Journal articles on the topic 'Trojan Attack'

To see the other types of publications on this topic, follow the link: Trojan Attack.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Trojan Attack.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Prathivi, Rastri, and Vensy Vydia. "ANALISA PENDETEKSIAN WORM dan TROJAN PADA JARINGAN INTERNET UNIVERSITAS SEMARANG MENGGUNAKAN METODE KALSIFIKASI PADA DATA MINING C45 dan BAYESIAN NETWORK." Jurnal Transformatika 14, no. 2 (January 30, 2017): 77. http://dx.doi.org/10.26623/transformatika.v14i2.440.

Full text
Abstract:
<p>Worm attacks become a dangerous threat and cause damage in the Internet network. If the Internet network worms and trojan attacks the very disruption of traffic data as well as create bandwidth capacity has increased and wasted making the Internet connection is slow. Detecting worms and trojan on the Internet network, especially new variants of worms and trojans and worms and trojans hidden is still a challenging problem. Worm and trojan attacks generally occur in computer networks or the Internet which has a low level of security and vulnerable to infection. The detection and analysis of the worm and trojan attacks in the Internet network can be done by looking at the anomalies in Internet traffic and internet protocol addresses are accessed.<br />This research used experimental research applying C4.5 and Bayesian Network methods to accurately classify anomalies in network traffic internet. Analysis of classification is applied to an internet address, internet protocol and internet bandwidth that allegedly attacked and trojan worm attacks.<br />The results of this research is a result of analysis and classification of internet addresses, internet protocol and internet bandwidth to get the attack worms and trojans.</p>
APA, Harvard, Vancouver, ISO, and other styles
2

Jain, Ayush, Ziqi Zhou, and Ujjwal Guin. "TAAL." ACM Transactions on Design Automation of Electronic Systems 26, no. 4 (April 2021): 1–22. http://dx.doi.org/10.1145/3442379.

Full text
Abstract:
Due to the globalization of semiconductor manufacturing and test processes, the system-on-a-chip (SoC) designers no longer design the complete SoC and manufacture chips on their own. This outsourcing of the design and manufacturing of Integrated Circuits (ICs) has resulted in several threats, such as overproduction of ICs, sale of out-of-specification/rejected ICs, and piracy of Intellectual Properties (IPs). Logic locking has emerged as a promising defense strategy against these threats. However, various attacks about the extraction of secret keys have undermined the security of logic locking techniques. Over the years, researchers have proposed different techniques to prevent existing attacks. In this article, we propose a novel attack that can break any logic locking techniques that rely on the stored secret key. This proposed TAAL attack is based on implanting a hardware Trojan in the netlist, which leaks the secret key to an adversary once activated. As an untrusted foundry can extract the netlist of a design from the layout/mask information, it is feasible to implement such a hardware Trojan. All three proposed types of TAAL attacks can be used for extracting secret keys. We have introduced the models for both the combinational and sequential hardware Trojans that evade manufacturing tests. An adversary only needs to choose one hardware Trojan out of a large set of all possible Trojans to launch the TAAL attack.
APA, Harvard, Vancouver, ISO, and other styles
3

Yao, Jiaqi, Ying Zhang, and Chen Xin. "Network-on-Chip hardware Trojan detection platform based on machine learning." Journal of Physics: Conference Series 2189, no. 1 (February 1, 2022): 012004. http://dx.doi.org/10.1088/1742-6596/2189/1/012004.

Full text
Abstract:
Abstract The extensive use of the Network-on-Chip (NoC) architecture makes it vulnerable to malicious attacks by hardware Trojans, especially Denial of Service (DoS) attack. To address this issue, this paper proposes a general NoC hardware Trojan detection platform based on machine learning. The platform establishes a security detection module including traffic feature tracking unit, feature registration unit, change point detection unit, and random forest detection unit, to accomplish the traffic-related hardware Trojan detection. The live-lock and fault routing Trojans are inserted in the proposed platform, then the simulation results verify the effectiveness of platform function and show its superiority to other existing detection schemes.
APA, Harvard, Vancouver, ISO, and other styles
4

Cheng, Siyuan, Yingqi Liu, Shiqing Ma, and Xiangyu Zhang. "Deep Feature Space Trojan Attack of Neural Networks by Controlled Detoxification." Proceedings of the AAAI Conference on Artificial Intelligence 35, no. 2 (May 18, 2021): 1148–56. http://dx.doi.org/10.1609/aaai.v35i2.16201.

Full text
Abstract:
Trojan (backdoor) attack is a form of adversarial attack on deep neural networks where the attacker provides victims with a model trained/retrained on malicious data. The backdoor can be activated when a normal input is stamped with a certain pattern called trigger, causing misclassification. Many existing trojan attacks have their triggers being input space patches/objects (e.g., a polygon with solid color) or simple input transformations such as Instagram filters. These simple triggers are susceptible to recent backdoor detection algorithms. We propose a novel deep feature space trojan attack with five characteristics: effectiveness, stealthiness, controllability, robustness and reliance on deep features. We conduct extensive experiments on 9 image classifiers on various datasets including ImageNet to demonstrate these properties and show that our attack can evade state-of-the-art defense.
APA, Harvard, Vancouver, ISO, and other styles
5

Lu, Jiazhong, Xiaolei Liu, Shibin Zhang, and Yan Chang. "Research and Analysis of Electromagnetic Trojan Detection Based on Deep Learning." Security and Communication Networks 2020 (November 25, 2020): 1–13. http://dx.doi.org/10.1155/2020/6641844.

