Trojan horse (computing)

Known as: Trojan horse virus, Web Trojans, Trojan software 
(For other uses, see Trojan horse (disambiguation).) In computing, Trojan horse, or Trojan, is any malicious computer program which is used to hack… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
Security of a computer system has been traditionally related to the security of the software or the information being processed… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • figure 3
Is this relevant?
Highly Cited
2011
Highly Cited
2011
We explore the threat of smartphone malware with access to on-board sensors, which opens new avenues for illicit collection of… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2010
Highly Cited
2010
For reasons of economy, critical systems will inevitably depend on electronics made in untrusted factories. A proposed new… (More)
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Hardware Trojan horses (HTHs) are the malicious altering of hardware specification or implementation in such a way that its… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • table 2
Is this relevant?
Highly Cited
2009
Highly Cited
2009
We report our experiences in designing and implementing several hardware Trojans within the framework of the Embedded System… (More)
  • figure 1
  • figure 3
  • figure 4
  • figure 2
  • figure 5
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Trusted IC design is a recently emerged topic since fabrication factories are moving worldwide in order to reduce cost. In order… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2008
Highly Cited
2008
New attacker scenarios involving integrated circuits (ICs) are emerging that pose a tremendous threat to national security… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table I
Is this relevant?
Highly Cited
2008
Highly Cited
2008
There have been serious concerns recently about the security of microchips from hardware trojan horse insertion during… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Trust in reference to integrated circuits addresses the concern that the design and/or fabrication of the IC may be purposely… (More)
  • figure 2
  • figure 1
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Many teaching practices implicitly assume that conceptual knowledge can be abstracted from the situations in which it is learned… (More)
Is this relevant?