Добірка наукової літератури з теми "Trojan Attack"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Trojan Attack".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Trojan Attack"
Prathivi, Rastri, and Vensy Vydia. "ANALISA PENDETEKSIAN WORM dan TROJAN PADA JARINGAN INTERNET UNIVERSITAS SEMARANG MENGGUNAKAN METODE KALSIFIKASI PADA DATA MINING C45 dan BAYESIAN NETWORK." Jurnal Transformatika 14, no. 2 (January 30, 2017): 77. http://dx.doi.org/10.26623/transformatika.v14i2.440.
Повний текст джерелаJain, Ayush, Ziqi Zhou, and Ujjwal Guin. "TAAL." ACM Transactions on Design Automation of Electronic Systems 26, no. 4 (April 2021): 1–22. http://dx.doi.org/10.1145/3442379.
Повний текст джерелаYao, Jiaqi, Ying Zhang, and Chen Xin. "Network-on-Chip hardware Trojan detection platform based on machine learning." Journal of Physics: Conference Series 2189, no. 1 (February 1, 2022): 012004. http://dx.doi.org/10.1088/1742-6596/2189/1/012004.
Повний текст джерелаCheng, Siyuan, Yingqi Liu, Shiqing Ma, and Xiangyu Zhang. "Deep Feature Space Trojan Attack of Neural Networks by Controlled Detoxification." Proceedings of the AAAI Conference on Artificial Intelligence 35, no. 2 (May 18, 2021): 1148–56. http://dx.doi.org/10.1609/aaai.v35i2.16201.
Повний текст джерелаLu, Jiazhong, Xiaolei Liu, Shibin Zhang, and Yan Chang. "Research and Analysis of Electromagnetic Trojan Detection Based on Deep Learning." Security and Communication Networks 2020 (November 25, 2020): 1–13. http://dx.doi.org/10.1155/2020/6641844.
Повний текст джерелаJiang, Dong, Yongkai Yang, Qisheng Guang, Chaohui Gao, and Lijun Chen. "Eavesdropping on quantum secret sharing protocols based on ring topology." Quantum Information and Computation 19, no. 7&8 (June 2019): 587–600. http://dx.doi.org/10.26421/qic19.7-8-4.
Повний текст джерелаWang, Xinmu, Tamzidul Hoque, Abhishek Basak, Robert Karam, Wei Hu, Maoyuan Qin, Dejun Mu, and Swarup Bhunia. "Hardware Trojan Attack in Embedded Memory." ACM Journal on Emerging Technologies in Computing Systems 17, no. 1 (January 6, 2021): 1–28. http://dx.doi.org/10.1145/3422353.
Повний текст джерелаYu, Weize. "Hardware Trojan attacks on voltage scaling‐based side‐channel attack countermeasure." IET Circuits, Devices & Systems 13, no. 3 (March 19, 2019): 321–26. http://dx.doi.org/10.1049/iet-cds.2018.5087.
Повний текст джерелаIvanov, Andre. "A Look at Trojan Attack, Pruning, and Dependability." IEEE Design & Test 32, no. 2 (April 2015): 4–5. http://dx.doi.org/10.1109/mdat.2015.2405591.
Повний текст джерела于, 家涛. "Analysis of Trojan-Horse Attack against Untrusted Source." Computer Science and Application 08, no. 01 (2018): 59–66. http://dx.doi.org/10.12677/csa.2018.81009.
Повний текст джерелаДисертації з теми "Trojan Attack"
Shanmugam, Karthikeyan. "Validating digital forensic evidence." Thesis, Brunel University, 2011. http://bura.brunel.ac.uk/handle/2438/7651.
Повний текст джерелаWang, Xinmu. "HARDWARE TROJAN ATTACKS: THREAT ANALYSIS AND LOW-COST COUNTERMEASURES THROUGH GOLDEN-FREE DETECTION AND SECURE DESIGN." Case Western Reserve University School of Graduate Studies / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=case1378489509.
