Patent classifications
G06F2221/2123
ELECTRONIC DEVICE AND PROTECTION METHOD
According to a first aspect of the present disclosure, an electronic device is provided, comprising: an attack detection unit arranged to detect one or more attacks on the electronic device; a countermeasure unit arranged to apply countermeasures against the attacks detected by the attack detection unit; a threat level determination unit arranged to determine a threat level corresponding to the attacks detected by the attack detection unit; wherein the countermeasure unit is further arranged to activate one or more specific ones of said countermeasures in dependence on the threat level determined by the threat level determination unit. According to a second aspect of the present disclosure, a corresponding method of protecting an electronic device is conceived. According to a third aspect of the present disclosure, a corresponding computer program product is provided.
Integrity of on demand code decryption
A system and a method for monitoring the integrity of code are provided. Dummy code is provided in an on demand decryption area of an object file while runtime code is provided elsewhere (and may be in the same object file or another object file). A compensation area is also provided which is initially blank. During execution, checksums can be calculated based on the result of an exclusive or (XOR) operation between contents of the on demand code decryption area and a compensation area such as a compensation area. As the runtime code populates the on demand code decryption area with the runtime code (potentially with the exception of areas masked to maintain integrity of relocation instructions allowed to remain in the dummy code) the compensation area is populated with the result of an XOR operation between the dummy code and the runtime code. As a result, the checksums will be the same throughout execution as long as integrity of the code has not been compromised.
Side channel attack protection
A system for securing a secret word during a read of the secret word from a read-only memory (ROM) is disclosed. The system includes a memory controller coupled to the ROM and a random number generator coupled to the memory controller. The random number generator is configured to generate a random number. The system further includes a number shuffler coupled to the random number generator and the memory controller. The number shuffler is configured to generate a bit read order based on the random number and the memory controller is configured to read bits of the secret word from the ROM according to the bit read order.
Methods for dynamic destruction of data in a remote data storage platform and devices thereof
The technique relates to a method and apparatus for dynamic destruction of data in a remote data storage platform. This involves receiving a first set of data records with random values and then updating the random values associated with the subsets of the first set of data records into actual values through one or more update operations. After sequential steps of updates, a second set of data records with actual values are obtained. After working of this data for a period of time the owner of the data again begins updating the actual values associated with the subset of the second set of data records into random values. When all the data records are updated to random values the owner of the data successfully ends the Service Level Agreement period.
SECURITY SYSTEM AND COMMUNICATION METHOD
A security system includes: a first device that includes a first processor and a first target processor; and a second device that includes a second processor and a second target processor. The first processor executes a first process including: first protecting a first program as a monitoring target among programs operating on the first target processor; first decrypting encrypted data obtained by encrypting output data from the first program; and first encrypting the decrypted output data and causing the encrypted data of the output data to be transmitted to the second device. The second processor executes a second process including: second protecting a second program as a monitoring target among programs operating on the second target processor; second decrypting the transmitted encrypted data of the output data; and second encrypting the decrypted output data and outputting the encrypted data of the output data to the second program.
Multiplicative blinding for cryptographic operations
A value corresponding to an input for a cryptographic operation may be received. The value may blinded by multiplying the value based on an exponentiation of a random number raised to an exponent value that is associated with a public key. A cryptographic operation may be performed based on the blinded value.
Systems for secure collaborative graphical design using secret sharing
Systems and methods are disclosed for secret sharing for secure collaborative graphical design. Graphical secret shares are generated from a three-dimensional graphical design and distributed to one or more contributor devices. Contributor graphical designs modifying graphical secret shares may be received from contributor devices. Various corresponding and related systems, methods, and software are described.
Non-volatile memory device and method of writing to non-volatile memory device
A non-volatile memory device includes: a memory group of a plurality of variable resistance memory cells in which digital data is recorded according to a magnitude of a resistance value, the memory group including at least one data cell and at least one dummy cell which are associated with each other; and a read circuit which performs, in parallel, a read operation on each of the plurality of memory cells included in the memory group. Dummy data, for reducing a correlation between a side-channel leakage generated when the read operation is performed by the read circuit and information data recorded in the at least one data cell, is recorded in the at least one dummy cell.
Method of secure data storage and transfer
A method of secure data transfer and storage using a removable storage device storing encrypted information. The method uses a host that stores and transfers encrypted sensitive information and a customer that desires the information to be securely stored. The customer chooses a unique encryption code to encrypt sensitive information and places the encrypted files on the removable storage device, then physically transfers the information to the host. The encrypted sensitive information travels physically between the host and customer outside of any computer network. The host has a gapped area that remains disconnected from any network. The host takes the sensitive information and copies it to the designated armored storage unit.
SYSTEM FOR EVALUATING MANUFACTURING FEASIBILITY OF A GRAPHICAL DESIGN
A system for evaluating manufacturing feasibility of a graphical design is disclosed. The system includes a secret owner device and a memory, operatively connected to the secret owner device. The memory may be configured to store a three-dimensional form including a three-dimensional shape and a dimension set in three dimensions and at least a local geometric feature. The apparatus may also include a merge engine configured to generate at least a combined three-dimensional graphical design as a function of the three-dimensional graphical design and the at least a contributor graphical design. The apparatus also includes an interrogation engine communicatively connected to the merge engine. The interrogation engine is configured to extract the at least a local geometric feature from the three-dimensional graphical design, evaluate manufacturing feasibility of the combined three-dimensional graphical design, and initiate manufacture of a structure represented in combined three-dimensional graphical design as a function of manufacturing feasibility.