期刊文献+
共找到990篇文章
< 1 2 50 >
每页显示 20 50 100
Temperature-Triggered Hardware Trojan Based Algebraic Fault Analysis of SKINNY-64-64 Lightweight Block Cipher
1
作者 Lei Zhu Jinyue Gong +1 位作者 Liang Dong Cong Zhang 《Computers, Materials & Continua》 SCIE EI 2023年第6期5521-5537,共17页
SKINNY-64-64 is a lightweight block cipher with a 64-bit block length and key length,and it is mainly used on the Internet of Things(IoT).Currently,faults can be injected into cryptographic devices by attackers in a v... SKINNY-64-64 is a lightweight block cipher with a 64-bit block length and key length,and it is mainly used on the Internet of Things(IoT).Currently,faults can be injected into cryptographic devices by attackers in a variety of ways,but it is still difficult to achieve a precisely located fault attacks at a low cost,whereas a Hardware Trojan(HT)can realize this.Temperature,as a physical quantity incidental to the operation of a cryptographic device,is easily overlooked.In this paper,a temperature-triggered HT(THT)is designed,which,when activated,causes a specific bit of the intermediate state of the SKINNY-64-64 to be flipped.Further,in this paper,a THT-based algebraic fault analysis(THT-AFA)method is proposed.To demonstrate the effectiveness of the method,experiments on algebraic fault analysis(AFA)and THT-AFA have been carried out on SKINNY-64-64.In the THT-AFA for SKINNY-64-64,it is only required to activate the THT 3 times to obtain the master key with a 100%success rate,and the average time for the attack is 64.57 s.However,when performing AFA on this cipher,we provide a relation-ship between the number of different faults and the residual entropy of the key.In comparison,our proposed THT-AFA method has better performance in terms of attack efficiency.To the best of our knowledge,this is the first HT attack on SKINNY-64-64. 展开更多
关键词 SKINNY-64-64 lightweight block cipher algebraic fault analysis Hardware trojan residual entropy
下载PDF
A Therapeutic Sheep in Metastatic Wolf’s Clothing: Trojan Horse Approach for Cancer Brain Metastases Treatment 被引量:2
2
作者 Hai-jun Liu Mingming Wang +2 位作者 Shanshan Shi Xiangxiang Hu Peisheng Xu 《Nano-Micro Letters》 SCIE EI CAS CSCD 2022年第7期140-156,共17页
Early-stage brain metastasis of breast cancer(BMBC), due to the existence of an intact blood–brain barrier(BBB), is one of the deadliest neurologic complications. To improve the efficacy of chemotherapy for BMBC, a T... Early-stage brain metastasis of breast cancer(BMBC), due to the existence of an intact blood–brain barrier(BBB), is one of the deadliest neurologic complications. To improve the efficacy of chemotherapy for BMBC, a Trojan horse strategy-based nanocarrier has been developed by integrating the cell membrane of a brain-homing cancer cell and a polymeric drug depot. With the camouflage of a MDA-MB-231/Br cell membrane, doxorubicin-loaded poly(D, L-lactic-co-glycolic acid) nanoparticle(DOX-PLGA@CM) shows enhanced cellular uptake and boosted killing potency for MDA-MB-231/Br cells. Furthermore, DOX-PLGA@CM is equipped with naturally selected molecules for BBB penetration, as evidenced by its boosted capacity in entering the brain of both healthy and early-stage BMBC mouse models. Consequently, DOX-PLGA@CM effectively reaches the metastatic tumor lesions in the brain, slows down cancer progression, reduces tumor burden, and extends the survival time for the BMBC animal.Furthermore, the simplicity and easy scale-up of the design opens a new window for the treatment of BMBC and other brain metastatic cancers. 展开更多
关键词 trojan horse Brain metastasis Blood-brain barrier Cell membrane NANOMEDICINE
下载PDF
Effects of Motivation and Demography on the Quantitative Plausibility of the Trojan Horse Defence Against Possession of Child Pornography 被引量:1
3
作者 Richard E Overill Jantje A M Silomon +1 位作者 Kam-Pui Chow Hayson Tse 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2014年第6期9-15,共7页