Повний текст джерелаKortelainen, T. (Tuomas). "On iteration-based security flaws in modern hash functions." Doctoral thesis, Oulun yliopisto, 2014. http://urn.fi/urn:isbn:9789526206431.
Повний текст джерелаTiivistelmä Vuonna 1989 Ralph Merkle ja Ivan Damgård ehdottivat toisistaan riippumatta hash-funktioille suunnitteluperiaatteita, joita käytetään tänä päivänä laajasti. Niin kutsuttu Merkle-Damgård -rakenne lukee viestin sisään viestiblokki kerrallaan ja käyttää tiivistefunktiota, joka liittää hash-arvoon ja viestiblokkiin uuden hash-arvon. Tällä iteratiivisella rakenteella on joitakin turvallisuusheikkouksia. Se on haavoittuva esimerkiksi Joux’n monitörmäyshyökkäykselle, timanttirakenteita hyödyntävälle paimennushyökkäykselle ja Troijan viesti -hyökkäykselle. Väitöskirjan pääasiallinen tutkimusaihe on Merkle-Damgård -rakenteen aiheuttamat puutteet tietoturvassa. Tässä työssä esitetään uusi versio Joux’n monitörmäyshyökkäyksestä, luodaan uusi aikaa säästävä algoritmi timanttirakenteiden kehittämiseksi ja kaksi uutta tehokasta versiota Troijan viesti -hyökkäyksestä. Väitöskirjan tärkein kontribuutio on yleistettyjen iteratiivisten hash-funktioiden turvallisuuden analysointi. Sanojen kombinatorisia ominaisuuksia tutkitaan uudesta näkökulmasta, jonka pohjalta kehitettyjä tuloksia soveltamalla luodaan uusi yläraja niin kutsuttujen q-rajoitettujen yleisten iteratiivisten hash-funktioiden monitörmäyshyökkäysten kompleksisuudelle
Makarov, Vadim. "Quantum cryptography and quantum cryptanalysis." Doctoral thesis, Norwegian University of Science and Technology, Faculty of Information Technology, Mathematics and Electrical Engineering, 2007. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-1473.
Повний текст джерелаThis doctoral thesis summarizes research in quantum cryptography done at the Department of Electronics and Telecommunications at the Norwegian University of Science and Technology (NTNU) from 1998 through 2007.
The opening parts contain a brief introduction into quantum cryptography as well as an overview of all existing single photon detection techniques for visible and near infrared light. Then, our implementation of a fiber optic quantum key distribution (QKD) system is described. We employ a one-way phase coding scheme with a 1310 nm attenuated laser source and a polarization-maintaining Mach-Zehnder interferometer. A feature of our scheme is that it tracks phase drift in the interferometer at the single photon level instead of employing hardware phase control measures. An optimal phase tracking algorithm has been developed, implemented and tested. Phase tracking accuracy of +-10 degrees is achieved when approximately 200 photon counts are collected in each cycle of adjustment. Another feature of our QKD system is that it uses a single photon detector based on a germanium avalanche photodiode gated at 20 MHz. To make possible this relatively high gating rate, we have developed, implemented and tested an afterpulse blocking technique, when a number of gating pulses is blocked after each registered avalanche. This technique allows to increase the key generation rate nearly proportionally to the increase of the gating rate. QKD has been demonstrated in the laboratory setting with only a very limited success: by the time of the thesis completion we had malfunctioning components in the setup, and the quantum bit error rate remained unstable with its lowest registered value of about 4%.
More than half of the thesis is devoted to various security aspects of QKD. We have studied several attacks that exploit component imperfections and loopholes in optical schemes. In a large pulse attack, settings of modulators inside Alice's and Bob's setups are read out by external interrogating light pulses, without interacting with quantum states and without raising security alarms. An external measurement of phase shift at Alice's phase modulator in our setup has been demonstrated experimentally. In a faked states attack, Eve intercepts Alice's qubits and then utilizes various optical imperfections in Bob's scheme to construct and resend light pulses in such a way that Bob does not distinguish his detection results from normal, whereas they give Bob the basis and bit value chosen at Eve's discretion. Construction of such faked states using several different imperfections is discussed. Also, we sketch a practical workflow of breaking into a running quantum cryptolink for the two abovementioned classes of attacks. A special attention is paid to a common imperfection when sensitivity of Bob's two detectors relative to one another can be controlled by Eve via an external parameter, for example via the timing of the incoming pulse. This imperfection is illustrated by measurements on two different single photon detectors. Quantitative results for a faked states attack on the Bennett-Brassard 1984 (BB84) and the Scarani-Acin-Ribordy-Gisin 2004 (SARG04) protocols using this imperfection are obtained. It is shown how faked states can in principle be constructed for quantum cryptosystems that use a phase-time encoding, the differential phase shift keying (DPSK) and the Ekert protocols. Furthermore we have attempted to integrate this imperfection of detectors into the general security proof for the BB84 protocol. For all attacks, their applicability to and implications for various known QKD schemes are considered, and countermeasures against the attacks are proposed.
The thesis incorporates published papers [J. Mod. Opt. 48, 2023 (2001)], [Appl. Opt. 43, 4385 (2004)], [J. Mod. Opt. 52, 691 (2005)], [Phys. Rev. A 74, 022313 (2006)], and [quant-ph/0702262].
Dubell, Michael, and David Johansson. "Nätverkssäkerhet med IPS : Förbättrad nätverkssäkerhet med Intrusion Prevention Systems." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-23347.
Повний текст джерелаTheerthagiri, Dinesh. "Reversing Malware : A detection intelligence with in-depth security analysis." Thesis, Linköping University, Department of Electrical Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-52058.
Повний текст джерелаMore money nowadays moves online and it is very understandable that criminals want to make more money online aswell, because these days’ banks don’t have large sums of money in their cash box. Since there are many other internalrisks involved in robbing a bank, criminals have found many other ways to commit crimes and much lower risMore money nowadays moves online and it is very understandable that criminals want to make more money online as well, because these days’ banks don’t have large sums of money in their cash box. Since there are many other internal risks involved in robbing a bank, criminals have found many other ways to commit crimes and much lower risk in online crime. The first level of change involved was email-based phishing, but later circumstances changed again.
Authentication methods and security of online bank has been improved over the period. This will drastically reduce effects of phishing based on emails and fraudulent website. The next level of online bank fraud is called banking Trojans. These Trojans infect the online customers of banks. These Trojans monitors customer’s activities and uses their authenticated session to steal customers’ money.
A lot of money is made by these kinds of attacks. Comparatively few perpetrators have been caught, and the problem is getting worse day by day. To have a better understanding of this problem, I have selected a recent malware sample named as SilentBanker. It had the capability of attacking more than 400 banks. This thesis presents the problem in general and includes my results in studying the behaviour of the SilentBanker Trojan.
Grillo, Jose Geraldo Costa. "A Guerra de Tróia no imaginário ateniense: sua representação nos vasos áticos dos séculos VI-V a.C." Universidade de São Paulo, 2009. http://www.teses.usp.br/teses/disponiveis/71/71131/tde-13042009-164013/.
Повний текст джерелаFrom the iconography of the Trojan War, the author asks about the place of the war in the Athenian imaginary in the sixth and fifth centuries B.C. The corpus of the research is composed of 248 attic vases about nine scenes: 1) The arming of Achilles; 2) The departure of Achilles; the duels: 3) Paris fighting Menelaos, 4) Aeneas fighting Diomedes, 5) Ajax fighting Hector, 6) Achilles fighting Hector, 7) Achilles fighting Memnon; the returns of the dead warriors in battle: 8) Sleep and Death carrying the body of Sarpedon, and 9) Ajax carrying the body of Achilles. The choice of space, Athens, and chronological period, 6th and 5th centuries B.C., was based on a deliberate option for the attic vases and on the appearance and disappearance of the theme in this period. Based on the assumptions that there is a relationship between images and society and that images are constructs of the social imaginary, allowing an approximation to collective representations, the author proposes that the Trojan War is a constituent element of the Athenian imaginary in the sixth and fifth centuries B.C. and that its iconography refers to the representations of Athenians on the war activity in their own time. The Trojan Wars painted pictures, rather than being illustrations of an event from the past, are manifestations of the image that the city of Athens makes about itself, concerning the war. The Trojan War is an event in the collective memory of the Athenians, upon which the city establishes its values, its society and the respective roles of its citizens. In short, that war, rather than being an activity restricted to warriors, concerns the whole city, namely, the non-warriors, among them, the woman and the old man, the warriors parents, who hold an important place.
Exurville, Ingrid. "Détection non destructive de modification malveillante de circuits intégrés." Thesis, Saint-Etienne, EMSE, 2015. http://www.theses.fr/2015EMSE0800/document.
Повний текст джерелаThe globalization of integrated circuits fabrication involves several questions about the integrity of the fabricated circuits. Malicious modifications called Hardware Trojans (HT) can be introduced during the circuit production process. Due to the complexity of an integrated circuit, it is really difficult to find this kind of alterations.This work focuses on a non-destructive method of HT detection. We use the paths delays of the studied design as a channel to detect HT. A model to describe paths delays is defined. It takes into account two important parameters which are the experimental conditions and the process variations.Faults attacks by clock glitches based on timing constraints violations have been performed to measure data paths delays. Reliable circuits are used for reference. After validating the relevance of this channel to get information on the internal behavior of the targeted design, experimental detections of HT inserted on two different abstraction levels (RTL and after place and route) were achieved. Process variations are taken into consideration in the studies to detect if the tested circuits are infected
Henningsson, Daniel. "Från Ilions fält till Nilens stränder : En studie rörande identifieringen mellan teukrerna och sjöfolket ṯ-k-(k)-r". Thesis, Uppsala universitet, Institutionen för arkeologi och antik historia, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-385465.
Повний текст джерелаSujimoto, Fernando Ribeiro. "Polimorfismo e polietismo na comunicação química, comportamento de limpeza e trofalaxia em Atta sexdens rubropilosa (Hymenoptera: Formicidae)." Universidade de São Paulo, 2018. http://www.teses.usp.br/teses/disponiveis/11/11146/tde-30072018-160416/.
Повний текст джерелаAnts are eusocial insects intensely dependent on chemical communication. They have morphological, biochemical, physiological and behavioral features adapted to a life surrounded by many molecules messages. Furthermore, each olfactory peculiarity in any of the biological level mentioned above, reflects on the highly polymorphic patterns found in the colonies of the most derived groups, as the leaf cutter ants (Attini). Thus, the castes and sub castes of Atta ants, would have characteristics, as olfactory organs and electrophysiological sensibility, that vary following the body sizes and tasks performed in the colonies. Therefore, it would have a direct or indirect correlation among the sizes of the ants, their ethological profiles and the chemical communication in these species. This relation could be seen over different activities, as the grooming and oral trophallaxis. In this way, this thesis focus in the interaction among the polymorphism, polyethism and chemical communication in Atta sexdens. It still describes the participation of workers and queen in grooming and trophallaxis, linking them to a possible role in cuticular hydrocarbon dispersion over the colony. The thesis is divided in four chapters. In the Chapter 1, it is presented an introduction to the knowledge explored in all thesis, and also its outline. In the Chapter 2, there is a quantitative and qualitative description of sensilla from all castes and sub castes of A. sexdens, showing that these sensory organs vary following the polymorphic patterns and ethological profiles. The Chapter 3 explores the differences in the antennae electrophysiological responses to three pheromones, comparing them with all polymorphic groups of A. sexdens. The results demonstrate similarities and discrepancies in the sensibility to the contents of poison, Dufour and mandibular glands among the sub castes (gardeners, generalists, foragers and soldiers), and also between males and queens, enabling a correlation with their tasks. In the Chapter 4, it is investigated the roles of each type of A. sexdens workers in the trophallaxis, allogrooming and self-grooming behaviors, relating them with the queen presence. Additionally, and based in the results, the different roles of the sub castes can be associated to a possible action of grooming and trophallaxis in the dispersion of intraspecific recognition molecules and in the formation of a colony chemical gestalt. All results and discussion distributed along the thesis, therefore, contribute to a better understanding of a complex scenario, supported by the eusociality, chemical ecology, olfactory perception and behavior of the leaf cutter ants.
Книги з теми "Trojan Attack"
Inc, Game Counselor. Game Counselor's Answer Book for Nintendo Players. Redmond, USA: Microsoft Pr, 1991.
Знайти повний текст джерелаSepowski, Stephen J., ed. The Ultimate Hint Book. Old Saybrook, CT: The Ultimate Game Club Ltd., 1991.
Знайти повний текст джерелаLos dorismos del Corpus Bucolicorum. Amsterdam: A.M. Hakkert, 1990.
Знайти повний текст джерелаCastleden, Rodney. Attack on Troy. Pen & Sword Books Limited, 2006.
Знайти повний текст джерелаCastleden, Rodney. Attack on Troy. Pen & Sword Books Limited, 2006.
Знайти повний текст джерелаCastleden, Rodney, and Peter Caygill. Attack on Troy. Pen & Sword Books Limited, 2011.
Знайти повний текст джерелаCastleden, Rodney. Attack on Troy. Pen & Sword Books Limited, 2006.
Знайти повний текст джерелаCastleden, Rodney. The Attack on Troy. Pen and Sword, 2006.
Знайти повний текст джерелаBhunia, Swarup, and Mark M. Tehranipoor. Hardware Trojan War: Attacks, Myths, and Defenses. Springer International Publishing AG, 2018.
Знайти повний текст джерелаBhunia, Swarup, and Mark M. Tehranipoor. The Hardware Trojan War: Attacks, Myths, and Defenses. Springer, 2017.
Знайти повний текст джерелаЧастини книг з теми "Trojan Attack"
Cohen, Ronen A. "Acts of Terror and Assassination—The Trojan Horse Inside the Islamic Revolution." In Revolution Under Attack, 79–99. New York: Palgrave Macmillan US, 2015. http://dx.doi.org/10.1057/9781137502506_4.
Повний текст джерелаPeng, Jinye, Guangqiang He, Jin Xiong, and Guihua Zeng. "Trojan Horse Attack Strategy on Quantum Private Communication." In Information Security Practice and Experience, 177–86. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11689522_17.
Повний текст джерелаDing, Shaohua, Yulong Tian, Fengyuan Xu, Qun Li, and Sheng Zhong. "Trojan Attack on Deep Generative Models in Autonomous Driving." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 299–318. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-37228-6_15.
Повний текст джерелаBai, Jiawang, Kuofeng Gao, Dihong Gong, Shu-Tao Xia, Zhifeng Li, and Wei Liu. "Hardly Perceptible Trojan Attack Against Neural Networks with Bit Flips." In Lecture Notes in Computer Science, 104–21. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-20065-6_7.
Повний текст джерелаDuarte-Sanchez, Jorge E., and Basel Halak. "A Cube Attack on a Trojan-Compromised Hardware Implementation of Ascon." In Hardware Supply Chain Security, 69–88. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-62707-2_2.
Повний текст джерелаSalmani, Hassan. "The Global Integrated Circuit Supply Chain Flow and the Hardware Trojan Attack." In Trusted Digital Circuits, 1–11. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-79081-7_1.
Повний текст джерелаLiu, Peiyu, Bingru Niu, and Zhenfang Zhu. "A Kind of Improved Detection and Prevention of Trojan Horse Based on Attack Tree." In Pervasive Computing and the Networked World, 374–84. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-09265-2_38.
Повний текст джерелаWang, Maoning, Meijiao Duan, and Jianming Zhu. "The Trojan Message Attack on the Pay-to-Public-Key-Hash Protocol of Bitcoin." In Communications in Computer and Information Science, 196–209. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-3278-8_13.
Повний текст джерелаLeguesse, Yonas, Mark Vella, Christian Colombo, and Julio Hernandez-Castro. "Reducing the Forensic Footprint with Android Accessibility Attacks." In Security and Trust Management, 22–38. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59817-4_2.
Повний текст джерелаGovindan, Vidya, Sandhya Koteshwara, Amitabh Das, Keshab K. Parhi, and Rajat Subhra Chakraborty. "ProTro: A Probabilistic Counter Based Hardware Trojan Attack on FPGA Based MACSec Enabled Ethernet Switch." In Security, Privacy, and Applied Cryptography Engineering, 159–75. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-35869-3_12.
Повний текст джерелаТези доповідей конференцій з теми "Trojan Attack"
Chen, Huili, Cheng Fu, Jishen Zhao, and Farinaz Koushanfar. "DeepInspect: A Black-box Trojan Detection and Mitigation Framework for Deep Neural Networks." In Twenty-Eighth International Joint Conference on Artificial Intelligence {IJCAI-19}. California: International Joint Conferences on Artificial Intelligence Organization, 2019. http://dx.doi.org/10.24963/ijcai.2019/647.
Повний текст джерелаZhou, Xinzhe, Wenhao Jiang, Sheng Qi, and Yadong Mu. "Multi-Target Invisibly Trojaned Networks for Visual Recognition and Detection." In Thirtieth International Joint Conference on Artificial Intelligence {IJCAI-21}. California: International Joint Conferences on Artificial Intelligence Organization, 2021. http://dx.doi.org/10.24963/ijcai.2021/477.
Повний текст джерелаKhelif, Mohamed Amine, Jordane Lorandel, and Olivier Romain. "Non-invasive I2C Hardware Trojan Attack Vector." In 2021 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT). IEEE, 2021. http://dx.doi.org/10.1109/dft52944.2021.9568347.
Повний текст джерелаZhao, Yang, Xing Hu, Shuangchen Li, Jing Ye, Lei Deng, Yu Ji, Jianyu Xu, Dong Wu, and Yuan Xie. "Memory Trojan Attack on Neural Network Accelerators." In 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 2019. http://dx.doi.org/10.23919/date.2019.8715027.
Повний текст джерелаRakin, Adnan Siraj, Zhezhi He, and Deliang Fan. "TBT: Targeted Neural Network Attack With Bit Trojan." In 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR). IEEE, 2020. http://dx.doi.org/10.1109/cvpr42600.2020.01321.
Повний текст джерелаSakurai, Shoji, and Shinobu Ushirozawa. "Input method against Trojan horse and replay attack." In 2010 IEEE International Conference on Information Theory and Information Security (ICITIS). IEEE, 2010. http://dx.doi.org/10.1109/icitis.2010.5689592.
Повний текст джерелаChen, Huili, Cheng Fu, Jishen Zhao, and Farinaz Koushanfar. "ProFlip: Targeted Trojan Attack with Progressive Bit Flips." In 2021 IEEE/CVF International Conference on Computer Vision (ICCV). IEEE, 2021. http://dx.doi.org/10.1109/iccv48922.2021.00762.
Повний текст джерелаZhang, Fan, Yiran Zhang, Shengwen Shi, Shize Guo, Ziyuan Liang, Samiya Qureshi, and Congyuan Xu. "Optimized Lightweight Hardware Trojan-Based Fault Attack on DES." In 2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS). IEEE, 2018. http://dx.doi.org/10.1109/padsw.2018.8644906.
Повний текст джерелаZhong, Haocheng, Chenxi Zeng, Aiping Li, Yan Jia, Rong Jiang, Yulu Qi, and Weihong Han. "Research of Trojan Attack Effect Evaluation Based on FAHP." In 2019 IEEE Fourth International Conference on Data Science in Cyberspace (DSC). IEEE, 2019. http://dx.doi.org/10.1109/dsc.2019.00014.
Повний текст джерелаLin, Zhiqiang, Xiangyu Zhang, and Dongyan Xu. "Reuse-oriented camouflaging trojan: Vulnerability detection and attack construction." In Networks (DSN). IEEE, 2010. http://dx.doi.org/10.1109/dsn.2010.5544305.
Повний текст джерела