Full text
Abstract:
The electromagnetic Trojan attack can break through the physical isolation to attack, and the leaked channel does not use the system network resources, which makes the traditional firewall and other intrusion detection devices unable to effectively prevent. Based on the existing research results, this paper proposes an electromagnetic Trojan detection method based on deep learning, which makes the work of electromagnetic Trojan analysis more intelligent. First, the electromagnetic wave signal is captured using software-defined radio technology, and then the signal is initially filtered in combination with a white list, a demodulated signal, and a rate of change in intensity. Secondly, the signal in the frequency domain is divided into blocks in a time-window mode, and the electromagnetic signals are represented by features such as time, information amount, and energy. Finally, the serialized signal feature vector is further extracted using the LSTM algorithm to identify the electromagnetic Trojan. This experiment uses the electromagnetic Trojan data published by Gurion University to test. And it can effectively defend electromagnetic Trojans, improve the participation of computers in electromagnetic Trojan detection, and reduce the cost of manual testing.
APA, Harvard, Vancouver, ISO, and other styles
6

Jiang, Dong, Yongkai Yang, Qisheng Guang, Chaohui Gao, and Lijun Chen. "Eavesdropping on quantum secret sharing protocols based on ring topology." Quantum Information and Computation 19, no. 7&8 (June 2019): 587–600. http://dx.doi.org/10.26421/qic19.7-8-4.

Full text
Abstract:
Quantum secret sharing (QSS) is the process of splitting a secret message into multiple parts such that no subset of parts is sufficient to reconstruct the secret message, but the entire set is. Ever since the first protocol was proposed, QSS has attracted intensive study, and many protocols have been proposed and implemented over recent years. However, we discover that several ring-topology based QSS protocols cannot resist Trojan-horse attacks. In this paper, we first give a modified Trojan-horse attack strategy and show that the eavesdropper can obtain any player's private data and the dealer's secret message without leaving any trace. Then we show that existing defense strategies cannot resist our attack. To defeat such attacks, we design a defense strategy based on quantum memory and evaluate its performance. The evaluation results indicate that the eavesdropper's attack significantly increases the quantum bit error rate and can thus be detected.
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Xinmu, Tamzidul Hoque, Abhishek Basak, Robert Karam, Wei Hu, Maoyuan Qin, Dejun Mu, and Swarup Bhunia. "Hardware Trojan Attack in Embedded Memory." ACM Journal on Emerging Technologies in Computing Systems 17, no. 1 (January 6, 2021): 1–28. http://dx.doi.org/10.1145/3422353.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Yu, Weize. "Hardware Trojan attacks on voltage scaling‐based side‐channel attack countermeasure." IET Circuits, Devices & Systems 13, no. 3 (March 19, 2019): 321–26. http://dx.doi.org/10.1049/iet-cds.2018.5087.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ivanov, Andre. "A Look at Trojan Attack, Pruning, and Dependability." IEEE Design & Test 32, no. 2 (April 2015): 4–5. http://dx.doi.org/10.1109/mdat.2015.2405591.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

于, 家涛. "Analysis of Trojan-Horse Attack against Untrusted Source." Computer Science and Application 08, no. 01 (2018): 59–66. http://dx.doi.org/10.12677/csa.2018.81009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Molotkov, S. N. "Unambiguous measurements and Trojan-horse attack in quantum cryptography." Laser Physics Letters 17, no. 1 (December 20, 2019): 015203. http://dx.doi.org/10.1088/1612-202x/ab5d25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Momin, Charles, Olivier Bronchain, and François-Xavier Standaert. "A stealthy Hardware Trojan based on a Statistical Fault Attack." Cryptography and Communications 13, no. 4 (March 13, 2021): 587–600. http://dx.doi.org/10.1007/s12095-021-00480-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Aprilliansyah, Deco, Imam Riadi, and Sunardi. "Analysis of Remote Access Trojan Attack using Android Debug Bridge." IJID (International Journal on Informatics for Development) 10, no. 2 (February 11, 2022): 102–11. http://dx.doi.org/10.14421/ijid.2021.2839.

Full text
Abstract:
The security hole in the android operating system sometimes not realized by users such as malware and exploitation by third parties to remote access. This study conducted to identify the vulnerabilities of android operating system by using Ghost Framework. The vulnerability of the android smartphone are found by using the Android Debug Bridge (ADB) with the exploitation method as well as to analyze the test results and identify remote access Trojan attacks. The exploitation method with several steps from preparing the tools and connecting to the testing commands to the testing device have been conducted. The result shows that android version 9 can be remote access by entering the exploit via ADB. Some information has been obtained by third parties, enter and change the contents of the system directory can be remote access like an authorized to do any activities on the device such as opening lock screen, entering the directory system, changing the system, etc.
APA, Harvard, Vancouver, ISO, and other styles
14

Bi, Qiangjia, Ning Wu, Fang Zhou, Jinbao Zhang, Muhammad Rehan Yahya, and Fen Ge. "Fault attack hardware Trojan detection method based on ring oscillator." IEICE Electronics Express 16, no. 8 (2019): 20190143. http://dx.doi.org/10.1587/elex.16.20190143.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Bozdal, Mehmet, Maulana Randa, Mohammad Samie, and Ian Jennions. "Hardware Trojan Enabled Denial of Service Attack on CAN Bus." Procedia Manufacturing 16 (2018): 47–52. http://dx.doi.org/10.1016/j.promfg.2018.10.158.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Yang, Chun-Wei, and Tzonelih Hwang. "Trojan horse attack free fault-tolerant quantum key distribution protocols." Quantum Information Processing 13, no. 3 (November 30, 2013): 781–94. http://dx.doi.org/10.1007/s11128-013-0689-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Zhao, Fugang. "Naive Bayes Algorithm Mining Mobile Phone Trojan Crime Clues." Mobile Information Systems 2022 (August 26, 2022): 1–11. http://dx.doi.org/10.1155/2022/6262147.

Full text
Abstract:
After the mobile phone virus infects the mobile phone, it can transmit the real-time information of the user to the designated place set by the virus through the built-in recorder and camera on the mobile phone, thereby causing information leakage. With the rapid development of the Internet, the penetration rate of mobile terminals is also increasing day by day. As an emerging mobile terminal, smart phones have now fully occupied the market. With this trend, the importance of mobile phone information security is also increasing day by day. How to prevent mobile phone virus has gradually become an important issue. Trojan horse crime cases have different manifestations and behavioral characteristics from traditional cases. They have the characteristics of low crime cost, high income, high concealment, novel criminal methods, and great difficulty in detection, which brings greater difficulties to the public security organs in their investigation and detection. And the current research on mobile phone virus behavior is still in the preliminary stage, and some existing detection models can only target random networks. Trojan horses, viruses, and malicious software for smartphones have sprung up like mushrooms after rain, seriously infringing on the data security of mobile communication terminals, such as mobile phones and causing incalculable losses to users. This paper proposes a naive Bayesian algorithm to mine the clues of the criminal cases of mobile phone Trojans. It helps detect and discover new viruses at the beginning of an attack, allowing them to be more effectively defended and contained. And based on the feature set data extracted from the network data packets, it conducts an in-depth analysis of the current business behaviors of mobile phone Trojans, such as propagation and implantation, remote control, leakage of user privacy information, and malicious ordering, and extracts its behavior characteristics. Thus, unknown mobile Trojan horses that are taking place can be detected. The experimental results of the naive Bayesian classification algorithm proposed in this paper show that the algorithm improves the accuracy of mobile phone Trojan virus mining by 28%, which plays a significant role.
APA, Harvard, Vancouver, ISO, and other styles
18

Li, Yufeng, Le Tian, Han Qiu, and Chuanhao Zhang. "Research Notes: Distributed Shadow for Router Security Defense." International Journal of Software Engineering and Knowledge Engineering 28, no. 02 (February 2018): 193–206. http://dx.doi.org/10.1142/s021819401840003x.

Full text
Abstract:
Router security defense technologies emerging in recent years could hardly detect and block the new booming threats with unknown signatures such as hardware Trojan, zero-day attacks, etc. We present a novel router defense technology, distributed router shadow, which builds a closed execution environment to deceive attacks entering into the router, thereby misleading the attackers into regarding it as the real attack target and executing the suspicious code to maximize the chances of detonating the system exploit; thus the original router is prevented from attacking and the suspicious code can be detected. Our experiment and analysis show that the router shadow can defend not only attacks with signature but also some new attacks without signature.
APA, Harvard, Vancouver, ISO, and other styles
19

Pan, Yaxi, Ling Zhang, and Duan Huang. "Practical Security Bounds against Trojan Horse Attacks in Continuous-Variable Quantum Key Distribution." Applied Sciences 10, no. 21 (November 3, 2020): 7788. http://dx.doi.org/10.3390/app10217788.

Full text
Abstract:
As the existence of non-zero reflection coefficients in the real component of continuous-variable quantum key distribution (CV-QKD) systems, Eve can probe the system by sending the bright light pulses into Alice’s set-up. With the analysis of back-reflections, Eve only takes a few back-reflected photons to intercept information and obtain the raw key bit. In this paper, the attack problems are converted into the information leakage problems. First, we analyzed the Trojan horse attacks with different wavelengths and confirmed its side effects, such as crosstalk and anti-Stokes Raman scattering, by a numerical simulation. Then, based on the wavelength-dependent property of beam splitter, we presented a practical way to estimate the deviation of shot noise and therefore correct the excess noise by inserting different wavelength pulses under joint attacks. Finally, we specified the security bounds of the system through quantifying the excess noise bounds caused by the Trojan horse attacks and provided a theoretical reference for the secret key transmission of system. As a consequence, the transmission errors within the security bounds can be negligible and the legitimate users will not perceive the presence of Eve.
APA, Harvard, Vancouver, ISO, and other styles
20

Chen, Hao, Tao Wang, Fan Zhang, Xinjie Zhao, Wei He, Lumin Xu, and Yunfei Ma. "Stealthy Hardware Trojan Based Algebraic Fault Analysis of HIGHT Block Cipher." Security and Communication Networks 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/8051728.

Full text
Abstract:
HIGHT is a lightweight block cipher which has been adopted as a standard block cipher. In this paper, we present a bit-level algebraic fault analysis (AFA) of HIGHT, where the faults are perturbed by a stealthy HT. The fault model in our attack assumes that the adversary is able to insert a HT that flips a specific bit of a certain intermediate word of the cipher once the HT is activated. The HT is realized by merely 4 registers and with an extremely low activation rate of about 0.000025. We show that the optimal location for inserting the designed HT can be efficiently determined by AFA in advance. Finally, a method is proposed to represent the cipher and the injected faults with a merged set of algebraic equations and the master key can be recovered by solving the merged equation system with an SAT solver. Our attack, which fully recovers the secret master key of the cipher in 12572.26 seconds, requires three times of activation on the designed HT. To the best of our knowledge, this is the first Trojan attack on HIGHT.
APA, Harvard, Vancouver, ISO, and other styles
21

Tsai, Chia-Wei, and Chun-Wei Yang. "Lightweight authenticated semi-quantum key distribution protocol without trojan horse attack." Laser Physics Letters 17, no. 7 (June 22, 2020): 075202. http://dx.doi.org/10.1088/1612-202x/ab9444.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Yang, Daming, Cheng Gao, and Jiaoying Huang. "Dynamic Game for Strategy Selection in Hardware Trojan Attack and Defense." IEEE Access 8 (2020): 213094–103. http://dx.doi.org/10.1109/access.2020.3040395.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Souza, Jaqueline Patrícia de Almeida. "FORTALEZAS E FRAGILIDADES NO USO DA INTELIGÊNCIA ARTIFICIAL NA CIBERSEGURANÇA." REVISTA TECNOLÓGICA DA FATEC AMERICANA 09, no. 02 (December 20, 2021): 25–40. http://dx.doi.org/10.47283/244670492021090225.

Full text
Abstract:
This article develops an analysis of the use of artificial intelligence in cybersecurity and tries to explore its weaknesses, and how it can be used for cyber-attacks. Artificial Intelligence began in the 1950s and over the years several researchers have contributed to its improvement, techniques such as the Neural Network proposed by neuropsychologist Mcculloch and the logician Pitts , the creation of expert systems had relevance in its construction, today the artificial intelligence is super advanced and covers a variety of subfields , among the areas that benefited most from its use is the cybersecurity where it is applied in the detection of fraud, forensic investigation, denial attacks (Ddos), virus detection, and more. Because of its ability to reuse threat patterns it can reduce time and costs. This technological capability that Artificial Intelligence brings can also be used for Cyberattacks, the Trojan Emotet is an example of a prototype attack of this type. In 2017 the Wannacry attack that hit 150 countries gave us a taste of what a large-scale cyber-attack can do. This is why experts fear the use of opposing Artificial Intelligence, which has made attacks increasingly sophisticated and unpredictable. Artificial intelligence will continue to impact the technological security landscape and there are many more gains than losses from its use, and without it in cybersecurity it will not be possible to inhibit cyber-criminal attacks
APA, Harvard, Vancouver, ISO, and other styles
24

Renolafitri, Hendrini. "“An Analysis of Trojan Horse Affairs, Measuring the Impact of Hoax Produced by Anti-Muslim Government in the UK”." POLITEA 2, no. 2 (October 18, 2019): 127. http://dx.doi.org/10.21043/politea.v2i2.6329.

Full text
Abstract:
<p>This paper highlights one concrete example of how the power of <em>Hoaxes</em> can provide an extra-ordinary significant impact to the country. The term<em> </em>of <em>the Trojan Horse Affairs</em> make this issue more interesting for the author to discuss. The term of <em>Trojan Horse </em>generally used in technological science to describe the existence of the <em>malware </em>or <em>viruses</em> activity, whos hiding in suspicious forms and then damage the core systems on a computer or steal its data. The damage caused by the <em>Trojan Horse</em> is usually very severe (<em>Trojan Horses</em>, 2019).</p><p>In the study of international relations, the term of <em>Trojan Horse </em>was also recently introduced to defined the “terrorist operations”. This is because, terrorist operations are also use hidden movements on their actions to attack or stealing data which resulted in fatal damage. For that kind of reason, in the study of international relations, the term of <em>Trojan Horse</em> is also synonymous with serious crime, which are usually carried out by the opponents, enemies, or international criminal syndicate (<em>Trojan Horses</em>, 2019).</p>Tracing the origin history the use of the term of <em>The Trojan Horse</em> will remind back with the Ancient Greek War, between the <em>Achaena</em> (Greek) and Trojan people. This history become phenomenal after the <em>Achaena </em>win the war with their clever trick of smuggling its soldier into an unsuspecting wooden horse statue, soon called <em>“The Trojan Horse”</em>statue. The Trojan people immediately got killed in the night, when their soldiers were unaware and sleeping. The Achenian soldiers came out from their hiding place and then ended this storys (Mogra, n.d.).
APA, Harvard, Vancouver, ISO, and other styles
25

Hu, Zhanhao, Jun Zhu, Bo Zhang, and Xiaolin Hu. "Amplification trojan network: Attack deep neural networks by amplifying their inherent weakness." Neurocomputing 505 (September 2022): 142–53. http://dx.doi.org/10.1016/j.neucom.2022.07.018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Zhao, Yiming, Xiaohang Wang, Yingtao Jiang, Liang Wang, Mei Yang, Amit Kumar Singh, and Terrence Mak. "On hardware-trojan-assisted power budgeting system attack targeting many core systems." Journal of Systems Architecture 109 (October 2020): 101757. http://dx.doi.org/10.1016/j.sysarc.2020.101757.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Boraten, Travis, and Avinash Kodi. "Mitigation of Hardware Trojan based Denial-of-Service attack for secure NoCs." Journal of Parallel and Distributed Computing 111 (January 2018): 24–38. http://dx.doi.org/10.1016/j.jpdc.2017.06.014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Kamarudin, Nur Khairani, Nur Nazifa Md Hasani, Rafiza Ruslan, Rashidah Ramle, Nurul Hidayah Ahmad Zukri, and Iman Hazwam Abd Halim. "Performance Analysis of Malware Attack." Journal of Computing Research and Innovation 3, no. 4 (November 18, 2018): 19–24. http://dx.doi.org/10.24191/jcrinn.v3i4.72.

Full text
Abstract:
People in this new era of modernization nowadays take Internet as one of the vital thing for daily activities. Internet is not only for adults, it is also a needs for people of all ages. However, network vulnerabilities exist in all network that are connec ted to the Internet. The network mostly are exposed to the malicious software or mostly known as malware. In fact, this malware is growing rapidly and giving a bad impact to the human intervention. The number of attack are increasing rapidly and it comes i n various way just to exploit the victims. There are various type of malware attack. For instance, viruses, worms, spyware, rootkits, Trojan horse and botnet are considered as noteworthy threat for the computer network. Some people giving full confidence on the security of data transmission to the network. However, other can access the personal information without them realizing it. The objective of this paper is to detect malware attack using honeypot Dionaea. Malicious file launched was detected by the honeypot and the file was analyzed by using the sandbox tool, Virus Total. This paper found that honeypot Dionaea is helpful in detecting various types of malware attack.
APA, Harvard, Vancouver, ISO, and other styles
29

Taylor, O. E., P. S. Ezekiel, and V. T. Emmah. "A Mult-Task System for Detecting and Classifying Malware Signatures Using Random Forest Classifier." Advances in Multidisciplinary and scientific Research Journal Publication 29 (December 15, 2021): 73–84. http://dx.doi.org/10.22624/aims/abmic2021-v2-p6.

