Trojan Horse

View this topic in
The Trojan Horse is a tale from the Trojan War, as told in Virgil's Latin epic poem The Aeneid, also by Dionysius, Apollodorus and Quintus of Smyrna. (Wikipedia.org)






Conferences related to Trojan Horse

Back to Top

2019 56th ACM/ESDA/IEEE Design Automation Conference (DAC)

EDA (Electronics Design Automation) is becoming ever more important with the continuous scaling of semiconductor devices and the growing complexities of their use in circuits and systems. Demands for lower-power, higher-reliability and more agile electronic systems raise new challenges to both design and design automation of such systems. For the past five decades, the primary focus of research track at DAC has been to showcase leading-edge research and practice in tools and methodologies for the design of circuits and systems.

  • 2022 59th ACM/ESDA/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2021 58th ACM/ESDA/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2020 57th ACM/ESDA/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2018 55th ACM/ESDA/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2017 54th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2016 53nd ACM/EDAC/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC)

    DAC Description for TMRF The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading

  • 2013 50th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 session on design methodologies and EDA tool developments, keynotes, panels, plus User Track presentations. A diverse worldwide community representing more than 1,000 organization attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2012 49th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The Design Automation Conference (DAC) is the premier event for the design of electronic circuits and systems, and for EDA and silicon solutions. DAC features a wide array of technical presentations plus over 200 of the leading electronics design suppliers

  • 2011 48th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The Design Automation Conference is the world s leading technical conference and tradeshow on electronic design and design automation. DAC is where the IC Design and EDA ecosystem learns, networks, and does business.

  • 2010 47th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The Design Automation Conference (DAC) is the premier event for the design of electronic circuits and systems, and for EDA and silicon solutions. DAC features a wide array of technical presentations plus over 200 of the leading electronics design suppliers.

  • 2009 46th ACM/EDAC/IEEE Design Automation Conference (DAC)

    DAC is the premier event for the electronic design community. DAC offers the industry s most prestigious technical conference in combination with the biggest exhibition, bringing together design, design automation and manufacturing market influencers.

  • 2008 45th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The Design Automation Conference (DAC) is the premier event for the design of electronic circuits and systems, and for EDA and silicon solutions. DAC features a wide array of technical presentations plus over 250 of the leading electronics design suppliers.

  • 2007 44th ACM/IEEE Design Automation Conference (DAC)

    The Design Automation Conference (DAC) is the premier Electronic Design Automation (EDA) and silicon solution event. DAC features over 50 technical sessions covering the latest in design methodologies and EDA tool developments and an Exhibition and Demo Suite area with over 250 of the leading EDA, silicon and IP Providers.

  • 2006 43rd ACM/IEEE Design Automation Conference (DAC)

  • 2005 42nd ACM/IEEE Design Automation Conference (DAC)

  • 2004 41st ACM/IEEE Design Automation Conference (DAC)

  • 2003 40th ACM/IEEE Design Automation Conference (DAC)

  • 2002 39th ACM/IEEE Design Automation Conference (DAC)

  • 2001 38th ACM/IEEE Design Automation Conference (DAC)

  • 2000 37th ACM/IEEE Design Automation Conference (DAC)

  • 1999 36th ACM/IEEE Design Automation Conference (DAC)

  • 1998 35th ACM/IEEE Design Automation Conference (DAC)

  • 1997 34th ACM/IEEE Design Automation Conference (DAC)

  • 1996 33rd ACM/IEEE Design Automation Conference (DAC)


2019 IEEE Symposium on Security and Privacy (SP)

Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2021 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2020 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2018 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2017 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2016 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2015 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2014 IEEE Symposium on Security and Privacy (SP)

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2013 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2012 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2011 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2010 IEEE Symposium on Security and Privacy (SP)

    S&P is interested in all aspects of computer security and privacy.

  • 2009 IEEE Symposium on Security and Privacy (SP)

    The IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2008 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2007 IEEE Symposium on Security and Privacy (SP)

    Research contributions in any aspect of computer security and electronic privacy including advances in the theory, design, implementation, analysis of empirical evaluation of secure systems.

  • 2006 IEEE Symposium on Security and Privacy (SP)

  • 2005 IEEE Symposium on Security and Privacy (SRSP)


2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)

The conference aims at bringing together researchers and practitioners in the world working on trusted computing and communications, with regard to trust, security, privacy, reliability, dependability, survivability, availability, and fault tolerance aspects of computer systems and networks, and providing a forum to present and discuss emerging ideas and trends in this highly challenging research field


2018 20th International Conference on Advanced Communication Technology (ICACT)

With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GIRI

  • 2017 19th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by

  • 2016 18th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GiRI.

