Trojan Horse

View this topic in
The Trojan Horse is a tale from the Trojan War, as told in Virgil's Latin epic poem The Aeneid, also by Dionysius, Apollodorus and Quintus of Smyrna. (Wikipedia.org)






Conferences related to Trojan Horse

Back to Top

2013 Design, Automation & Test in Europe Conference & Exhibition (DATE 2013)

DATE is the complete event for the European electronic and test community. A leading world conference and exhibition, DATE unites 2,000 professionals with approximately 60 exhibiting companies, cutting edge R&D, industrial designers and technical managers from around the world.

  • 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE 2012)

    DATE is the complete event for the European electronic system and test community. A leading world conference and exhibition, DATE unites 2,000 professionals with some 60 exhibiting companies, cutting edge R&D, industrial designers and technical managers from around the world.

  • 2011 Design, Automation & Test in Europe Conference & Exhibition (DATE 2011)

    DATE is the complete event for the European electronic system and test community. A world leading conference and exhibition, DATE unites 2,000 professionals with some 60 exhibiting companies, cutting edge R&D, industrial designers and technical managers from around the world.

  • 2010 Design, Automation & Test in Europe Conference & Exhibition (DATE 2010)

    All aspects of research into technologies for electronic and (embedded) systems engineering. It covers the design process, test, and tools for design automation of electronic products ranging from integrated circuits to distributed large-scale systems.

  • 2009 Design, Automation & Test in Europe Conference & Exhibition (DATE 2009)

    The Design, Automation, and Test in Europe (DATE) conference is the world's premier conference dedicated to electronics system design & test. The technical programme features: Four distinctive and integrated themes, covering all aspects of systems design and engineering. Two special days are focusing on SoC Development Strategies and Multicore Applications.

  • 2008 Design, Automation & Test in Europe Conference & Exhibition (DATE 2008)

    The 11th DATE conference and exhibition is the main European event bringing together designers and design automation users, researchers and vendors, as well as specialists in the hardware and software design, test and manufacturing of electronic circuits and systems. It puts strong emphasis on ICs/SoCs, reconfigurable hardware and embedded systems, including embedded software. The five-day event consists of a conference with plenary invited papers, regular papers, panels, hot-topic sessions, tutorials.


2013 IEEE 10th International Conference on Networking, Sensing and Control (ICNSC)

The main theme of the conference is Technology for efficient green networks . It will provide a remarkable opportunity for the academic and industrial communities to address new challenges and share solutions, and discuss future research directions.

  • 2012 9th IEEE International Conference on Networking, Sensing and Control (ICNSC)

    This conference will provide a remarkable opportunity for the academic and industrial community to address new challenges and share solutions, and discuss future research directions in the area of intelligent transportation systems and networks as well other areas of networking, sensing and control. It will feature plenary speeches, industrial panel sessions, funding agency panel sessions, interactive sessions, and invited/special sessions. Contributions are expected from academia, industry, and government agencies.

  • 2011 IEEE International Conference on Networking, Sensing and Control (ICNSC)

    The main theme of the conference is Next Generation Infrastructures . Infrastructures are the backbone of the economy and society. Especially the network bound infrastructures operated by public utilities and network industries provide essential services that are enabling for almost every economic and social activity. The crucial role of the infrastructure networks for energy and water supply, transportation of people and goods, and provision of telecommunication and information services.

  • 2010 International Conference on Networking, Sensing and Control (ICNSC)

    Provide a remarkable opportunity for the academic and industrial community to address new challenges and share solutions, and discuss future research directions.

  • 2009 International Conference on Networking, Sensing and Control (ICNSC)

    The main theme of the conference is advanced technologies for safety and functional maintenance. The real challenge is to obtain advanced control technology for safety and management technology and to construct an information system to share information on safetytechnology and on investigated accidents.

  • 2008 IEEE International Conference on Networking, Sensing and Control (ICNSC)

    Provide a remarkable opportunity for the academic and industrial community to address new challenges and share solutions, and discuss future research directions.

  • 2007 IEEE International Conference on Networking, Sensing and Control (ICNSC)

  • 2006 IEEE International Conference on Networking, Sensing and Control (ICNSC)


2013 International Conference on Machine Learning and Cybernetics (ICMLC)

Statistical Machine Learning, Intelligent & fuzzy control, Pattern Recognition , Ensemble method, Evolutionary computation, Fuzzy & rough set, Data & web mining , Intelligent Business Computing , Biometrics , Bioinformatics , Information retrieval, Cybersecurity, Web intelligence and technology, Semantics & ontology engineering, Social Networks & Ubiquitous Intelligence, Multicriteria decision making, Soft Computing, Intelligent Systems, Speech, Image & Video Processing, Decision Support System

  • 2012 International Conference on Machine Learning and Cybernetics (ICMLC)

    Adaptive systems, Pattern Recognition, Biometrics, Inductive learning, Evolutionary computation, Bioinformatics, Data mining, Information retrieval, Intelligent agent, Financial engineering, Rough Set, Applications.

  • 2011 International Conference on Machine Learning and Cybernetics (ICMLC)

    Adaptive systems, Neural net and support vector machine, Business intelligence, Hybrid and nonlinear system, Biometrics, Fuzzy set theory, fuzzy control and system, Bioinformatics, Knowledge management, Data and web mining, Information retrieval, Intelligent agent, Intelligent and knowledge based system, Financial engineering, Rough and fuzzy rough set, Inductive learning, Networking and information security, Geoinformatics, Evolutionary computation, Pattern Recognition, Ensemble method, Logistics.

  • 2010 International Conference on Machine Learning and Cybernetics (ICMLC)

    Adaptive systems, Neural net and support vector machine, Business intelligence, Hybrid and nonlinear system, Biometrics, Fuzzy set theory, fuzzy control and system, Bioinformatics, Knowledge management, Data and web mining, Information retrieval, Intelligent agent, Intelligent and knowledge based system, Financial engineering, Rough and fuzzy rough set, Inductive learning, Networking and information security, Geoinformatics, Evolutionary computation, Pattern Recognition, Ensemble method, Logistics, Informat


2011 3rd International Conference on Multimedia Information Networking and Security (MINES)

Multimedia computing and intelligence Information networking and communication Service science and Intelligence Multimedia information security Communication and network security

  • 2010 International Conference on Multimedia Information Networking and Security (MINES)

    To provide a platform for worldwide researchers and engineers to exchange the latest research results on multimedia information services, with the focuses on: Multimedia computing and intelligence; Information networking and communication; Service science and Intelligence; Multimedia information security; Communication and network security

  • 2009 International Conference on Multimedia Information Networking and Security (MINES 2009)

    The conference aims to provide a platform for worldwide researchers and engineers to exchange the latest research results on multimedia information services, with the focuses on networking and security.


2011 3rd International Conference on Networking and Digital Society (ICNDS)

The aim of ICNDS 2011 is to provide a platform for researchers and engineers to present their research results and development activities in Networking and Digital Society. It also provides opportunities for the delegates to exchange new ideas and application experiences, to find global partners for future collaboration.


More Conferences

Periodicals related to Trojan Horse

Back to Top

Security & Privacy, IEEE

IEEE Security & Privacy seeks to stimulate and track advances in security, privacy, and dependability and present these advances for a broad cross-section of academic researchers and industry practitioners. IEEE Security & Privacy aims to provide a unique combination of research articles, case studies, tutorials, and regular departments covering diverse aspects of security and dependability of computer-based systems, including legal ...




Xplore Articles related to Trojan Horse

Back to Top

Triggering Trojans in SRAM circuits with X-propagation

Senwen Kan; Jennifer Dworak 2014 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT), 2014

Over the past several years, there has been growing concern regarding the possibility that Hardware Trojan Horse circuits may be present in 3rd party IP. In this paper, we focus specifically on 3rd party IP related to Static Random-Access Memories (SRAMs), and we demonstrate that some Trojans in production-worthy SRAM circuits can easily evade standard verification techniques. We then describe ...


Extended abstract: Designer’s hardware Trojan horse

Yousra Alkabani; Farinaz Koushanfar 2008 IEEE International Workshop on Hardware-Oriented Security and Trust, 2008

We introduce the first approach for pre-synthesis embedding of hardware Trojan horses (HTHs) by the designer. The embedded HTH gives the designer a low layer control over the hardware that can be exploited post-manufacturing. We identify the essential components for the exploit, outline the pre-synthesis implementation, and discuss detection. The new HTH embedding approach is low- overhead, effective, and hard ...


Countering trusting trust through diverse double-compiling

D. A. Wheeler 21st Annual Computer Security Applications Conference (ACSAC'05), 2005

An air force evaluation of Multics, and Ken Thompson's famous Turing award lecture "reflections on trusting trust, " showed that compilers can be subverted to insert malicious Trojan horses into critical software, including themselves. If this attack goes undetected, even complete analysis of a system's source code can not find the malicious code that is running, and methods for detecting ...


Classification Algorithms of Trojan Horse Detection Based on Behavior

Qin-Zhang Chen; Rong Cheng; Yu-Jie Gu 2009 International Conference on Multimedia Information Networking and Security, 2009

Current anti-Trojan is almost signature-based strategies, which cannot detect new one. Behavior analysis, with the ability to detect Trojans with unknown signatures, is a technique of initiative defense. However, current behavior analysis based anti-Trojan strategies have the following problems: high false or failure alarm rate, poor efficiency, and poor user-friendly interface design, etc. The paper works on the design of ...


Trusted Computing based open environment user authentication model

Zubair Ahmad; Jamalul-Lail Ab Manan; Suziah Sulaiman 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE), 2010

In federated identity management systems identity providers authenticate users of its realm via single sign-on and forward authentication assertion as a response to the service provider's requests. Secure single sign-on authentication is always a challenging task in an open environment such as in Internet. The risk associated with an open environment authentication and authorization are user credentials stealing via man-in-the-middle ...


More Xplore Articles

Educational Resources on Trojan Horse

Back to Top

eLearning

Triggering Trojans in SRAM circuits with X-propagation

Senwen Kan; Jennifer Dworak 2014 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT), 2014

Over the past several years, there has been growing concern regarding the possibility that Hardware Trojan Horse circuits may be present in 3rd party IP. In this paper, we focus specifically on 3rd party IP related to Static Random-Access Memories (SRAMs), and we demonstrate that some Trojans in production-worthy SRAM circuits can easily evade standard verification techniques. We then describe ...


Extended abstract: Designer’s hardware Trojan horse

Yousra Alkabani; Farinaz Koushanfar 2008 IEEE International Workshop on Hardware-Oriented Security and Trust, 2008

We introduce the first approach for pre-synthesis embedding of hardware Trojan horses (HTHs) by the designer. The embedded HTH gives the designer a low layer control over the hardware that can be exploited post-manufacturing. We identify the essential components for the exploit, outline the pre-synthesis implementation, and discuss detection. The new HTH embedding approach is low- overhead, effective, and hard ...


Countering trusting trust through diverse double-compiling

D. A. Wheeler 21st Annual Computer Security Applications Conference (ACSAC'05), 2005

An air force evaluation of Multics, and Ken Thompson's famous Turing award lecture "reflections on trusting trust, " showed that compilers can be subverted to insert malicious Trojan horses into critical software, including themselves. If this attack goes undetected, even complete analysis of a system's source code can not find the malicious code that is running, and methods for detecting ...


Classification Algorithms of Trojan Horse Detection Based on Behavior

Qin-Zhang Chen; Rong Cheng; Yu-Jie Gu 2009 International Conference on Multimedia Information Networking and Security, 2009

Current anti-Trojan is almost signature-based strategies, which cannot detect new one. Behavior analysis, with the ability to detect Trojans with unknown signatures, is a technique of initiative defense. However, current behavior analysis based anti-Trojan strategies have the following problems: high false or failure alarm rate, poor efficiency, and poor user-friendly interface design, etc. The paper works on the design of ...


Trusted Computing based open environment user authentication model

Zubair Ahmad; Jamalul-Lail Ab Manan; Suziah Sulaiman 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE), 2010

In federated identity management systems identity providers authenticate users of its realm via single sign-on and forward authentication assertion as a response to the service provider's requests. Secure single sign-on authentication is always a challenging task in an open environment such as in Internet. The risk associated with an open environment authentication and authorization are user credentials stealing via man-in-the-middle ...


More eLearning Resources

IEEE.tv Videos

No IEEE.tv Videos are currently tagged "Trojan Horse"

IEEE-USA E-Books

No IEEE-USA E-Books are currently tagged "Trojan Horse"



Standards related to Trojan Horse

Back to Top

No standards are currently tagged "Trojan Horse"


Jobs related to Trojan Horse

Back to Top