Results 31 to 40 of about 32,602 (220)

Using deep learning to detect digitally encoded DNA trigger for Trojan malware in Bio-Cyber attacks

open access: yesScientific Reports, 2022
This article uses Deep Learning technologies to safeguard DNA sequencing against Bio-Cyber attacks. We consider a hybrid attack scenario where the payload is encoded into a DNA sequence to activate a Trojan malware implanted in a software tool used in ...
M. S. Islam   +7 more
doaj   +1 more source

Hardware Trojan Detection Based on Long Short-Term Memory Neural Network [PDF]

open access: yesJisuanji gongcheng, 2020
Hardware Trojans pose a huge threat to the reliability of integrated circuit chips.Therefore,this paper proposes a hardware Trojan detection method based on Principal Component Analysis(PCA) and Long Short-Term Memory(LSTM) neural network.The method uses
HU Tao, DIAN Songyi, JIANG Ronghua
doaj   +1 more source

Detecting Trojaned DNNs Using Counterfactual Attributions

open access: yes2023 IEEE International Conference on Assured Autonomy (ICAA), 2023
We target the problem of detecting Trojans or backdoors in DNNs. Such models behave normally with typical inputs but produce specific incorrect predictions for inputs poisoned with a Trojan trigger. Our approach is based on a novel observation that the trigger behavior depends on a few ghost neurons that activate on trigger pattern and exhibit ...
Sikka, Karan   +4 more
openaire   +2 more sources

Mal-Netminer: Malware Classification Approach based on Social Network Analysis of System Call Graph [PDF]

open access: yes, 2015
As the security landscape evolves over time, where thousands of species of malicious codes are seen every day, antivirus vendors strive to detect and classify malware families for efficient and effective responses against malware campaigns.
Jang, Jae-wook   +4 more
core   +3 more sources

Hardware Trojan Detection through Information Flow Security Verification

open access: yes, 2017
Semiconductor design houses are increasingly becoming dependent on third party vendors to procure intellectual property (IP) and meet time-to-market constraints.
Contreras, Gustavo   +5 more
core   +1 more source

Invisible Trojan-horse attack [PDF]

open access: yes, 2017
We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique.
Jain, Nitin   +3 more
core   +2 more sources

Research and realization of the Trojan detection engine based on Android

open access: yesDianxin kexue, 2016
During recent years, Trojan viruses on Android systems have greatly evolved, and the frequent security breach of Android systems is rapidly becoming a great concern of contemporary cyber security. The study of Trojan virus detection on Android engine and
Bin XIA, Feng QIU
doaj   +2 more sources

A machine-learning-based hardware-Trojan detection approach for chips in the Internet of Things

open access: yesInternational Journal of Distributed Sensor Networks, 2019
With the development of the Internet of Things, smart devices are widely used. Hardware security is one key issue in the security of the Internet of Things.
Chen Dong   +3 more
doaj   +1 more source

Evidence for Color Dichotomy in the Primordial Neptunian Trojan Population [PDF]

open access: yes, 2018
In the current model of early Solar System evolution, the stable members of the Jovian and Neptunian Trojan populations were captured into resonance from the leftover reservoir of planetesimals during the outward migration of the giant planets.
Abbott, T. M. C.   +47 more
core   +2 more sources

Neural Trojans

open access: yes, 2017
While neural networks demonstrate stronger capabilities in pattern recognition nowadays, they are also becoming larger and deeper. As a result, the effort needed to train a network also increases dramatically. In many cases, it is more practical to use a
Liu, Yuntao   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy