G06F21/556

COHERENCE-BASED ATTACK DETECTION
20230022096 · 2023-01-26 ·

While an application or a virtual machine (VM) is running, a device tracks accesses to cache lines to detect access patterns that indicate security attacks, such as cache-based side channel attacks or row hammer attacks. To enable the device to detect accesses to cache lines, the device is connected to processors via a coherence interconnect, and the application/VM data is stored in a local memory of the device. The device collects the cache lines of the application/VM data that are accessed while the application/VM is running into a buffer and the buffer is analyzed for access patterns that indicate security attacks.

BACKDOOR INSPECTION DEVICE, BACKDOOR INSPECTION METHOD, AND COMPUTER-READABLEMEDIUM
20230229766 · 2023-07-20 · ·

An identifying unit identifies, in a backdoor inspection device, a plurality of code blocks included in software to be inspected. An inspection unit executes backdoor inspection processing on the software to be inspected for the plurality of the code blocks that are identified by the identifying unit. An adjustment processing unit executes adjustment processing including obfuscation processing on the software to be inspected. A certificate generation unit generates a first certificate containing at least information on a result of the backdoor inspection processing. An output unit outputs the software to be inspected on which the adjustment processing has been performed together with the first certificate.

System and method for secure, trustful internet interactions
11562084 · 2023-01-24 ·

A system and method for the creation of an atomic internet platform and system is herein presented. Within the atomic internet users, content providers, and event managers may create content or user atoms each of which has a trust history and trust history tail. The atomic internet facilitates direct interaction between atoms of any type and provides curation of information, content, and other data in a trustless environment. Browsing and searching as well as payment and value exchange are facilitated in the atomic internet in a secure fashion based upon an examination of the trust history tail and trust history. The trust history is built over time based upon interactions between atoms and a trust history tail and accumulated trust history transactions are indicative of level of trust based upon the length of the trust history tail and accumulated trust history of transactions.

SYSTEM AND METHOD FOR PROTECTING AGAINST CONTROL-FLOW ATTACKS
20230020547 · 2023-01-19 ·

A system and method of protecting against control-flow attacks provides two complementary, transparent, and strong security policies for the RTL design at a hardware level. The approach performs static analysis of controller, followed by lightweight instrumentation, such that CFI is enforced in-place and at runtime. The modified controller follows conservative CFG with the help of a monitor.

Data storage method, apparatus, and device, and readable storage medium

A data storage method, apparatus, and device, and a readable storage medium. The method includes: after a random access memory is powered on, obtaining target data to be stored in a fixed storage address of the random access memory; determining a target transmission mode from a bit value change transmission mode and a bit value fixed transmission mode, wherein the target transmission mode is different from a historical transmission mode determined after the random access memory is powered on last time; and transmitting the target data from and to the random access memory according to the target transmission mode. The method can prevent data from being stolen after power-down of the target data, and guarantees the data security.

Unique ID generation for sensors

Systems, methods, and computer-readable media are provided for generating a unique ID for a sensor in a network. Once the sensor is installed on a component of the network, the sensor can send attributes of the sensor to a control server of the network. The attributes of the sensor can include at least one unique identifier of the sensor or the host component of the sensor. The control server can determine a hash value using a one-way hash function and a secret key, send the hash value to the sensor, and designate the hash value as a sensor ID of the sensor. In response to receiving the sensor ID, the sensor can incorporate the sensor ID in subsequent communication messages. Other components of the network can verify the validity of the sensor using a hash of the at least one unique identifier of the sensor and the secret key.

System and method for detecting leaked documents on a computer network

A system and a method of obtaining a location of a document on a computer network based on a document property. The method may include: receiving at least one basic marker and an encoding function associated with the document property; generating a search term according to the encoding function, based on the at least one basic marker; providing the search term to at least one search engine and obtaining therefrom one or more search results corresponding, where each search result may include one or more references to locations of documents on the computer network; discovering at least one document having the document property from the one or more search results and obtaining a discovered location of the document on the computer network; and performing at least one rule-based action, according to at least one document property of the discovered document.

A METHOD AND SYSTEM FOR DETERMINING AND ACTING ON AN EMAIL CYBER THREAT CAMPAIGN

A cyber security appliance (CSA) configurable to protect a computer system from email cyber threat campaigns is disclosed. The CSA may comprise: an email module configured to process all incoming emails and log data and metadata; a cyber threat module coupled configured to assess a severity level of a cyber threat using one or more Artificial Intelligence (AI) models; an AI classifier configured to determine the likelihood of an email cyber threat campaign; an autonomous response module configured to act against emails determined to be threats; and a user interface module configured to generate a report, present data on a display, and show a graphical display of the system indicating the details of a cyber threat campaign.

Image sensor with inside biometric authentication and storage

The present technology is to provide an image sensor capable of enhancing the security of biometric information and lowering the risk of information leakage. An image sensor 10 includes: a biometric information acquisition unit 102 that acquires biometric information; a storage unit 14 that stores reference information to be compared with the biometric information; and a biometric authentication unit 104 that performs biometric authentication by comparing the biometric information with the reference information. The image sensor 10 further includes an encryption processing unit 105 that encrypts biometric authentication information that authenticates a living organism.

COUNTERACTING FRAUDULENT CLOCK READINGS AND SIDE-CHANNEL ATTACKS
20220414212 · 2022-12-29 ·

A computing system provides clock readings from an untrusted code to trusted code, where the trusted code is executed in a secure enclave and the untrusted code is executed outside the secure enclave. The computing system allocates a pointer to shared memory that is shared between the untrusted code and the trusted code. Under control of the untrusted code, the computing system periodically writes a clock reading to the shared memory. Under control of the trusted code, the computing system reads the clock reading stored in shared memory. The untrusted code cannot determine when the trusted code reads a clock reading.