Java applets eller DoS attacker med hjälp av brandväggar och antivirusprogramär två viktiga lager i skalskyddet. I den här uppsatsen undersöks hur väl ett Intrusion Prevention System skulle kunna fungera som ett ytterligare lager i skalskyddet. Fokus ligger på hur väl IPS-systemet klarar av att avvärja attacker, hur mycket tid som går åt till konfigurering och drift för att få ett fungerande IPS samt hur prestandan i nätverket påverkas av implementationen. För att mäta hur väl IPS systemet klarar av att upptäcka och blockera attacker utförs två experiment där ett mindre nätverk attackeras på olika sätt. I det första experimentet skyddas infrastrukturen av en brandvägg och klienterna är utrustade med antivirusprogram. I det andra experimentet genomförs samma attacker igen fast med ett Snort IPS implementerat i nätverket. Resultatet av de genomförda experimenten visar att en IPS klarar att blockera ca 87% av attackerna, men nätverksprestandan påverkas negativt. Slutsatsen är att endast brandväggar och antivirusprogram inte ger ett fullgott skydd.
APA, Harvard, Vancouver, ISO, and other styles
17

Bowman, David C. "Image Stitching and Matching Tool in the Automated Iterative Reverse Engineer (AIRE) Integrated Circuit Analysis Suite." Wright State University / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=wright1533766175549951.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Frisk, Ulf, and Semir Drocic. "The State of Home Computer Security." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2584.

Full text
Abstract:

Hundreds of millions of people use their home computers every day for different purposes. Many of them are connected to the Internet. Most of them are unaware of the threats or do not know how to protect themselves. This unawareness is a major threat to global computer security.

This master thesis starts by explaining some security related terms that might be unknown to the reader. It then goes on by addressing security vulnerabilities and flaws in the most popular home computer operating systems. The most important threats to home computer security are reviewed in the following chapter. These threats include worms, email worms, spyware and trojan horses. After this chapter some possible solutions for improving home computer security are presented. Finally this master thesis contains a short user survey to find out what the problems are in the real world and what can be doneto improve the current situation.

APA, Harvard, Vancouver, ISO, and other styles
19

Hastings, Adam Kendall. "Assuring Intellectual Property Through Physical and Functional Comparisons." BYU ScholarsArchive, 2018. https://scholarsarchive.byu.edu/etd/7035.

Full text
Abstract:
Hardware trojans pose a serious threat to trusted computing. However, hardware trojan detection methods are both numerous and onerous, making hardware trojan detection a difficult and time-consuming procedure. This thesis introduces the IP Assurance Framework, which drastically improves the time it takes design teams to test for hardware trojans. The IP Assurance Framework is implemented in two ways: The first method, Physical Assurance, compares instantiated IP blocks to a golden model via physical-level comparisons, while the second method, Functional Assurance, compares IP to a golden model using logical-level comparisons. Both methods are demonstrated to distinguish between tampered and untampered IP blocks, with a tolerable effect on IP timing and area.
APA, Harvard, Vancouver, ISO, and other styles
20

Jacob, Kabakci Nisha [Verfasser], Georg [Akademischer Betreuer] Sigl, Georg [Gutachter] Sigl, and Sebastian [Gutachter] Steinhorst. "Hardware Trojans and their Security Impact on Reconfigurable System-on-Chips / Nisha Jacob Kabakci ; Gutachter: Georg Sigl, Sebastian Steinhorst ; Betreuer: Georg Sigl." München : Universitätsbibliothek der TU München, 2020. http://d-nb.info/1220319899/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Weidler, Nathanael R. "Built-In Return-Oriented Programs in Embedded Systems and Deep Learning for Hardware Trojan Detection." DigitalCommons@USU, 2019. https://digitalcommons.usu.edu/etd/7620.

Full text
Abstract:
Microcontrollers and integrated circuits in general have become ubiquitous in the world today. All aspects of our lives depend on them from driving to work, to calling our friends, to checking our bank account balance. People who would do harm to individuals, corporations and nation states are aware of this and for that reason they seek to find or create and exploit vulnerabilities in integrated circuits. This dissertation contains three papers dealing with these types of vulnerabilities. The first paper talks about a vulnerability that was found on a microcontroller, which is a type of integrated circuit. The final two papers deal with hardware trojans. Hardware trojans are purposely added to the design of an integrated circuit in secret so that the manufacturer doesn’t know about it. They are used to damage the integrated circuit, leak confidential information, or in other ways alter the circuit. Hardware trojans are a major concern for anyone using integrated circuits because an attacker can alter a circuit in almost any way if they are successful in inserting one. A known method to prevent hardware trojan insertion is discussed and a type of circuit for which this method does not work is revealed. The discussion of hardware trojans is concluded with a new way to detect them before the integrated circuit is manufactured. Modern deep learning models are used to detect the portions of the hardware trojan called triggers that activate them.
APA, Harvard, Vancouver, ISO, and other styles
22

Banga, Mainak. "Testing and Verification Strategies for Enhancing Trust in Third Party IPs." Diss., Virginia Tech, 2010. http://hdl.handle.net/10919/30085.

Full text
Abstract:
Globalization in semiconductor industry has surged up the trend of outsourcing component design and manufacturing process across geographical boundaries. While cost reduction and short time to market are the driving factors behind this trend, the authenticity of the final product remains a major question. Third party deliverables are solely based on mutual trust and any manufacturer with a malicious intent can fiddle with the original design to make it work otherwise than expected in certain specific situations. In case such a backfire happens, the consequences can be disastrous especially for mission critical systems such as space-explorations, defense equipments such as missiles, life saving equipments such as medical gadgets where a single failure can translate to a loss of lives or millions of dollars. Thus accompanied with outsourcing, comes the question of trustworthy design - "how to ensure that integrity of the product manufactured by a third party has not been compromised". This dissertation aims towards developing verification methodologies and implementing non-destructive testing strategies to ensure the authenticity of a third party IP. This can be accomplished at various levels in the IC product life cycle. At the design stage, special testability features can be incorporated in the circuit to enhance its overall testability thereby making the otherwise hard to test portions of the design testable at the post silicon stage. We propose two different approaches to enhance the testability of the overall circuit. The first allows improved at-speed testing for the design while the second aims to exaggerate the effect of unwanted tampering (if present) on the IC. At the verification level, techniques like sequential equivalence checking can be employed to compare the third-party IP against a genuine specification and filter out components showing any deviation from the intended behavior. At the post silicon stage power discrepancies beyond a certain threshold between two otherwise identical ICs can indicate the presence of a malicious insertion in one of them. We have addressed all of them in this dissertation and suggested techniques that can be employed at each stage. Our experiments show promising results for detecting such alterations/insertions in the original design.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
23

Tselekounis, Ioannis. "Cryptographic techniques for hardware security." Thesis, University of Edinburgh, 2018. http://hdl.handle.net/1842/33148.

Full text
Abstract:
Traditionally, cryptographic algorithms are designed under the so-called black-box model, which considers adversaries that receive black-box access to the hardware implementation. Although a "black-box" treatment covers a wide range of attacks, it fails to capture reality adequately, as real-world adversaries can exploit physical properties of the implementation, mounting attacks that enable unexpected, non-black-box access, to the components of the cryptographic system. This type of attacks is widely known as physical attacks, and has proven to be a significant threat to the real-world security of cryptographic systems. The present dissertation is (partially) dealing with the problem of protecting cryptographic memory against physical attacks, via the use of non-malleable codes, which is a notion introduced in a preceding work, aiming to provide privacy of the encoded data, in the presence of adversarial faults. In the present thesis we improve the current state-of-the-art on non-malleable codes and we provide practical solutions for protecting real-world cryptographic implementations against physical attacks. Our study is primarily focusing on the following adversarial models: (i) the extensively studied split-state model, which assumes that private memory splits into two parts, and the adversary tampers with each part, independently, and (ii) the model of partial functions, which is introduced by the current thesis, and models adversaries that access arbitrary subsets of codeword locations, with bounded cardinality. Our study is comprehensive, covering one-time and continuous, attacks, while for the case of partial functions, we manage to achieve a stronger notion of security, that we call non-malleability with manipulation detection, that in addition to privacy, it also guarantees integrity of the private data. It should be noted that, our techniques are also useful for the problem of establishing, private, keyless communication, over adversarial communication channels. Besides physical attacks, another important concern related to cryptographic hardware security, is that the hardware fabrication process is assumed to be trusted. In reality though, when aiming to minimize the production costs, or whenever access to leading-edge manufacturing facilities is required, the fabrication process requires the involvement of several, potentially malicious, facilities. Consequently, cryptographic hardware is susceptible to the so-called hardware Trojans, which are hardware components that are maliciously implanted to the original circuitry, having as a purpose to alter the device's functionality, while remaining undetected. Part of the present dissertation, deals with the problem of protecting cryptographic hardware against Trojan injection attacks, by (i) proposing a formal model for assessing the security of cryptographic hardware, whose production has been partially outsourced to a set of untrusted, and possibly malicious, manufacturers, and (ii) by proposing a compiler that transforms any cryptographic circuit, into another, that can be securely outsourced.
APA, Harvard, Vancouver, ISO, and other styles
24

Boraten, Travis Henry. "Hardware Security Threat and Mitigation Techniques for Network-on-Chips." Ohio University / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1596031630118173.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Farag, Mohammed Morsy Naeem. "Architectural Enhancements to Increase Trust in Cyber-Physical Systems Containing Untrusted Software and Hardware." Diss., Virginia Tech, 2012. http://hdl.handle.net/10919/29084.

Full text
Abstract:
Embedded electronics are widely employed in cyber-physical systems (CPSes), which tightly integrate and coordinate computational and physical elements. CPSes are extensively deployed in security-critical applications and nationwide infrastructure. Perimeter security approaches to preventing malware infiltration of CPSes are challenged by the complexity of modern embedded systems incorporating numerous heterogeneous and updatable components. Global supply chains and third-party hardware components, tools, and software limit the reach of design verification techniques and introduce security concerns about deliberate Trojan inclusions. As a consequence, skilled attacks against CPSes have demonstrated that these systems can be surreptitiously compromised. Existing run-time security approaches are not adequate to counter such threats because of either the impact on performance and cost, lack of scalability and generality, trust needed in global third parties, or significant changes required to the design flow. We present a protection scheme called Run-time Enhancement of Trusted Computing (RETC) to enhance trust in CPSes containing untrusted software and hardware. RETC is complementary to design-time verification approaches and serves as a last line of defense against the rising number of inexorable threats against CPSes. We target systems built using reconfigurable hardware to meet the flexibility and high-performance requirements of modern security protections. Security policies are derived from the system physical characteristics and component operational specifications and translated into synthesizable hardware integrated into specific interfaces on a per-module or per-function basis. The policy-based approach addresses many security challenges by decoupling policies from system-specific implementations and optimizations, and minimizes changes required to the design flow. Interface guards enable in-line monitoring and enforcement of critical system computations at run-time. Trust is only required in a small set of simple, self-contained, and verifiable guard components. Hardware trust anchors simultaneously addresses the performance, flexibility, developer productivity, and security requirements of contemporary CPSes. We apply RETC to several CPSes having common security challenges including: secure reconfiguration control in reconfigurable cognitive radio platforms, tolerating hardware Trojan threats in third-party IP cores, and preserving stability in process control systems. High-level architectures demonstrated with prototypes are presented for the selected applications. Implementation results illustrate the RETC efficiency in terms of the performance and overheads of the hardware trust anchors. Testbenches associated with the addressed threat models are generated and experimentally validated on reconfigurable platform to establish the protection scheme efficacy in thwarting the selected threats. This new approach significantly enhances trust in CPSes containing untrusted components without sacrificing cost and performance.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
26

Hill, Jeremy Michael Olivar. "Detection of Avionics Supply Chain Non-control-flow Malware Using Binary Decompilation and Wavelet Analysis." University of Dayton / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1628159084278194.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Lejdemalm, Roger, and Daniel Andreasson. "Skadlig kod och sårbarheter i Windows : En studie i virusens historia och nutidens olika säkerhetsrisker." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-2270.