  • 2015 17th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GiRI.

  • 2014 16th International Conference on Advanced Communication Technology (ICACT)

    Technology, service, architecture, strategy, and policy in newly emerging system, standard, service, and variety of application on the area of telecommunications. ICACT 2014 provides an open forum for scholar, researcher, engineer, policy maker, network planner, and service provider in the advanced communication technologies.

  • 2013 15th International Conference on Advanced Communication Technology (ICACT)

    Technology, standard, service, architecture, strategy, and policy in newly emerging systems and a variety of applications in the area of communications. ICACT2013 provides an open forum for scholar, researcher, engineer, policy maker, network planner, and service provider in the advanced communications technologies.

  • 2012 14th International Conference on Advanced Communication Technology (ICACT)

    Technology, service, architecture, strategy, and policy in newly emerging systems, standards, service, and a variety of applications in the area of telecommunicatons. ICACT 2012 provides an open forum for scholars, researchers, engineers, policy makers, network planners, and service providers in the advanced communication technologies.

  • 2011 13th International Conference on Advanced Communication Technology (ICACT)

    International Conference on Advanced Communication Technology (ICACT) provides an open forum for researchers, engineers, policy, network planners, and service providers in the advanced communication technologies. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications on the area of telecommunications.

  • 2010 12th International Conference on Advanced Communication Technology (ICACT)

    ICACT is an annual conference providing an open forum for researchers, engineers, network planners, and service providers in telecommunications. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications in the area of telecommunications.

  • 2009 11th International Conference on Advanced Communication Technology (ICACT)

    ICACT is an annual conference providing an open forum for researchers, engineers, network planners, and service providers in telecommunications. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications in the area of telecommunications.

  • 2008 10th International Conference Advanced Communication Technology (ICACT)

  • 2007 9th International Conference Advanced Communication Technology (ICACT)

  • 2006 8th International Conference Advanced Communication Technology (ICACT)

  • 2005 7th International Conference Advanced Communication Technology (ICACT)

  • 2004 6th International Conference Advanced Communication Technology (ICACT)


2018 41st International Convention on Information and Communication Technology, Electronicsand Microelectronics (MIPRO)

Computer in Technical Systems, Intelligent Systems, Distributed Computing and VisualizationSystems, Communication Systems, Information Systems Security, Digital Economy, Computersin Education, Microelectronics, Electronic Technology, Education


More Conferences

Periodicals related to Trojan Horse

Back to Top

Communications Surveys & Tutorials, IEEE

Each tutorial reviews currents communications topics in network management and computer and wireless communications. Available tutorials, which are 2.5 to 5 hours in length contains the original visuals and voice-over by the presenter. IEEE Communications Surveys & Tutorials features two distinct types of articles: original articles and reprints. The original articles are exclusively written for IEEE Communications Surveys & Tutorials ...


Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


Computer Graphics and Applications, IEEE

IEEE Computer Graphics and Applications (CG&A) bridges the theory and practice of computer graphics. From specific algorithms to full system implementations, CG&A offers a strong combination of peer-reviewed feature articles and refereed departments, including news and product announcements. Special Applications sidebars relate research stories to commercial development. Cover stories focus on creative applications of the technology by an artist or ...


Computer-Aided Design of Integrated Circuits and Systems, IEEE Transactions on

Methods, algorithms, and human-machine interfaces for physical and logical design, including: planning, synthesis, partitioning, modeling, simulation, layout, verification, testing, and documentation of integrated-circuit and systems designs of all complexities. Practical applications of aids resulting in producible analog, digital, optical, or microwave integrated circuits are emphasized.


Computers, IEEE Transactions on

Design and analysis of algorithms, computer systems, and digital networks; methods for specifying, measuring, and modeling the performance of computers and computer systems; design of computer components, such as arithmetic units, data storage devices, and interface devices; design of reliable and testable digital devices and systems; computer networks and distributed computer systems; new computer organizations and architectures; applications of VLSI ...


More Periodicals

Most published Xplore authors for Trojan Horse

Back to Top

Xplore Articles related to Trojan Horse

Back to Top

Analysis of Trojan Horse Events by Query of Vulnerability Information in Searching Engines

2014 Seventh International Symposium on Computational Intelligence and Design, 2014

Trojan Horse is one of the most common and most serious attacking approaches by hackers in information security. It is important to analyze and predict this type of attack events and then take appropriate counter-measures accordingly. However, it is difficult to have a deep analysis of the attacks only based on Trojan Horse event information itself. In this paper, we ...


Design of software to search webpage Trojan horse in IIS server

2011 IEEE International Conference on Computer Science and Automation Engineering, 2011

Webpage Trojan horse in IIS server is also a kind of ASP, ASP.NET or HTML programs; It has no clear distinction with other webpage programs. This is the reason why Trojans have become the main approach to attack websites. These years webpage Trojan horses have applied varied technique to hide their characteristics, and techniques of Trojan finding and anti-killing contest ...


The Detection of Trojan Horse Based on the Data Mining

2009 Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009

Trojan horse is a serious security threat to computer network. Traditionally, Trojan Horses are detected using file's dynamic characteristics or behaviors. However, these methods are not available for unknown or un-awakened Trojan horses. Trojan horse always exists as PE (Portable Executable) file format in the Windows system environment, and the PE file has many static characteristics, which contains many runtime ...


Containing the Ultimate Trojan Horse

IEEE Security & Privacy, 2007

Security vulnerabilities in software systems are a rapidly growing threat in an increasingly networked world. Unfortunately many systems are now so complex that high-assurance auditing for errors would be prohibitively expensive. In this article, author explains about how some of the potential risks could be contained through security management at the base of the software stack, rather than inside application ...


Classification Algorithms of Trojan Horse Detection Based on Behavior

2009 International Conference on Multimedia Information Networking and Security, 2009

Current anti-Trojan is almost signature-based strategies, which cannot detect new one. Behavior analysis, with the ability to detect Trojans with unknown signatures, is a technique of initiative defense. However, current behavior analysis based anti-Trojan strategies have the following problems: high false or failure alarm rate, poor efficiency, and poor user-friendly interface design, etc. The paper works on the design of ...


More Xplore Articles

Educational Resources on Trojan Horse

Back to Top

IEEE-USA E-Books

  • Analysis of Trojan Horse Events by Query of Vulnerability Information in Searching Engines

    Trojan Horse is one of the most common and most serious attacking approaches by hackers in information security. It is important to analyze and predict this type of attack events and then take appropriate counter-measures accordingly. However, it is difficult to have a deep analysis of the attacks only based on Trojan Horse event information itself. In this paper, we propose a new analysis method by comparing the life cycle of Trojan Horse events in China with the life cycle of queries about their exploited vulnerability in search engines. We find that the peak of query cycle is ahead of the peak of attack events. The result suggests that in China, the Trojan Horse attacks are conducted mainly by amateur hackers, rather than professional hackers. The result is also helpful for prediction of Trojan Horse attacks and then applying counter-measures.

  • Design of software to search webpage Trojan horse in IIS server

    Webpage Trojan horse in IIS server is also a kind of ASP, ASP.NET or HTML programs; It has no clear distinction with other webpage programs. This is the reason why Trojans have become the main approach to attack websites. These years webpage Trojan horses have applied varied technique to hide their characteristics, and techniques of Trojan finding and anti-killing contest further more. Based on analyzing the principle of Trojans horses, this project introduces the latest technique to search IIS Trojan horses, and programs a software to search all kinds of webpage Trojan horses automatically.

  • The Detection of Trojan Horse Based on the Data Mining

    Trojan horse is a serious security threat to computer network. Traditionally, Trojan Horses are detected using file's dynamic characteristics or behaviors. However, these methods are not available for unknown or un-awakened Trojan horses. Trojan horse always exists as PE (Portable Executable) file format in the Windows system environment, and the PE file has many static characteristics, which contains many runtime characteristics. In this paper, a new detecting method based on PE file's static attributes is proposed, and intelligent information processing techniques are used to analyze those static attributes, such as decision tree, BP network and Finite State Machine. Further, a detection model is established to estimate whether a PE file is a Trojan horse. This thesis is prepared to value the static Trojan characteristic and build a new way to detect the Trojan horse by using the PE file static characteristics.

  • Containing the Ultimate Trojan Horse

    Security vulnerabilities in software systems are a rapidly growing threat in an increasingly networked world. Unfortunately many systems are now so complex that high-assurance auditing for errors would be prohibitively expensive. In this article, author explains about how some of the potential risks could be contained through security management at the base of the software stack, rather than inside application programs. A Trojan horse is a program that has "read" access to a secret and "write" access to a public channel, and then abuses its simultaneous access to both of these channels to leak the secret downward to a lower security level.

  • Classification Algorithms of Trojan Horse Detection Based on Behavior

    Current anti-Trojan is almost signature-based strategies, which cannot detect new one. Behavior analysis, with the ability to detect Trojans with unknown signatures, is a technique of initiative defense. However, current behavior analysis based anti-Trojan strategies have the following problems: high false or failure alarm rate, poor efficiency, and poor user-friendly interface design, etc. The paper works on the design of an anti-Trojan oriented algorithm based on behavior analysis. And we construct a standard of anti- Trojan algorithm system and point the up-limit of the precision. We propose an improved hierarchical fuzzy classification algorithm which is specifically designed for anti-Trojan. Finally, we organize the experiment to get the results. The results show high classification accuracy using our algorithm. Compared to Bayesian algorithm, our algorithm have better performance.

  • Multiple Trojan horse systems and covert channel analysis

    The multiple Trojan horse system is a finite-state deterministic model with a high-level transmitter Trojan horse process, a low-level receiver Trojan horse process, and m conspiring Trojan horse processes. The conspiring processes attempt to aid the downgrading of data from the transmitter to the receiver. The capacity of a multiple Trojan horse system is a measure of the amount of information the high-level process can disclose to the low-level process. Any controlled signalling system can be viewed as a multiple Trojan horse system. The author gives an optimality equation which gives a way to recursively construct optimal strategies for both the receiver and conspiring processes. Computer algorithms can be constructed to iteratively compute the capacity and optimal strategies.<<ETX>>

  • Risk Analysis of Trojan-Horse Attacks on Practical Quantum Key Distribution Systems

    An eavesdropper Eve may probe a quantum key distribution (QKD) system by sending a bright pulse from the quantum channel into the system and analyzing the back-reflected pulses. Such Trojan-horse attacks can breach the security of the QKD system, if appropriate safeguards are not installed or if they can be fooled by the Eve. We present a risk analysis of such attacks based on extensive spectral measurements, such as transmittance, reflectivity, and detection sensitivity of some critical components used in a typical QKD systems. Our results indicate the existence of wavelength regimes, where the attacker gains considerable advantage as compared to launching an attack at 1550 nm. We also propose countermeasures to reduce the risk of such attacks.

  • Design of hardware trojan horse based on counter

    With globalization of the semiconductor design and fabrication process, hardware Trojan has become a new threat which risks to the security of integrated circuit. An adversary can design a Trojan to destroy a system or leak confidential information which is difficult for chip validation processes, such as manufacturing test, to detect. To facilitate research in this area, a better understanding of what Hardware Trojans would look like and what impact they would incur to a circuit is required. In this paper, a counter-based hardware Trojan horse within 8 LED marquee circuit is designed and implemented. First, a counter-based Trojan is designed and simulated functionally by ModelSim SE 6.2b. It is difficult to be activated and detected using random stimuli. Next, a marquee circuit is designed in Verilog HDL, which is used as a target circuit to implement and analyze the hardware Trojan. Marquee circuit was simulated by simulation tool, and implemented on a Spartan-3E Starter Kit Board. To this end, we insert the counter-based hardware Trojan into the marquee circuit to implement on a Spartan-3E Starter Kit Board. The experiment's result shows that this type of the hardware Trojan is very flexible, it can be easily embedded in the target circuit and not easily found.

  • Dynamic Attack Tree and Its Applications on Trojan Horse Detection

    Attack tree generating algorithm has been studied thoroughly. However, the method for adjusting the attack tree with ever-increasing needing has not been presented. A novel Trojan horse detection approach is presented in this paper. Original attack tree is modeled on the basis of APIs that Trojan horse often used. Matching the set of APIs got by statically analyzing the PE file with the original attack tree, to predict malicious actions may appear in the implementation of the PE file and estimate whether the PE file is a Trojan. The attack tree can adjust with word analysis after analyze the detection results to improve the detection ability. The experiment shows that this approach can detect known and unknown (upgraded) Trojan horse effectively. Moreover, this is the first time present the attack tree's dynamically adjustment and this has for-reaching significance for the attack tree and Trojan horse detection.

  • Quantum hacking of continuous-variable quantum key distribution systems: Realtime Trojan-horse attacks

    We experimentally demonstrate successful Trojan-horse attacks on laboratory and commercial continuous-variable quantum key distribution systems with binary and Gaussian modulation. Furthermore, we analyze appropriate countermeasures regarding their spectral performance.



Standards related to Trojan Horse

Back to Top

No standards are currently tagged "Trojan Horse"


Jobs related to Trojan Horse

Back to Top