The Enhanced Complexity Model( ECM) developed previously has been further extended to produce a Motivationally Enhanced Complexity Model( MECM) which enables the degree of motivation,capability and opportunity of a hy... The Enhanced Complexity Model( ECM) developed previously has been further extended to produce a Motivationally Enhanced Complexity Model( MECM) which enables the degree of motivation,capability and opportunity of a hypothetical Trojan Horse author to be included in quantifying the relative plausibility of competing explanations for the existence of uncontested digital evidence.This new model has been applied to the case of the Trojan Horse defence( THD) against the possession of child pornography.Our results demonstrate that the THD in this case cannot be plausibly sustained unless it can be shown that an ‘off-theshelf'( OTS) Trojan Horse for this task is available and it is not detectable by the target computer,at the material time. 展开更多
关键词 trojan Horse defence child pornography digital forensic evidence complexity quantitative plausibility metrics posterior odds
下载PDF
A Hardware Trojan Detection Method Based on the Electromagnetic Leakage 被引量:1
4
作者 Lei Zhang Youheng Dong +2 位作者 Jianxin Wang Chaoen Xiao Ding Ding 《China Communications》 SCIE CSCD 2019年第12期100-110,共11页
Hardware Trojan(HT) refers to a special module intentionally implanted into a chip or an electronic system. The module can be exploited by the attacker to achieve destructive functions. Unfortunately the HT is difficu... Hardware Trojan(HT) refers to a special module intentionally implanted into a chip or an electronic system. The module can be exploited by the attacker to achieve destructive functions. Unfortunately the HT is difficult to detecte due to its minimal resource occupation. In order to achieve an accurate detection with high efficiency, a HT detection method based on the electromagnetic leakage of the chip is proposed in this paper. At first, the dimensionality reduction and the feature extraction of the electromagnetic leakage signals in each group(template chip, Trojan-free chip and target chip) were realized by principal component analysis(PCA). Then, the Mahalanobis distances between the template group and the other groups were calculated. Finally, the differences between the Mahalanobis distances and the threshold were compared to determine whether the HT had been implanted into the target chip. In addition, the concept of the HT Detection Quality(HTDQ) was proposed to analyze and compare the performance of different detection methods. Our experiment results indicate that the accuracy of this detection method is 91.93%, and the time consumption is 0.042s in average, which shows a high HTDQ compared with three other methods. 展开更多
关键词 hardware trojan detection side channel analysis electromagnetic leakage principal component analysis Mahalanobis distance detection quality
下载PDF
Preventing Hardware Trojans in Switch Chip Based on Payload Decoupling
5
作者 Ke Song Binghao Yan +2 位作者 Xiangyu Li Qinrang Liu Ling OuYang 《China Communications》 SCIE CSCD 2021年第8期96-108,共13页
Hardware Trojans in integrated circuit chips have the characteristics of being covert,destructive,and difficult to protect,which have seriously endangered the security of the chips themselves and the information syste... Hardware Trojans in integrated circuit chips have the characteristics of being covert,destructive,and difficult to protect,which have seriously endangered the security of the chips themselves and the information systems to which they belong.Existing solutions generally rely on passive detection techniques.In this paper,a hardware Trojans active defense mechanism is designed for network switching chips based on the principle of encryption algorithm.By encoding the data entering the chip,the argot hidden in the data cannot trigger the hardware Trojans that may exist in the chip,so that the chip can work normally even if it is implanted with a hardware Trojans.The proposed method is proved to be effective in preventing hardware Trojans with different trigger characteristics by simulation tests and practical tests on our secure switching chip. 展开更多
关键词 network switching chip active defense hardware trojan payload decoupling
下载PDF
A Customized Authentication Design for Traffic Hijacking Detection on Hardware-Trojan Infected NoCs
6
作者 Mubashir Hussain Hui Guo Sri Parameswaran 《Journal of Computer and Communications》 2018年第1期135-152,共18页
Traffic hijacking is a common attack perpetrated on networked systems, where attackers eavesdrop on user transactions, manipulate packet data, and divert traffic to illegitimate locations. Similar attacks can also be ... Traffic hijacking is a common attack perpetrated on networked systems, where attackers eavesdrop on user transactions, manipulate packet data, and divert traffic to illegitimate locations. Similar attacks can also be unleashed in a NoC (Network on Chip) based system where the NoC comes from a third-party vendor and can be engrafted with hardware Trojans. Unlike the attackers on a traditional network, those Trojans are usually small and have limited capacity. This paper targets such a hardware Trojan;Specifically, the Trojan aims to divert traffic packets to unauthorized locations on the NoC. To detect this kind of traffic hijacking, we propose an authentication scheme in which the source and destination addresses are tagged. We develop a custom design for the packet tagging and authentication such that the implementation costs can be greatly reduced. Our experiments on a set of applications show that on average the detection circuitry incurs about 3.37% overhead in area, 2.61% in power, and 0.097% in performance when compared to the baseline design. 展开更多
关键词 Packet HIJACKING DETECTION HARDWARE trojan NETWORK-ON-CHIP
下载PDF
Quantum hacking of two-way continuous-variable quantum key distribution using Trojan-horse attack
7
作者 马鸿鑫 鲍皖苏 +1 位作者 李宏伟 周淳 《Chinese Physics B》 SCIE EI CAS CSCD 2016年第8期65-70,共6页
We present a Trojan-horse attack on the practical two-way continuous-variable quantum key distribution system. Our attack mainly focuses on the imperfection of the practical system that the modulator has a redundancy ... We present a Trojan-horse attack on the practical two-way continuous-variable quantum key distribution system. Our attack mainly focuses on the imperfection of the practical system that the modulator has a redundancy of modulation pulsewidth, which leaves a loophole for the eavesdropper inserting a Trojan-horse pulse. Utilizing the unique characteristics of two-way continuous-variable quantum key distribution that Alice only takes modulation operation on the received mode without any measurement, this attack allows the eavesdropper to render all of the final keys shared between the legitimate parties insecure without being detected. After analyzing the feasibility of the attack, the corresponding countermeasures are put forward. 展开更多
关键词 quantum hacking two-way continuous-variable quantum key distribution trojan-horse
下载PDF
Trojan Terrorism as a Principate of Deception, Or in the Arms of the Terracotta Locust (Ethymological Wing Cases of Virtus): Part 1
8
作者 Menshikova Elena Rudolfovna 《International Relations and Diplomacy》 2019年第11期539-547,共9页
“Trojan terrorism”leaped to the place and in time as an exhalation of bewilderment at the terrorist attacks in London last year,as a challenge to political manipulation,and jumped as the continuation of the topic of... “Trojan terrorism”leaped to the place and in time as an exhalation of bewilderment at the terrorist attacks in London last year,as a challenge to political manipulation,and jumped as the continuation of the topic of migration(the fundamental problem of modernity),as a creation of an internal conflict that multiplies the external conflict,in the theme of systemic instability―theoretical reasonableness of deception,which destroys the system of contracts as a condition of the world order,leaped as a report at the University of London(Birkbeck)on Feb.9,2018,which the relevance of its problems beat real events in because the state of modern“utopianism”―the state of Utopus(USA),intended from the matrix of the British Empire,its tactics of violence―“occupy”(seizure of the“alien”)―has never changed.As in the case of Marks’s“capital”,the theory first followed,and then the practice of sabotage:a system of terrorist attacks,riots,revolutions,world and civil wars,and“Trojan terrorism”:bold attacks by international terrorists,sweeping away the principles and norms of any social treaty(Rousseau did not even dream of this sadness),the norms of law,ethics and morality,economic agreements(interstate agreements),including military demonstration of force,provocation of military conflicts,pirate antics,demarches of intimidation and blackmail,reviving the myth of the Trojan Horse and giving it the status of an“established order”:The norms that are accepted by the majority as“natural law”,as the natural course of things,contrary to common sense and universal human canons of being,legitimize treachery and deceit as the only one of possible and all probable ways of further development of human society―such are the“difficulties to the stars”:Without star wars,but by“occupy”,which allows us to conclude that“Trojan terrorism”is the sum of technologies aimed at seizure the land(habitable)by fraud,panic,and violence. 展开更多
关键词 terra TERROR trojan TERRORISM TIMOR PIRACY technology of lies Myth
下载PDF
Trojan Remover V6.0.4
9
《软件》 2003年第9期8-8,共1页
关键词 防病毒软件 trojan REMOVER V6.0.4 工具软件 木马程序
下载PDF
Efficient Activation Method of Hardware Trojan Based on Greedy Algorithm
10
作者 Yingjian Yan Xin Chuan 《Journal of Beijing Institute of Technology》 EI CAS 2018年第2期230-236,共7页
To generate test vector sets that can efficiently activate hardware Trojans and improve probability of the hardware Trojan activation,an efficient hardware Trojan activation method is proposed based on greedy algorith... To generate test vector sets that can efficiently activate hardware Trojans and improve probability of the hardware Trojan activation,an efficient hardware Trojan activation method is proposed based on greedy algorithm for combinatorial hardware Trojans. Based on the greedy algorithm and the recursive construction method in the combination test,the method formulates appropriate and useful greedy strategy and generates test vector sets with different combinatorial correlation coefficients to activate hardware Trojans in target circuits. The experiment was carried out based on advanced encryption standard( AES) hardware encryption circuit,different combinatorial hardware Trojans were implanted in AES as target circuits,the experiment of detecting hardware Trojans in target circuits was performed by applying the proposed method and different combinatorial hardware Trojans in target circuits were activated successfully many times in the experiment. The experimental results showthat the test vector sets generated using the proposed method could effectively activate combinatorial hardware Trojans,improve the probability of the hardware Trojan being activated,and also be applied to practice. 展开更多
关键词 hardware trojan logic detection combinatorial correlation coefficient test vectors
下载PDF
Trojan新循环AGM蓄电池生产线
11
作者 王琰 《蓄电池》 北大核心 2010年第3期141-141,共1页
深循环蓄电池制造商Trojan蓄电池公司可提供新型生产密封吸附式玻璃纤维(AGM)蓄电池的循环AGM蓄电池生产线,特点是可改善在重载和深放电应用下的循环功率。
关键词 蓄电池 二次电池 trojan 深放电 生产线 AGM
下载PDF
Trojan Terrorism as a Principate of Deception, Or in the Arms of the Terracotta Locust (Ethymological Wing Cases of Virtus): Part Ⅱ
12
作者 Menshikova Elena Rudolfovna 《International Relations and Diplomacy》 2020年第9期409-417,共9页
“Trojan terrorism”leaped to the place and in time as an exhalation of bewilderment at the terrorist attacks in London last year,as a challenge to political manipulation,and jumped as the continuation of the topic of... “Trojan terrorism”leaped to the place and in time as an exhalation of bewilderment at the terrorist attacks in London last year,as a challenge to political manipulation,and jumped as the continuation of the topic of migration(the fundamental problem of modernity),as a creation of an internal conflict that multiplies the external conflict,in the theme of systemic instability-theoretical reasonableness of Deception,which destroys the system of contracts as a condition of the world order.My report at the University of London(Birkbeck)on Feb.9,2018,which was read in English,still not the latest direct evidence of the use of this scandalous method of“Trojan terrorism”—the defamation of the whole country(Russia),plus violation of territorial integrity,including and military attack,another country that lies on the other side of the ocean(Syria),and which is accused of not living by the rules(the“Absolute”method by Caesar),the relevance of its problems beat real events in because the state of modern“utopianism”-the state of Utopus(USA),intended from the matrix of the British Empire,its tactics of violence-“occupy”(seizure of the“alien”)-has never changed,and the March-April events in international politics are just another notch on this dead python,which is called“democratic values”.As in the case of Marks’s“Capital”,the theory first followed,and then the practice of sabotage:a system of terrorist attacks,riots,revolutions,world and civil wars,and“Trojan terrorism”:bold attacks by international terrorists,sweeping away the principles and norms of any social treaty(Rousseau did not even dream of this sadness),the norms of law,ethics and morality,economic agreements(interstate agreements),including military demonstration of force,provocation of military conflicts,pirate antics,demarches of intimidation and blackmail,reviving the myth of the Trojan Horse and giving it the status of an“established order”:the norms that are accepted by the majority as“natural law”,as the natural course of things,contrary to common sense and universal human canons of being,legitimize treachery and deceit as the only one of possible and all probable ways of further development of human society-such are the“difficulties to the stars”:without star wars,but by“occupy”,which allows us to conclude that“Trojan terrorism”is the sum of technologies aimed at seizure the land(habitable)by fraud,panic,and violence. 展开更多
关键词 terra TERROR trojan terrorism” PIRACY technology of lies Myth
下载PDF
TrojanUVFlex^TM紫外消毒系统
13
《流程工业》 2018年第11期45-45,共1页
特洁安最新式革新产品——Trojan UV Flex TM.紫外消毒系统是在已验证过的Solo LampTM灯管技术的基础上发展的。该系统为了满足水厂管理层和操作人员更高要求而设计,全球第一套Trojan UV Flex TM系统已经在德国柏林安装。它极大地节省... 特洁安最新式革新产品——Trojan UV Flex TM.紫外消毒系统是在已验证过的Solo LampTM灯管技术的基础上发展的。该系统为了满足水厂管理层和操作人员更高要求而设计,全球第一套Trojan UV Flex TM系统已经在德国柏林安装。它极大地节省占地空间,拥有先进的系统控制.能输出更高紫外剂量的电光转换。 展开更多
关键词 trojan 消毒系统 UV 紫外 FLEX 操作人员 电光转换 管理层
下载PDF
破坏力超强的木马 Trojan Nunks
14
作者 痛并快乐着 《网友世界》 2011年第5期54-55,共2页
喜欢玩木马的朋友一定听说过大名鼎鼎的国外木马Beast(禽兽),可是该木马已经退出江湖很长一段时间。
关键词 trojan 木马 破坏力 超强
下载PDF
Trojan-Spy.Win32.Qeds.a病毒技木报告
15
《网上俱乐部(电脑安全专家)》 2005年第7期74-74,共1页
这是一个借助于qQ传播的病毒,该病毒一味走色情路线.很容易就能突破大家的“防线”。该病毒为蠕虫病毒,长度为20480字节.通过QQ发送病毒文件.并以色情字样作为引诱。常见的语句包括“美女超短裙被刮破的那一刻!”、‘推荐-很珍贵... 这是一个借助于qQ传播的病毒,该病毒一味走色情路线.很容易就能突破大家的“防线”。该病毒为蠕虫病毒,长度为20480字节.通过QQ发送病毒文件.并以色情字样作为引诱。常见的语句包括“美女超短裙被刮破的那一刻!”、‘推荐-很珍贵历史照片:估计9成人没看到过”和“真正的美女并不是脱光了衣服才够靓!”等(图1)。病毒运行后会从未知网站上下或病毒“Trojan.Win32.VB.xb”.后者的主要任务在于窃取密码。 展开更多
关键词 WIN32 报告 trojan 蠕虫病毒 病毒文件 色情 美女 QQ 防线 发送 QQ 字节 VB 网站
下载PDF
狙击IRC Trojan
16
作者 余海发 《网管员世界》 2006年第2期118-120,共3页
“IRC Trojan”这个词最早是由CERT组织在1994年提出的。随后,IRC Trojan的数量不断增加、特性不断丰富,其产生的破坏力也不容小觑了。近一两年中出现的僵尸网络(BotNet)事件多与此有关,攻击者常常通过IRC来控制上万台受感染的主... “IRC Trojan”这个词最早是由CERT组织在1994年提出的。随后,IRC Trojan的数量不断增加、特性不断丰富,其产生的破坏力也不容小觑了。近一两年中出现的僵尸网络(BotNet)事件多与此有关,攻击者常常通过IRC来控制上万台受感染的主机来发动DDoS攻击,这类事件造成的危害也是非常巨大的。本文试图对IRC Trojan进行分析和探讨,希望能有助于提高大家对于IRC Trojan的安全意识和防范能力。 展开更多
关键词 trojan IRC DDOS攻击 CERT 防范能力 安全意识 破坏力 蠕虫病毒
下载PDF
特洁安技术公司 TrojanSwiftSC净水紫外消毒系统
17
《流程工业》 2011年第4期20-20,共1页
Trojan UVSwiftSC紫外消毒系统非常适合最高达44MGD(700m^3/hr)的小型流量应用.它的紧凑、坚固系统可以提供对地表水和地下水作为饮用水消毒有效而经济的解决方案。
关键词 消毒系统 紫外 技术 净水 trojan 饮用水消毒 地表水
下载PDF
RSA Fraud Action研究实验室采取措施应对Sinowal Trojan木马
18
《电信技术》 2009年第3期117-117,共1页
RSA Fraud Action研究实验室根据对Sinowal Trojan木马的跟踪和研究发现,俄罗斯网络犯罪集团近3年来利用Sirlowal Troian木马程序盗取了超过30万个网上银行账户和差不多相同数目的信用卡。其他如电子邮件和众多网站的FTP账户等信息也... RSA Fraud Action研究实验室根据对Sinowal Trojan木马的跟踪和研究发现,俄罗斯网络犯罪集团近3年来利用Sirlowal Troian木马程序盗取了超过30万个网上银行账户和差不多相同数目的信用卡。其他如电子邮件和众多网站的FTP账户等信息也受到了损害和盗窃。仅在过去的6个月中。 展开更多
关键词 trojan 木马程序 RSA 实验室 银行账户 网络犯罪 电子邮件 俄罗斯
下载PDF
加拿大特洁安技术公司:特洁安Trojan UV3000Plus
19
《流程工业》 2011年第21期49-49,共1页
特洁安Troian UV3000 PIUS系统采用最新的紫外技术。该系统采用高能效的低压高强紫外汞齐灯.使系统可根据流量及进水水质的变化而实时自动调节紫外灯的输出能量来优化系统能耗。
关键词 紫外技术 trojan 加拿大 优化系统 输出能量 自动调节 进水水质 紫外灯
下载PDF
新病毒档案Trojan/Beway
20
作者 付飞 《网管员世界》 2002年第10期51-51,共1页
关键词 计算机病毒 trojan病毒 Beway病毒
下载PDF
上一页 1 2 50 下一页 到第
使用帮助 返回顶部