Full text
Abstract:
The rapid increase in the use of information technology has made cyber-attacks a major concern in the use of internet by users globally. These attacks are carried out in different forms, some are carried out as phishing, man in the middle, malicious applications and so on. In this study we will focus on malware attack. Malicious applications have been a major challenge in the use of applications on windows operating system. These malicious attacks are being carried out in different forms. Some of these attacks are trojan, ransom, keylogger etc. The need to detect and classifier these malicious attacks in windows operating system is an important task. So therefore, this paper presents a smart system for detecting and classifying eight categories of malware attack on windows operating system using random forest classifier. The system starts by collecting signatures of malware attack on windows from Virus Share, Virus Sign and Github respiratory. The collected malware signatures went through the following stages of preprocessing (First stage, Second Stage, and Third Stage). The first stage has to do with creating a pandas. Dataframe using the malware signatures. The second stage has to with data cleaning and the third stage has to do with data transformation. The result of the Random Forest Classifier shows a promising performance in terms of accuracy, precision, f1-score, and recall. The result shows that the Random Forest Classifier has an accuracy of about 100% for each of the matrix evaluation. Keywords- Malware signatures, Random Forest Classifier, Windows operating System, Matrix Evaluation
APA, Harvard, Vancouver, ISO, and other styles
30

Abulkasim, Hussein, Safwat Hamad, Amal Khalifa, and Khalid El Bahnasy. "Quantum secret sharing with identity authentication based on Bell states." International Journal of Quantum Information 15, no. 04 (May 3, 2017): 1750023. http://dx.doi.org/10.1142/s021974991750023x.

Full text
Abstract:
Quantum secret sharing techniques allow two parties or more to securely share a key, while the same number of parties or less can efficiently deduce the secret key. In this paper, we propose an authenticated quantum secret sharing protocol, where a quantum dialogue protocol is adopted to authenticate the identity of the parties. The participants simultaneously authenticate the identity of each other based on parts of a prior shared key. Moreover, the whole prior shared key can be reused for deducing the secret data. Although the proposed scheme does not significantly improve the efficiency performance, it is more secure compared to some existing quantum secret sharing scheme due to the identity authentication process. In addition, the proposed scheme can stand against participant attack, man-in-the-middle attack, impersonation attack, Trojan-horse attack as well as information leaks.
APA, Harvard, Vancouver, ISO, and other styles
31

Govindan, Vidya, Rajat Subhra Chakraborty, Pranesh Santikellur, and Aditya Kumar Chaudhary. "A Hardware Trojan Attack on FPGA-Based Cryptographic Key Generation: Impact and Detection." Journal of Hardware and Systems Security 2, no. 3 (June 20, 2018): 225–39. http://dx.doi.org/10.1007/s41635-018-0042-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Chang, Chih-Hung, Chun-Wei Yang, and Tzonelih Hwang. "Trojan Horse Attack Free Fault-Tolerant Quantum Key Distribution Protocols Using GHZ States." International Journal of Theoretical Physics 55, no. 9 (April 30, 2016): 3993–4004. http://dx.doi.org/10.1007/s10773-016-3028-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Tsai, Chia-Wei, Chun-Wei Yang, and Narn-Yih Lee. "Lightweight mediated semi-quantum key distribution protocol." Modern Physics Letters A 34, no. 34 (November 5, 2019): 1950281. http://dx.doi.org/10.1142/s021773231950281x.

Full text
Abstract:
Classical users can share a secret key with a quantum user by using a semi-quantum key distribution (SQKD) protocol. Allowing two classical users to share a secret key is the objective of the mediated semi-quantum key distribution (MSQKD) protocol. However, the existing MSQKD protocols need a quantum user to assist two classical users in distributing the secret keys, and these protocols require that the classical users be equipped with a Trojan horse photon detector. This reduces the practicability of the MSQKD protocols. Therefore, in this study we propose a lightweight MSQKD, in which the two participants and third party are classical users. Due to the usage of the one-way transmission strategy, the proposed lightweight MSQKD protocol is free from quantum Trojan horse attack. The proposed MSQKD is more practical than the existing MSQKD protocols.
APA, Harvard, Vancouver, ISO, and other styles
34

Kokila, Jagadeesh, Arjun Murali Das, Basha Shameedha Begum, and Natarajan Ramasubramanian. "Hardware Signature Generation Using a Hybrid PUF and FSM Model for an SoC Architecture." Periodica Polytechnica Electrical Engineering and Computer Science 63, no. 4 (June 14, 2019): 244–53. http://dx.doi.org/10.3311/ppee.13424.

Full text
Abstract:
Security is becoming an important issue in the recent System on Chip (SoC) design due to various hardware attacks that can affect manufacturers, system designers or end users. Major issues include hardware Trojan attack, hardware intellectual property (IP) theft, such as an illegal sale or use of firm intellectual property cores or integrated circuits (ICs) and physical attacks. A hybrid model consisting of Arbiter PUF and Butterfly PUF are used to generate random responses which are fed to a Finite State Machine (FSM). A three-level FSM was designed to generate the signature correctly to authenticate IPs. The results were obtained with the help of three Intellectual Property (IP) cores – Zedboard OLED IP, ISCAS’89 s1423 Benchmark IP and a Full Adder IP. A 16-bit arbiter PUF and Butterfly PUF have been implemented on a 28nm FPGA. The average execution time to generate hardware signature for three IP cores was found to be 4.78 seconds (5 iterations) which is considerably low.
APA, Harvard, Vancouver, ISO, and other styles
35

Ma, Hong-Xin, Wan-Su Bao, Hong-Wei Li, and Chun Chou. "Quantum hacking of two-way continuous-variable quantum key distribution using Trojan-horse attack." Chinese Physics B 25, no. 8 (July 26, 2016): 080309. http://dx.doi.org/10.1088/1674-1056/25/8/080309.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Kaji, Shugo, Masahiro Kinugawa, Daisuke Fujimoto, and Yu-ichi Hayashi. "Data Injection Attack Against Electronic Devices With Locally Weakened Immunity Using a Hardware Trojan." IEEE Transactions on Electromagnetic Compatibility 61, no. 4 (August 2019): 1115–21. http://dx.doi.org/10.1109/temc.2018.2849105.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Zhang, Yue, Xiangjun Xin, and Fagen Li. "Secure and efficient quantum designated verifier signature scheme." Modern Physics Letters A 35, no. 18 (May 13, 2020): 2050148. http://dx.doi.org/10.1142/s0217732320501485.

Full text
Abstract:
A digital signature with designated verifier (SWDV) makes that only the designated verifier can verify its validity. It can be used to protect the privacy and economic interest of the signer. So, the SWDV schemes have many applications in e-voting, auction and some other fields. To make the SWDV secure against the quantum forger, a quantum signature with designated verifier signature (QSWDV) scheme is proposed. Our QSWDV is robust due to its strong security against forgery attack, inter-resending attacks, impersonation attacks and Trojan horse attacks. Its properties such as non-transferability and hiding source can be guaranteed by the signature simulation of the designated verifier. What is more, our scheme can be proved to be information-theoretically secure, which can guarantee the secrecy of the signer’s private key and the unforgeability of the QSWDV. In the proposed QSWDV scheme, the partners neither need use quantum one-way function nor need perform quantum state comparisons, which can reduce the complexity and improve the efficiency the QSWDV scheme.
APA, Harvard, Vancouver, ISO, and other styles
38

Winick, Adam, Norbert Lütkenhaus, and Patrick J. Coles. "Reliable numerical key rates for quantum key distribution." Quantum 2 (July 26, 2018): 77. http://dx.doi.org/10.22331/q-2018-07-26-77.

Full text
Abstract:
In this work, we present a reliable, efficient, and tight numerical method for calculating key rates for finite-dimensional quantum key distribution (QKD) protocols. We illustrate our approach by finding higher key rates than those previously reported in the literature for several interesting scenarios (e.g., the Trojan-horse attack and the phase-coherent BB84 protocol). Our method will ultimately improve our ability to automate key rate calculations and, hence, to develop a user-friendly software package that could be used widely by QKD researchers.
APA, Harvard, Vancouver, ISO, and other styles
39

Leigh, Matthew. "Sophocles At Patavium (fr. 137 Radt)." Journal of Hellenic Studies 118 (November 1998): 82–100. http://dx.doi.org/10.2307/632232.

Full text
Abstract:
One of the most interesting of the myths concerning the migration to the West of those Trojan heroes who survived the destruction of their city is that of Antenor and his sons. That Antenor and his family received the embassy of the Greeks, saved them from attack by a group of Trojans and consistently urged peace and the return of Helen is already established in Homer. The consequent decision of the Greeks to spare the Antenorids at the sack of Troy is almost certainly present in the epic cycle. Somewhat later, two further traditions emerge: first the claim that Troy was betrayed by the Antenorids; second, that Antenor and various of his sons travelled overseas and settled in distant lands, notably Cyrene in Libya and Patavium in the Veneto. For anyone concerned with the development of the myth, it is therefore deeply frustrating that so little should remain of what must have been a crucial text: the Antenoridae of Sophocles. The aim of this paper is to demonstrate that there is far more to be known about this play than has hitherto been perceived.
APA, Harvard, Vancouver, ISO, and other styles
40

Altoub, Majed, Fahad AlQurashi, Tan Yigitcanlar, Juan M. Corchado, and Rashid Mehmood. "An Ontological Knowledge Base of Poisoning Attacks on Deep Neural Networks." Applied Sciences 12, no. 21 (October 31, 2022): 11053. http://dx.doi.org/10.3390/app122111053.

Full text
Abstract:
Deep neural networks (DNNs) have successfully delivered cutting-edge performance in several fields. With the broader deployment of DNN models on critical applications, the security of DNNs has become an active and yet nascent area. Attacks against DNNs can have catastrophic results, according to recent studies. Poisoning attacks, including backdoor attacks and Trojan attacks, are one of the growing threats against DNNs. Having a wide-angle view of these evolving threats is essential to better understand the security issues. In this regard, creating a semantic model and a knowledge graph for poisoning attacks can reveal the relationships between attacks across intricate data to enhance the security knowledge landscape. In this paper, we propose a DNN poisoning attack ontology (DNNPAO) that would enhance knowledge sharing and enable further advancements in the field. To do so, we have performed a systematic review of the relevant literature to identify the current state. We collected 28,469 papers from the IEEE, ScienceDirect, Web of Science, and Scopus databases, and from these papers, 712 research papers were screened in a rigorous process, and 55 poisoning attacks in DNNs were identified and classified. We extracted a taxonomy of the poisoning attacks as a scheme to develop DNNPAO. Subsequently, we used DNNPAO as a framework by which to create a knowledge base. Our findings open new lines of research within the field of AI security.
APA, Harvard, Vancouver, ISO, and other styles
41

Melosik, Michal, and Wieslaw Marszalek. "Trojan Attack on the Initialization of Pseudo-Random Bit Generators Using Synchronization of Chaotic Input Sources." IEEE Access 9 (2021): 161846–53. http://dx.doi.org/10.1109/access.2021.3131969.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Waliulu, Raditya Faisal, and Teguh Hidayat Iskandar Alam. "Reverse Engineering Analysis Statis Forensic Malware Webc2-Div." Insect (Informatics and Security): Jurnal Teknik Informatika 4, no. 1 (August 23, 2019): 15. http://dx.doi.org/10.33506/insect.v4i1.223.

Full text
Abstract:
At this paper focus on Malicious Software also known as Malware APT1 (Advance Persistent Threat) codename WEBC2-DIV the most variants malware has criteria consists of Virus, Worm, Trojan, Adware, Spyware, Backdoor either Rootkit. Although, malware could avoidance scanning antivirus but reverse engineering could be know how dangerous malware infect computer client. Lately, malware attack as a form espionage (cyberwar) one of the most topic on security internet, because of has massive impact. Forensic malware becomes indicator successful user to realized about malware infect. This research about reverse engineering. A few steps there are scanning, suspected packet in network and analysis of malware behavior and disassembler body malware.
APA, Harvard, Vancouver, ISO, and other styles
43

Gao, Hui, Yunfang Chen, and Wei Zhang. "Detection of Trojaning Attack on Neural Networks via Cost of Sample Classification." Security and Communication Networks 2019 (November 29, 2019): 1–12. http://dx.doi.org/10.1155/2019/1953839.

Full text
Abstract:
To overcome huge resource consumption of neural networks training, MLaaS (Machine Learning as a Service) has become an irresistible trend, just like SaaS (Software as a Service), PaaS (Platform as a Service), and IaaS (Infrastructure as a Service) have been. But it comes with some security issues of untrustworthy third-party services. Especially machine learning providers may deploy trojan backdoors in provided models for the pursuit of extra profit or other illegal purposes. Against the redundant nodes-based trojaning attack on neural networks, we proposed a novel detecting method, which only requires the untrusted model to be tested and a small batch of legitimate dataset. By comparing different processes of neural networks training, we found that the embedding of malicious nodes will make their parameter configuration abnormal. Moreover, by analysing the cost distribution of test dataset on network nodes, we successfully detect the trojaned nodes in the neural networks. As far as we know, the research on the defence against trojaning attack on neural networks is still in its infancy, and our research may shed light on the security of MLaaS in real-life scenarios.
APA, Harvard, Vancouver, ISO, and other styles
44

Amblard, Zoe, and Francois Arnault. "A qutrit quantum key distribution protocol using Bell inequalities with larger violation capabilities." Quantum Information and Computation 15, no. 15&16 (November 2015): 1295–306. http://dx.doi.org/10.26421/qic15.15-16-2.

Full text
Abstract:
The Ekert quantum key distribution protocol [1] uses pairs of entangled qubits and performs checks based on a Bell inequality to detect eavesdropping. The 3DEB protocol [2] uses instead pairs of entangled qutrits to achieve better noise resistance than the Ekert protocol. It performs checks based on a Bell inequality for qutrits named CHSH-3 and found in [3, 4]. In this paper, we present a new protocol, which also uses pairs of entangled qutrits, but gaining advantage of a Bell inequality which achieves better noise resistance than the one used in 3DEB. The latter inequality is called here hCHSH-3 and was discovered in [5]. For each party, the hCHSH-3 inequality involves four observables already used in CHSH-3 but also two products of observables which do not commute. We explain how the parties can measure the observables corresponding to these products and thus are able to check the violation of hCHSH-3. In the presence of noise, this violation guarantees the security against a local Trojan horse attack. We also designed a version of our protocol which is secure against individual attacks.
APA, Harvard, Vancouver, ISO, and other styles
45

Warsino, Warsino. "Efek Pandemi Covid-19 Terhadap Kejahatan Siber di Indonesia." Tekinfo: Jurnal Ilmiah Teknik Industri dan Informasi 9, no. 1 (January 26, 2021): 27–33. http://dx.doi.org/10.31001/tekinfo.v9i1.1040.

Full text
Abstract:
Kejahatan terjadi bukan hanya karena ada niat pelakunya, tetapi juga karena ada kesempatan. Pandemi Covid-19 membuat seluruh aspek kehidupan manusia terimbas. Aktivitas yang biasa dilakukan diluar rumah, karena pandemi harus berubah dilakukan didalam rumah. Meningkatnya pemakaian internet oleh masyarakat, ditambah dengan kurangnya kepedulian akan keamanan komputer menjadikan peluang ini dimanfaatkan oleh para penjahat siber. Akibatnya, terjadi kenaikan serangan siber bukan hanya di Indonesia, tapi juga diseluruh dunia. Sampai dengan April 2020, telah terjadi kenaikan komulatif sebanyak 88.414.296 serangan, dengan dominasi serangan berupa Trojan sebanyak 56%, Information gathering sebanyak 43% dan Web Attack sebanyak 1%. Untuk itu, perlu pemahaman dan kewaspadaan dari seluruh pengguna internet agar menutup celah keamanan, sehingga masyarakat bisa bekerja dengan aman, tenang dan nyaman dari rumah masing-masing.
APA, Harvard, Vancouver, ISO, and other styles
46

Kashyap. S, Abishek. "Prevention of Clone Attack in Online Social Media Integrating Secure Data Transmission." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 30, 2021): 2961–67. http://dx.doi.org/10.22214/ijraset.2021.35662.

Full text
Abstract:
Social networking is becoming so essential nowadays and is playing a bigger role in every man’s life for sharing information and knowledge. Also social network is used to see the everyday activities, photos, videos, political agendas and propagandas. Therefore, it is now becoming an important tool to stay updated in this dynamic world. With large chunks of data being generated every second, there is a growing concern about Data protection and user privacy in the Social media network. One of the major concerns being, ‘Fake Users’ - misusing the authorized user’s information like photos and videos without the authorized user’s permission and disguising oneself as a legitimate user. In our contemporary world, many fake profiles are being created for fraudulent activities like money making, malware / virus / Trojan distribution to use user data, especially with malicious intent. In this paper Java static watermarking is proposed. Java static watermark is used in our social media website in order to associate each user's footprint with respect to their unique ID, eliminating the crux of fake users. It is also very evident to say that data present on the cloud is no less prone to cyber-attacks. In this paper, integration of steganography methods for protection of sensitive data on the public cloud server is also proposed to validate its viability and its increased security. The Algorithms used ensure the individual information is kept secret and transmitted in a secure manner with user privacy preserving.
APA, Harvard, Vancouver, ISO, and other styles
47

Kakkara, Varsha, Karthi Balasubramanian, B. Yamuna, Deepak Mishra, Karthikeyan Lingasubramanian, and Senthil Murugan. "A Viterbi decoder and its hardware Trojan models: an FPGA-based implementation study." PeerJ Computer Science 6 (March 2, 2020): e250. http://dx.doi.org/10.7717/peerj-cs.250.

Full text
Abstract:
Integrated circuits may be vulnerable to hardware Trojan attacks during its design or fabrication phases. This article is a case study of the design of a Viterbi decoder and the effect of hardware Trojans on a coded communication system employing the Viterbi decoder. Design of a Viterbi decoder and possible hardware Trojan models for the same are proposed. An FPGA-based implementation of the decoder and the associated Trojan circuits have been discussed. The noise-added encoded input data stream is stored in the block RAM of the FPGA and the decoded data stream is monitored on the PC through an universal asynchronous receiver transmitter interface. The implementation results show that there is barely any change in the LUTs used (0.5%) and power dissipation (3%) due to the insertion of the proposed Trojan circuits, thus establishing the surreptitious nature of the Trojan. In spite of the fact that the Trojans cause negligible changes in the circuit parameters, there are significant changes in the bit error rate (BER) due to the presence of Trojans. In the absence of Trojans, BER drops down to zero for signal to noise rations (SNRs) higher than 6 dB, but with the presence of Trojans, BER doesn’t reduce to zero even at a very high SNRs. This is true even with the Trojan being activated only once during the entire duration of the transmission.
APA, Harvard, Vancouver, ISO, and other styles
48

Niess, Hanno, Michael N. Thomas, Tobias S. Schiergens, Axel Kleespies, Karl-Walter Jauch, Christiane Bruns, Jens Werner, Peter J. Nelson, and Martin K. Angele. "Genetic engineering of mesenchymal stromal cells for cancer therapy: turning partners in crime into Trojan horses." Innovative Surgical Sciences 1, no. 1 (September 1, 2016): 19–32. http://dx.doi.org/10.1515/iss-2016-0005.

Full text
Abstract:
AbstractMesenchymal stromal cells (MSCs) are adult progenitor cells with a high migratory and differentiation potential, which influence a broad range of biological functions in almost every tissue of the body. Among other mechanisms, MSCs do so by the secretion of molecular cues, differentiation toward more specialized cell types, or influence on the immune system. Expanding tumors also depend on the contribution of MSCs to building a supporting stroma, but the effects of MSCs appear to go beyond the mere supply of connective tissues. MSCs show targeted “homing” toward growing tumors, which is then followed by exerting direct and indirect effects on cancer cells. Several research groups have developed novel strategies that make use of the tumor tropism of MSCs by engineering them to express a transgene that enables an attack on cancer growth. This review aims to familiarize the reader with the current knowledge about MSC biology, the existing evidence for MSC contribution to tumor growth with its underlying mechanisms, and the strategies that have been developed using MSCs to deploy an anticancer therapy.
APA, Harvard, Vancouver, ISO, and other styles
49

B, Manoj, and Fancy C. "Checksec Email Phishi Trasher Tool." International Journal of Engineering & Technology 7, no. 4.6 (September 25, 2018): 363. http://dx.doi.org/10.14419/ijet.v7i4.6.28442.

Full text
Abstract:
In this faster networking world, Phishing has become the most popular practice among the criminals of the web. Various phishing types are deceptive, spear phishing, Email phishing, malware-based phishing, key loggers, session hijacking, man in middle, Trojan, DNS poisoning, cross-site scripting attacks. There is a need for automated tools to solve the problem by the victim side. Existing methods are regularly too tedious to be utilized in reality as far as recognition and relief session. Hence it is decided to propose a model which focuses on detecting and preventing the email phishing attack. In this paper, we present PhishiTrasher, another discovery and relief approach, where we initially propose another system for Deep Packet Inspection afterward use in phishing exercises through email and electronic correspondence. The proposed packet inspection approach comprises parts, vulnerable mark arrangement then continuous DPI. With the help of the phishing assault marks, outline the continuous DPI with the goal that PhishiTrasher can adapt to address the elements of phishing assaults in reality. PhishiTrasher gives better system movement administration to containing phishing assaults since it has the worldwide perspective of a system. Moreover, we assess PhishiTrasher utilizing a true test bed condition and databases comprising of genuine email with installed joins. Our broad test contemplate demonstrates that PhishiTrasher gives a powerful and effective answer for prevent phishing attacks through email. Results demonstrate that profiling should be possible with very high genuine.
APA, Harvard, Vancouver, ISO, and other styles
50

Chandy, Jeff. "Review on Malware, Types, and its Analysis." International Journal for Research in Applied Science and Engineering Technology 10, no. 12 (December 31, 2022): 386–90. http://dx.doi.org/10.22214/ijraset.2022.47887.

Full text
Abstract:
Abstract: Malicious entities utilize malware as a tool to carry out their nefarious plans. Malicious software, sometimes known as malware or mal-ware, is a type of program with malicious intents. Malware and spam both pose severe hazards to the security of systems, raising complex system issues. Malware that compromises computers through a coordinated attack includes worms, trojan horses, botnets, and rootkits. It is challenging to compile convincing evidence because inadequate tools are available, and the system is still in its infancy. This study examined the challenges faced by investigators in their search for a missing person. The author emphasized the need for a novel approach to malware detection that focuses on a robust framework and offered a solution based on a thorough literature evaluation and market research analysis. While market research was carried out to ascertain the precise nature of the current problem, the literature review concentrated on various malware detection tests and methodologies to establish the parameters for developing a solution design
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography