Patent classifications
G06F2221/033
ANTI-FRAGILE SOFTWARE SYSTEMS
A method includes generating output code based on input code using a compiler or translator and providing the output code to one or more platforms for execution. The method also includes receiving feedback associated with the execution of the output code, where the feedback identifies at least one of: one or more failures during the execution of the output code and one or more performance characteristics of the execution of the output code. The method further includes modifying the compiler or translator based on the feedback and generating additional output code using the modified compiler or translator.
System and method of categorization of an application on a computing device using a classifier
Disclosed herein are systems and methods for categorizing an application on a computing device including gathering a set of attributes of an application. The set of attributes of the application includes at least one of: a number of files in an application package of the application; a number of executable files in the application package; numbers and types of permissions being requested; a number of classes in the executable files in the application package; and a number of methods in the executable files in the application package. sending the gathered set of attributes to a trained classification model. The application is classified, using the classification model, based on the gathered set of attributes by generating one or more probabilities of the application belonging to respective one or more categories of applications. A category of the application is determined based on the generated one or more probabilities.
MITIGATION OF VEHICLE SOFTWARE MANIPULATION
A computer-implemented method which identifies the possibility of manipulation of the software of a first component of a plurality of components of an on-board network of a vehicle in a central device for mitigating software manipulation. A central device for mitigating manipulation is designed to mitigate software manipulation in each of the plurality of components in the on-board network. The method includes initiation of a countermeasure for mitigating manipulation of the first component by the central device for detecting and mitigating manipulation.
Generating protection barrier instructions for executable code
Provided are embodiments that include a system configured to generate executable code with protection barrier instructions. The system includes a storage medium, the storage medium being coupled to a processor. The processor is configured to analyze code, mark one or more potentially unsafe instructions in the code, and identify one or more unsafe instructions from the marked one or more potentially unsafe instructions in the code. The processor is also configured to insert a protection barrier instruction into the code based at least in part on identifying the one or more unsafe instructions, and translate the code, responsive to inserting the protection barrier instruction. Also provided are embodiments for a computer-implemented method and a computer program product for generating executable code with protection barrier instructions.
Hybrid Machine Learning and Knowledge Graph Approach for Estimating and Mitigating the Spread of Malicious Software
Aspects of the disclosure relate to predicting the spread of malicious software. The computing platform may identify malicious software at a computing device and may input characteristics of the malicious software into a machine learning model to produce time horizons for the malicious software. The computing platform may identify, using a knowledge graph and based on the time horizons, subsets of computing devices, each corresponding to a particular time horizon. The computing platform may perform, at a time within a first time horizon, a first security action for a first subset of computing devices within the first time horizon and a second security action for a second subset of computing devices located within a second time horizon, where the first time horizon and the second time horizon indicate that the first subset will be affected by the malicious software prior to the second subset.
SECURITY TOOL INTEGRATED INTO BUILD PLATFORM TO IDENTIFY VULNERABILITIES
Techniques for dynamically controlling whether a code build of an application finishes to completion or is terminated prior to completion are disclosed. An application is determined to be entering a development state in which a code build of the application is to occur. After the code build for the application has started, the code build is prevented from completing by a scanning tool. While the code build is being prevented from completing, the scanning tool performs a penetrative test of the application. Based on a result of the penetrative test, the code build is either permitted to complete or, alternatively, the code build is terminated prior to completion.
FIRMWARE DATA VERIFICATION DEVICE AND METHOD, AND FIRMWARE UPDATING DEVICE, METHOD AND SYSTEM
The embodiments of the present disclosure provide a firmware data verification device and method, and a firmware updating device, method and system. The verification method includes: receiving first firmware data sent by a data generation device, wherein the first firmware data includes second firmware data encrypted by the data generation device and a digital signature; verifying the digital signature of the first firmware data; in the situation in which the digital signature has been verified, removing the digital signature from the first firmware data so as to obtain the second firmware data; splitting the second firmware data so as to generate a plurality of encrypted data packets; and sending the plurality of encrypted data packets to a firmware updating device, so that the firmware updating device decrypts the plurality of data packets and performs firmware updating. Therefore, the hardware cost of a firmware updating device may be reduced, and the updating efficiency is improved; in addition, the flexibility of a firmware updating mode may be improved.
BACKDOOR INSPECTION DEVICE, BACKDOOR INSPECTION METHOD, AND COMPUTER-READABLEMEDIUM
An identifying unit identifies, in a backdoor inspection device, a plurality of code blocks included in software to be inspected. An inspection unit executes backdoor inspection processing on the software to be inspected for the plurality of the code blocks that are identified by the identifying unit. An adjustment processing unit executes adjustment processing including obfuscation processing on the software to be inspected. A certificate generation unit generates a first certificate containing at least information on a result of the backdoor inspection processing. An output unit outputs the software to be inspected on which the adjustment processing has been performed together with the first certificate.
SYSTEM, METHOD, AND NON-TRANSITORY COMPUTER-READABLE MEDIUM
The present disclosure aims to provide a backdoor inspection device, a user device, a system, a method, and a non-transitory computer-readable medium that can increase trustability of software as to whether or not there is a backdoor in the software. A system according to the present disclosure includes: a plurality of backdoor inspection devices; a plurality of databases; and a user device, in which the backdoor inspection device includes: a backdoor presuming means for performing backdoor inspection on a prescribed software installed in a counterpart device that communicates with the user device and presumes whether or not there is a backdoor in the prescribed software; a certificate issuance means for issuing a backdoor inspection certificate including a result of the backdoor inspection, the database includes: a registration means for registering the backdoor inspection certificate; and a transmission means for transmitting the backdoor inspection certificate.
METHOD FOR RECEIVING FIRMWARE AND METHOD FOR TRANSMITTING FIRMWARE
A method includes (a) receiving i-th data among first to n-th data transmitted in a multicast manner from a firmware providing apparatus, (b) acquiring partitioning information thereof, a MAC chaining value, length information, i-th firmware data, and MAC from the i-th data, (c) authenticating the MAC chaining value of the i-th firmware data, the length information, and the i-th firmware data by comparing a MAC of the i-th firmware data with a value computed by a first MAC generation algorithm, which uses the MAC chaining value of the i-th firmware data, the length information, and the i-th firmware data as a relevant input; (d) authenticating the order of the i-th firmware data by using the MAC chaining value of the i-th firmware data and a second MAC generation algorithm; and (e) obtaining the firmware by combining a first to an n-th firmware data obtained by executing (a) to (d).