Full text
Abstract:

I dag kan man oftast läsa om olika säkerhetshot och risker en datoranvändare måste tänka på för att inte ge någon utomstående möjlighet att komma åt känslig och/eller privat information. Här talas det om nya virus och nya typer av trojaner som sprids som epidemier över Internet, och i bland handlar det om ett spionprogram som följer med en nedladdad fil. Det är svårt att hålla reda på alla typer av skadlig kod som nämns fast med ökad förståelse ökar också chanserna för att klara sig från smitta. Det har visat sig att utvecklingen av skadlig kod är lika stark som den inom kommersiella mjukvaror. Från persondatorns uppkomst i början av 80-talet och fram till i dag, har utveckling skett i alla områden av den skadliga kod det handlar om strategi, syfte och framförallt ren kodkomplexitet.

Dagens ledande leverantör av operativsystem och webbläsare, Microsoft, lovar allt mer sofistikerade säkerhetslösningar varje gång en ny version av ett program släpps. Framförallt nämndes det i samband med lanseringen av Windows Vista att säkerheten var det som stod högst på listan.

Vi har tillsammans med WM-data i Stockholm tagit fram en programvara för fjärradministration av Windows. Huvudmålet var att med hjälp av våra baskunskaper i programmering skapa ett program för Windows XP och Windows Vista där en rad funktioner skulle kunna fjärrstyras utan att en användare vid den drabbade datorn upptäckte intrånget.

I denna rapport beskrivs utvecklingen av programvaran och de tester som gjorts på de båda operativsystemen. Vidare delas begreppet ”skadlig kod” upp i kategorierna virus, maskar, trojaner samt rootkits och förklaras mer ingående tillsammans med en historisk bild över hur utvecklingen av skadlig kod har sett ut.


In media today, you often read about different security threats and risks that one has to be aware of. Many things must be taken into consideration in order to maintain your integrity and information secrecy. It might be new virus outbreak, a new trojan or some kind of spy ware that undetected finds the way to your computer. It’s hard to keep track of all terms and types of malicious code, and with greater understanding, the risk of infection decreases. The development when it comes to malicious code is as strong as the one in commercial software development. From the 80’s until present day, every area in the development of malicious code has evolved, from strategy and purpose to the pure complexity of the code.

Microsoft, the worlds leading supplier of operating systems and web browsers, ensure us with every new release, that measures has been taken in order to enhance the security features. As the new operating system Windows Vista was released, spokesmen said that the security was now the highest priority.

We have, together with WM-data in Stockholm, developed software for remote administration of Windows. The objectives where by using our limited programming skills only, to come up with a program for Windows XP and Windows Vista, where a number of functions could be remotely executed without alerting a user at the infected computer.

This report describes the development of the software together with test results of execution on both operating systems. Further on, the report discusses different types of malicious code, such as viruses, worms, Trojans and root kits, together with a historical study of the development of malicious code.

APA, Harvard, Vancouver, ISO, and other styles
28

Venugopalan, Vivek. "Enhancing Trust in Reconfigurable Hardware Systems." Diss., Virginia Tech, 2017. http://hdl.handle.net/10919/75212.

Full text
Abstract:
A Cyber-Physical System (CPS) is a large-scale, distributed, embedded system, consisting of various components that are glued together to realize control, computation and communication functions. Although these systems are complex, they are ubiquitous in the Internet of Things (IoT) era of autonomous vehicles/drones, smart homes, smart grids, etc. where everything is connected. These systems are vulnerable to unauthorized penetration due to the absence of proper security features and safeguards to protect important information. Examples such as the typewriter hack involving subversive chips resulting in leakage of keystroke data and hardware backdoors crippling anti-aircraft guns during an attack demonstrate the need to protect all system functions. With more focus on securing a system, trust in untrusted components at the integration stage is of a higher priority. This work builds on a red-black security system, where an architecture testbed is developed with critical and non-critical IP cores and subjected to a variety of Hardware Trojan Threats (HTTs). These attacks defeat the classic trusted hardware model assumptions and demonstrate the ability of Trojans to evade detection methods based on physical characteristics. A novel metric is defined for hardware Trojan detection, termed as HTT Detectability Metric (HDM) that leverages a weighted combination of normalized physical parameters. Security analysis results show that using HDM, 86% of the implemented Trojans were detected as compared to using power consumption, timing variation and resource utilization alone. This led to the formulation of the security requirements for the development of a novel, distributed and secure methodology for enhancing trust in systems developed under untrusted environments called FIDelity Enhancing Security (FIDES). FIDES employs a decentralized information flow control (DIFC) model that enables safe and distributed information flows between various elements of the system such as IP cores, physical memory and registers. The DIFC approach annotates/tags each data item with its sensitivity level and the identity of the participating entities during the communication. Trust enhanced FIDES (TE-FIDES) is proposed to address the vulnerabilities arising from the declassification process during communication between third-party soft IP cores. TE-FIDES employs a secure enclave approach for preserving the confidentiality of the sensitive information in the system. TE-FIDES is evaluated by targeting an IoT-based smart grid CPS application, where malicious third-party soft IP cores are prevented from causing a system blackout. The resulting hardware implementation using TE-FIDES is found to be resilient to multiple hardware Trojan attacks.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
29

Ba, Papa-Sidy. "Détection et prévention de Cheval de Troie Matériel (CTM) par des méthodes Orientées Test Logique." Thesis, Montpellier, 2016. http://www.theses.fr/2016MONTT271/document.

Full text
Abstract:
Pour réduire le coût des Circuits Intégrés (CIs), les entreprises de conception se tournent de plus en plus vers des fonderies basées dans des pays à faible coût de production (outsourcing). Cela a pour effet d’augmenter les menaces sur les circuits. En effet, pendant la fabrication,le CI peut être altéré avec l’insertion d’un circuit malicieux, appelé cheval de Troie Matériel (CTM). Ceci amène les vendeurs de CI à protéger leurs produits d’une potentielle insertion d’un CTM, mais également, d’en assurer l’authenticité après fabrication (pendant la phase de test).Cependant, les CTMs étant furtifs par nature, il est très difficile, voire impossible de les détecter avec les méthodes de test conventionnel, et encore moins avec des vecteurs de test aléatoires. C’est pourquoi nous proposons dans le cadre de cette thèse, des méthodes permettant de détecter et de prévenir l’insertion de CTM dans les CIs pendant leur fabrication.Ces méthodes utilisent des approches orientées test logique pour la détection de CTM aussi bien en phase de test (après fabrication du CI) qu’en fonctionnement normal (run-time).De plus, nous proposons des méthodes de prévention qui elles aussi s’appuient sur des principes de test logique pour rendre difficile, voire impossible l’insertion de CTM aussi bien au niveau netlist qu’au niveau layout
In order to reduce the production costs of integrated circuits (ICs), outsourcing the fabrication process has become a major trend in the Integrated Circuits (ICs) industry. As an inevitable unwanted side effect, this outsourcing business model increases threats to hardware products. This process raises the issue of un-trusted foundries in which, circuit descriptions can be manipulated with the aim to possibly insert malicious circuitry or alterations, referred to as Hardware Trojan Horses (HTHs). This motivates semiconductor industries and researchers to study and investigate solutions for detecting during testing and prevent during fabrication, HTH insertion.However, considering the stealthy nature of HTs, it is quite impossible to detect them with conventional testing or even with random patterns. This motivates us to make some contributions in this thesis by proposing solutions to detect and prevent HTH after fabrication (during testing).The proposed methods help to detect HTH as well during testing as during normal mode(run-time), and they are logic testing based.Furthermore, we propose prevention methods, which are also logic testing based, in order tomake harder or quasi impossible the insertion of HTH both in netlist and layout levels
APA, Harvard, Vancouver, ISO, and other styles
30

Blikstein, Paulo 1972. "The Trojan horse as a Trojan horse." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/61130.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, School of Architecture and Planning, Program in Media Arts and Sciences, 2002.
Includes bibliographical references (leaves 136-140).
This thesis proposes a framework to model intervention in education systems using technology: the Learning Atmosphere. The motivation is to show that innovative learning with expressive technologies can happen even in economically disadvantaged regions, such as public education systems in Brazil, where our case studies took place. The contribution of the thesis is to explore ways in which mutual enrichment can be achieved through collective displacements of habits and mindsets taken for granted. The case studies demonstrate the importance and possibility of a powerful learning experience that builds up from the local culture and expertise, elements often disregarded in schools. Technology plays a central role, enabling diverse and innovative ways of working, expressing and building. In addition, it makes possible epistemological diversity, empowering of students and fulfillment to teachers, reinforcing the community's own livelihood. The core elements within the Learning Atmosphere are: -- Enhance the concept of generative themes using technology. -- Mix and match expressive media, especially low-cost technologies. -- Invest on relationship building and challenge established power relations. The legend of the Trojan Horse has the important role of warning us against the easy way into schools, the trivialization of ideas and the superficial experiences that do not change the praxis and mindsets in schools.
Paulo Blikstein.
S.M.
APA, Harvard, Vancouver, ISO, and other styles
31

Geigel, Arturo. "Unsupervised Learning Trojan." NSUWorks, 2014. http://nsuworks.nova.edu/gscis_etd/17.

Full text
Abstract:
This work presents a proof of concept of an Unsupervised Learning Trojan. The Unsupervised Learning Trojan presents new challenges over previous work on the Neural network Trojan, since the attacker does not control most of the environment. The current work will presented an analysis of how the attack can be successful by proposing new assumptions under which the attack can become a viable one. A general analysis of how the compromise can be theoretically supported is presented, providing enough background for practical implementation development. The analysis was carried out using 3 selected algorithms that can cover a wide variety of circumstances of unsupervised learning. A selection of 4 encoding schemes on 4 datasets were chosen to represent actual scenarios under which the Trojan compromise might be targeted. A detailed procedure is presented to demonstrate the attack's viability under assumed circumstances. Two tests of hypothesis concerning the experimental setup were carried out which yielded acceptance of the null hypothesis. Further discussion is contemplated on various aspects of actual implementation issues and real world scenarios where this attack might be contemplated.
APA, Harvard, Vancouver, ISO, and other styles
32

Lafrenz, Nicholas K. "Trojan Circuit Simulation and Evaluation." Cleveland, Ohio : Case Western Reserve University, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=case1265900150.

Full text
Abstract:
Thesis (Master of Sciences (Engineering))--Case Western Reserve University, 2010
Department of EECS - Computer Engineering Title from PDF (viewed on 2010-05-25) Includes abstract Includes bibliographical references and appendices Available online via the OhioLINK ETD Center
APA, Harvard, Vancouver, ISO, and other styles
33

Badier, Hannah. "Transient obfuscation for HLS security : application to cloud security, birthmarking and hardware Trojan defense." Thesis, Brest, École nationale supérieure de techniques avancées Bretagne, 2021. https://tel.archives-ouvertes.fr/tel-03789700.

Full text
Abstract:
La mondialisation croissante de la chaîne d'approvisionnement des semi-conducteurs, ainsi que la complexité et la diversité croissantes des flux de conception de matériel, ont entraîné une recrudescence des menaces de sécurité : risques de vol et de revente de propriété intellectuelle, de rétro-ingénierie et d'insertion de code malveillant sous la forme de chevaux de Troie pendant la fabrication et au moment de la conception ont fait l'objet d'une recherche croissante ces dernières années. Cependant, les menaces lors de la synthèse de haut niveau (HLS), où une description algorithmique est transformée en une implémentation matérielle de niveau inférieur, n'ont été envisagées que récemment, et peu de solutions ont été proposées jusqu'à présent. Dans cette thèse, nous nous concentrons sur la sécurisation des conceptions lors de la synthèse comportementale à l'aide d'un outil HLS basé sur le cloud ou interne, mais non fiable. Nous introduisons une nouvelle méthode de protection au moment de la conception appelée offuscation, où le code source de haut niveau est obscurci à l'aide de techniques basées sur des clés, et désobscurci après HLS au niveau du transfert de registre. Cette méthode en deux étapes garantit une fonctionnalité de conception correcte et une faible surcharge de conception. Nous proposons trois façons d'intégrer l'offuscation transitoire dans différents mécanismes de sécurité. Tout d'abord, nous montrons comment il peut être utilisé pour empêcher le vol de propriété intellectuelle et la réutilisation illégale dans un scénario HLS basé sur le cloud. Ensuite, nous étendons ce travail au filigranes numériques, en exploitant les effets secondaires de l'offuscation transitoire sur les outils HLS pour identifier les conceptions volées. Enfin, nous montrons comment cette méthode peut également être utilisée contre les chevaux de Troie matériels, à la fois en empêchant l'insertion et en facilitant la détection
The growing globalization of the semiconductor supply chain, as well as the increasing complexity and diversity of hardware design flows, have lead to a surge in security threats: risks of intellectual property theft and reselling, reverse-engineering and malicious code insertion in the form of hardware Trojans during manufacturing and at design time have been a growing research focus in the past years. However, threats during highlevel synthesis (HLS), where an algorithmic description is transformed into a lower level hardware implementation, have only recently been considered, and few solutions have been given so far. In this thesis, we focus on how to secure designs during behavioral synthesis using either a cloud-based or an internal but untrusted HLS tool. We introduce a novel design time protection method called transient obfuscation, where the high-level source code is obfuscated using key-based techniques, and deobfuscated after HLS at register-transfer level. This two-step method ensures correct design functionality and low design overhead. We propose three ways to integrate transient obfuscation in different security mechanisms. First, we show how it can be used to prevent intellectual property theft and illegal reuse in a cloud-based HLS scenario. Then, we extend this work to watermarking, by exploiting the side-effects of transient obfuscation on HLS tools to identify stolen designs. Finally, we show how this method can also be used against hardware Trojans, both by preventing insertion and by facilitating detection
APA, Harvard, Vancouver, ISO, and other styles
34

Russell, April A. (April Anne) 1981. "Trojan asteroid spectroscopy and space weathering." Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/28614.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Earth, Atmospheric, and Planetary Sciences, 2004.
Includes bibliographical references (leaves 48-49).
Trojan asteroids orbit the Sun at Jupiter's L4 and L5 stability points. They are included in the D-class group of asteroids because of their characteristically steep spectral slope. In accordance with spectra of other asteroid classes, we expected that the larger the diameter is of a D-class asteroid, the redder (visually) the asteroid should be in the visible spectrum. Approximately ninety Trojan asteroids have been examined, fourteen of which come from our own observations, and five of which are small and come from the SMASS I data set. The results did not confirm our original hypothesis. Instead, space weathering appears to affect Trojans in a different way than it does other asteroid classes due to their different composition.
by April A. Russell.
S.M.
APA, Harvard, Vancouver, ISO, and other styles
35

Waegner, Rena Hinrika [Verfasser], Lutz [Akademischer Betreuer] Trojan, and Carsten [Akademischer Betreuer] Gründker. "Expression von RANK / RANKL im Harnblasenkarzinom / Rena Hinrika Waegner. Betreuer: Lutz Trojan. Gutachter: Lutz Trojan ; Carsten Gründker." Göttingen : Niedersächsische Staats- und Universitätsbibliothek Göttingen, 2015. http://d-nb.info/1080361693/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Otterheim, Lena Royalz. "Den Trojanska Hästen." Thesis, Konstfack, Textil, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:konstfack:diva-7176.

Full text
Abstract:
Jag väver mycket. Jag började se på väven som en symbol för minnen och jag vävde in hudens arv genom generationer. När jag ser på väv ser jag hud och när jag ser på hud ser jag väv.  Med hjälp av 3D-pusselteknik bygger jag idén om människans relation till naturen. Material: Kolmårdsmarmor, textil, pigmenterat gips och metall. Och en läppglansig yta.     Gestaltande form: En häst på minecraftkuber. Höjd 3m, Diameter 1m.
APA, Harvard, Vancouver, ISO, and other styles
37

Geller, Grace. "Translations and adaptations of Euripides' Trojan Women /." Norton, Mass. : Wheaton College, 2010. http://hdl.handle.net/10090/15122.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Ceccaroni, Marta. "Natural and perturbed dynamics about Trojan bodies." Thesis, University of Strathclyde, 2013. http://oleg.lib.strath.ac.uk:80/R/?func=dbin-jump-full&object_id=20280.

Full text
Abstract:
This thesis analyses the dynamics of a massless spacecraft (or point mass) around an inhomogeneous Trojan body in a system composed of three primaries lying on a plane at the vertexes of an equilateral triangle, with their mutual positions fixed over the course of the motion. This configuration will here be referred to as "Lagrangian" or "equilateral triangle", implicitly meaning that the three primaries lie on a common plane. To this end two suitable models are identified to represent the system, depending on the distance from the primary. The first model, adopted for use close to the asteroid, where the dynamics is dominated by this sole body, is the Restricted Two Body Problem. In this model the inhomogeneities of the asteroid are taken into account as they have a dominant effect on the dynamics of the spacecraft. This model will therefore be referred to as the Inhomogeneous R2BP. The second model is the Lagrangian Circular Restricted Four Body Problem (CR4BP), with the primaries lying on the same plane, which is adopted far from the asteroid1, where the gravitational perturbations of the Sun and Jupiter are dominant while the inhomogeneities of the asteroid are negligible. Low-thrust propulsion perturbations are incorporated into this model. The possibility to determine the range of validity of each model using an application of a Weak Stability Boundary (WSB) theory, a relatively novel approach to dynamics for designing low-energy transfers, is investigated and applied. A completely new, analytical definition of the Weak Stability Boundary, coherent with the previous algorithmic definitions, is thus developed in this work for the first time. The existing (algorithmic) WSB theory, previously always treated numerically and mainly applied to Circular Restricted Three Body Problems (CR3BP), is here rebuilt from an analytical point of view and extended to the Lagrangian CR4BP. Moreover some topological properties of the WSB are introduced and to analytical Moreover some topological properties of the WSB are introduced and applied, leading to analytical estimations of the set of stable orbits around the small primary. An estimation of the range of validity of the models is thus derived, which is based on the region of stable orbits. The dynamics in a Restricted Two Body Problem incorporating the shape/density inhomogeneities of the body, is analysed, suitable for modelling the spacecraft dynamics inside the estimated reference region. The irregular gravitational potential is formulated using spherical harmonics, the coefficients describing the physical properties of the body. An analytical, arbitrary degree, perturbation theory, assuming the spherical harmonics of the body as known, is derived. This result generalizes to arbitrary degree the previous closed form (i.e. valid for every eccentricity) perturbation theories which are usually limited to second degree (namely to the inclusion of two spherical harmonics coefficients). The theory here developed, double averaging the system by means of two canonic Lie transformations, leads to an integrable, arbitrarily accurate approximation of the system whose explicit second order Hamiltonian formulation, derived in closed form, is thus stated. From this theory an analytic method for determining initial conditions for frozen orbits around any irregular body is derived for the first time. Such Frozen orbits are orbits with no secular perturbations in the inclination, argument of pericentre, and eccentricity. Results are shown for a major Jupiter Trojan: 624-Hektor. As the spherical harmonics of this Trojan are unknown and not present in any previous literature, a method is here applied, which deduces these coefficients from a three dimensional polyhedric model of the body, assuming a constant density. Finally the dynamics of the Lagrangian CR4PB is studied, for modelling the system outside the estimated reference boundary. The natural equilibria and Lyapunov stability of the linearized system are analysed. A study of the changes in the topology of the linearly stable zone for different conceivable masses of the Trojan is shown in this work for the first time. Low-thrust propulsion perturbations, in all previous literature confined to two and three body problems, are here incorporated into the four bodies system examined, enabling the generation of surfaces of artificial equilibria. Applications are shown for the main example of Lagrangian configuration in the Solar system, the Sun-Jupiter-Trojan-spacecraft system. Numerical simulations for 624-Hektor confirm the validity of the model once its real tadpole orbit around the triangular point is taken into account.
APA, Harvard, Vancouver, ISO, and other styles
39

Mischel, Magnus. "Heuristisk detektering av trojaner." Thesis, Linköping University, Department of Electrical Engineering, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2826.

Full text
Abstract:

The heuristic methods used by the anti-trojan application TrojanHunter have been evaluated. The evaluation shows that the heuristic scan engine of TrojanHunter has a very good detection ratio and that the detection ratio can be even further improved by implementing the suggested improvements, the most important of which is a white list to avoid misidentifying files that are known not to be trojans.

APA, Harvard, Vancouver, ISO, and other styles
40

Hadjicosti, Ioanna. "Aischylos and the Trojan cycle : the lost tragedies." Thesis, University College London (University of London), 2008. http://discovery.ucl.ac.uk/1443963/.

Full text
Abstract:
This dissertation explores Aischylos' telling of myths from the Trojan cycle. Aischylos worked extensively on the story of the Trojan War in his lost corpus. He came across the stories in epic songs and brought them from epos to theatre, some of them for the first time. However, although his material came primarily from the Epic Cycle, he also drew on other sources such as Hesiod, lyric poetry and early tragedy. His reception of the stories was not passive. Aischylos endorsed but also adapted and sometimes rejected elements that he found in the earlier tradition and by doing so he reshaped many of the stories. Though the texts are long since lost, we can still detect many innovations in Aischylos' treatment of the Trojan war. The new elements that he inserted have various functions and objectives. Some may have served to minimise the distance between the mythical world of epos and that of his contemporary audience, with adjustments to the myth to make it conform to the value system of his own era and reflect ideas, social structures and politics of fifth century Athens. Some changes are meant to increase the tension in the stories and make them more shocking in order to generate stronger feelings among the audience. Passion, pain and loss were magnified to serve the purposes of the poet where needed. Aischylos' creative re-writing of one of the greatest and most famous stories in antiquity made an impression on fifth century Athens, as its reception in literature and art in general suggests. His impact on subsequent tragedy in particular, both Greek and Latin, is evident though individual poets reacted in different ways to his work, his influence could not be ignored.
APA, Harvard, Vancouver, ISO, and other styles
41

Trojan, Adam Janusz [Verfasser]. "Leberteilresektion bei Kindern und Jugendlichen / Adam Janusz Trojan." Berlin : Medizinische Fakultät Charité - Universitätsmedizin Berlin, 2019. http://d-nb.info/1180388038/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Deet, April A. (April Anne). "Effects of space weathering on the Trojan asteroids." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/117441.

Full text
Abstract:
Thesis: S.B., Massachusetts Institute of Technology, Department of Earth, Atmospheric, and Planetary Sciences, 2002.
Cataloged from PDF version of thesis. "The pagination in this thesis reflects how it was delivered to the Institute Archives and Special Collections. Thesis was submitted to the Institute Archives without all the required signatures"--Disclaimer Notice page.
Includes bibliographical references (page 40).
Trojan asteroids orbit at Jupiter's L4 and L5 points. They are included in the D-class of asteroids because of their steep spectral slope. According to spectra of other asteroid classes, the larger the diameter is of a D-class asteroid, the redder the asteroid should be in the visible spectrum. We examined a total of fifteen asteroids, five (from the SMASS 1 data set) were small, and ten (newly collected data) were large. The actual results did not match our expected results, most likely due to the large error bars and the small data set. Space weathering may affect Trojans in the same way as it does other asteroid classes. To know with certainty, further investigation is needed.
by April A. Deet.
S.B.
APA, Harvard, Vancouver, ISO, and other styles
43

Coo, Lyndsay Mei-Ling. "Sophocles' Trojan fragments : a commentary on selected plays." Thesis, University of Cambridge, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.609525.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Divakarla, Shiva Kamini. "Ion Implanted ‘Trojan Horse’ surfaces with antimicrobial activity." Thesis, The University of Sydney, 2018. http://hdl.handle.net/2123/18661.

Full text
Abstract:
INTRODUCTION: Hospital acquired infections (HAIs) are the most frequently occurring adverse event in healthcare delivery globally and result in prolonged hospitalization. Implantable devices are commonly affected by these infections due to the formation of biofilms. Gallium (Ga) has been shown to prevent biofilm formation due to its disruption of iron-dependent bacterial growth processes. Defensin, a naturally occurring peptide, has also shown significant antimicrobial qualities. Hence, the synergistic effect of the two strategies is proposed for study in the form of a surface modified antimicrobial polymer to prevent biofilm formation on implantable devices. AIMS AND HYPOTHESES: To develop a surface modification technology, which imparts antimicrobial activity and biocompatibility to the implantable polymer-based devices. More specifically, we aimed to prepare, modify and characterize surface properties of a gallium implanted, defensin immobilized biopolymer and assess its ability to prevent biofilm formation, bacterial adhesion and cytocompatibility. MATERIALS AND METHODS: PLA films were optimized and fabricated, after which they underwent plasma treatment in air or Ga implantation. Samples were characterized using AFM, PFQNM, nano thermal analysis and LCR. Following this, samples had defensin immobilized on their surfaces and this was to be confirmed via Tween-20 wash and subsequent PFQNM analysis. Defensin alone was tested in solution via the Disc Diffusion Assay to assess its capability as an antimicrobial agent. The surfaces then were subjected to a Biofilm formation assay for a period of 14 days after which they were stained and imaged using CLSM. The surfaces were also tested for their ability to invoke an inflammatory response via FBGC formation by M0 phenotype macrophages (through immunofluorescence staining and CLSM) and via measurement of pro-inflammatory cytokine IL-1β (using ELISA) by these same cells. The QBlue assay was used to measure their viability. Finally, the surfaces were assessed for the initial attachment and morphology of myoblasts and for their osteogenic differentiation potential of these cells via the ALP assay which was normalized using total protein content (through the BCA assay). RESULTS AND DISCUSSION: Ga implantation resulted in the increase in carbonization of the surface layer and accordingly, the stiffness of the sample. The increasing fluence of Ga ions also resulted in inconsistencies in ion implantation which could have follow on effects on peptide immobilization due to increased polymer crosslinking. Linker-free immobilization of defensin was confirmed on the Plasma treated and Ga treated surfaces. Both gallium implantation and defensin immobilization independently and synergistically proved to impart antimicrobial activity to the surfaces and the antimicrobial effects of hBD-1 appear to be potentiated by surface immobilization. Defensin immobilization however, appeared to be inconsistent with increasing Ga fluence. IL-1β formation expression increased with decreasing Ga concentration suggesting less inflammation with increasing Ga dose and the increased with introduction of De also. FBGC formation was significantly decreased in all Ga and Ga De treated groups in comparison with PLA. Myoblast morphology appeared to be negatively affected by De on the Ga 14 De and Ga 15 De samples, potentially due to the effects of inconsistent surface stiffness and surface charge. There were no significant changes in ALP production between the PLA control and any other treated sample. CONCLUSION: This novel therapy has the potential to prevent biofilm infection and opens avenues for future research such as in vivo studies, and the viability of using other antimicrobial peptides as linkerfree immobilization has been made possible.
APA, Harvard, Vancouver, ISO, and other styles
45

Rudolph, Nicole [Verfasser], Lutz [Akademischer Betreuer] Trojan, Lutz [Gutachter] Trojan, and Günter [Gutachter] Emons. "Der Östrogenrezeptor ERβ unter dem Einfluss selektiver Östrogenrezeptorliganden in kastrationsresistenten Prostatakarzinomzellen / Nicole Rudolph ; Gutachter: Lutz Trojan, Günter Emons ; Betreuer: Lutz Trojan." Göttingen : Niedersächsische Staats- und Universitätsbibliothek Göttingen, 2020. http://d-nb.info/1213520460/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Courbon, Franck. "Rétro-conception matérielle partielle appliquée à l'injection ciblée de fautes laser et à la détection efficace de Chevaux de Troie Matériels." Thesis, Saint-Etienne, EMSE, 2015. http://www.theses.fr/2015EMSE0788/document.

Full text
Abstract:
Le travail décrit dans cette thèse porte sur une nouvelle méthodologie de caractérisation des circuits sécurisés basée sur une rétro-conception matérielle partielle : d’une part afin d’améliorer l’injection de fautes laser, d’autre part afin de détecter la présence de Chevaux de Troie Matériels (CTMs). Notre approche est dite partielle car elle est basée sur une seule couche matérielle du composant et car elle ne vise pas à recréer une description schématique ou fonctionnelle de l’ensemble du circuit.Une méthodologie invasive de rétro-conception partielle bas coût, rapide et efficace est proposée. Elle permet d’obtenir une image globale du circuit où seule l’implémentation des caissons des transistors est visible. La mise en œuvre de cette méthodologie est appliquée sur différents circuits sécurisés. L’image obtenue selon la méthodologie déclinée précédemment est traitée afin de localiser spatialement les portes sensibles, voire critiques en matière de sécurité. Une fois ces portes sensibles identifiées, nous caractérisons l’effet du laser sur différentes parties de ces cellules de bases et nous montrons qu’il est possible de contrôler à l’aide d’injections de fautes laser la valeur contenue dans ces portes. Cette technique est inédite car elle valide le modèle de fautes sur une porte complexe en technologie 90 nm. Pour finir une méthode de détection de CTMs est proposée avec le traitement de l’image issue de la rétro-conception partielle. Nous mettons en évidence l’ajout de portes non répertoriées avec l’application sur un couple de circuits. La méthode permet donc de détecter, à moindre coût, de manière rapide et efficace la présence de CTMs
The work described in this thesis covers an integrated circuit characterization methodology based on a partial hardware reverse engineering. On one hand in order to improve integrated circuit security characterization, on the other hand in order to detect the presence of Hardware Trojans. Our approach is said partial as it is only based on a single hardware layer of the component and also because it does not aim to recreate a schematic or functional description of the whole circuit. A low cost, fast and efficient reverse engineering methodology is proposed. The latter enables to get a global image of the circuit where only transistor's active regions are visible. It thus allows localizing every standard cell. The implementation of this methodology is applied over different secure devices. The obtained image according to the methodology declined earlier is processed in order to spatially localize sensible standard cells, nay critical in terms of security. Once these cells identified, we characterize the laser effect over different location of these standard cells and we show the possibility with the help of laser fault injection the value they contain. The technique is novel as it validates the fault model over a complex gate in 90nm technology node.Finally, a Hardware Trojan detection method is proposed using the partial reverse engineering output. We highlight the addition of few non listed cells with the application on a couple of circuits. The method implementation therefore permits to detect, without full reverse-engineering (and so cheaply), quickly and efficiently the presence of Hardware Trojans
APA, Harvard, Vancouver, ISO, and other styles
47

Sanderson, Thomas J. "Exploring design concepts for siderophore-fluoroquinolone Trojan horse antimicrobials." Thesis, University of York, 2016. http://etheses.whiterose.ac.uk/15811/.

Full text
Abstract:
Urgent action is required to combat the ongoing threat of antimicrobial resistance. Trojan horse conjugates, where antimicrobials are linked to a nutrient carrier, can evade permeability-related resistance through active transport of drugs into bacterial cells. The work presented herein explores modification of the linker moiety between a citrate siderophore and ciprofloxacin, as well as the addition of glycosyl groups to catecholate siderophore moieties to mimic the salmochelins; stealth siderophores which can evade the mammalian defence protein siderocalin. Two linkers were investigated, one containing a carbamate and the other a disulfide bond neighbouring a carbamate group. These were chosen to give intracellular release of the antimicrobial, either by the action of carboxylesterases or through reduction of the disulfide bond by thiolate anions in the cytoplasm, respectively. A carbamate-linked conjugate was synthesised and screened against wild type E. coli, and demonstrated lower antimicrobial activity than that for the parent drug. Screening against a bacterial strain lacking the outer membrane ferric citrate receptor FecA demonstrated that FecA is not essential for uptake of the synthesised conjugate. The synthesis of a disulfide linked conjugate was unsuccessful, due to release of free ciprofloxacin during the final deprotection step. A salmochelin-inspired conjugate was synthesised. Whilst it demonstrated reduced antimicrobial activity against wild type E. coli in iron rich media, compared to the parent drug, higher antimicrobial activity was observed in iron-limited media, suggesting active uptake. A DNA gyrase assay showed that the inhibitory activity of this conjugate was lower than the free drug, suggesting that the antimicrobial activity observed under iron deficiency may be due extracellular iron sequestration by the siderophore.
APA, Harvard, Vancouver, ISO, and other styles
48

Herzogenrath, Bern. "trumped!: remote|control, 2 trojan horses (and 3 knocks)." Universität Leipzig, 2020. https://ul.qucosa.de/id/qucosa%3A71590.

Full text
Abstract:
Neoliberalism has been on the rise at least since the mid-1980s. The economization of the social and the increasing globalization of capital show all the characteristics of a neoliberal governmentality, as Michel Foucault has analyzed it (cf. Foucault 2008). Gilles Deleuze described this process as a new transformation of the disciplinary society into a control society, which he briefly sketched and described in his far-sighted and ‘prophetic’ essay (cf. Deleuze 1992). However, it is not just as if Deleuze is saying “Fuck ould Foucault, move over.” Rather, Deleuze shows that Foucault’s analysis revealed that the disciplinary society (with its heyday in the 18th, 19th, and much of the 20th century) was only the actual (still present but disappearing) of the then pertinent predicament, whereas the society of control was already chomping-
APA, Harvard, Vancouver, ISO, and other styles
49

Du, Dongdong. "Hardware Trojan Detection Using Multiple-Parameter Side-Channel Analysis." Case Western Reserve University School of Graduate Studies / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=case1278702158.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Ali, Stuart Alvaro. "Transferrin trojan horses : a novel approach for drug delivery?" Thesis, Brunel University, 1999. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.285047.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography