G06F9/544

System and method for validating in-memory integrity of executable files to identify malicious activity
11675905 · 2023-06-13 · ·

A malicious code detection module is presented to identify potentially malicious instructions in a volatile memory of a computing device before the instructions are executed. The malicious code detection module identifies an executable file, including an .exe file, in memory, validates one or more components of the executable file against the same file stored in non-volatile storage, wherein the validation accounts for the unpacking of the executable file, and issues an alert if the validation fails.

Virtualised gateways

A system comprising a gateway for interfacing external data sources with one or more accelerators. The gateway comprises a plurality of virtual gateways, each of which is configured to stream data from the external data sources to one or more associated accelerators. The plurality of virtual gateways are each configured to stream data from external data sources so that the data is received at an associated accelerator in response to a synchronisation point being obtained by a synchronisation zone. Each of the virtual gateways is assigned a virtual ID so that when data is received at the gateway, data can be delivered to the appropriate gateway.

Method and System of Performing Inter-Process Communication Between OS-Level Containers In User Space
20170344408 · 2017-11-30 ·

A computer-implemented method of performing inter-process communication includes a first process in a first operating system (OS) level container in a user space sending a message to a buffer process. The message is addressed to a second process in a second OS-level container in the user space. The buffer process communicates the message to the second process. A device for performing the computer-implemented method is also provided.

PROVISIONING DATA VOLUMES FOR CONTAINERS RUNNING IN VIRTUAL MACHINES

A computer system has a virtualization software that supports execution of a virtual machine in which a container is run. A method of provisioning a data volume for the container in this computer system includes the steps of monitoring a designated virtual socket, detecting, based on the monitoring, a request from a plug-in of the container to create a data volume, and upon detecting the request, communicating the request to the virtualization software to cause the virtualization software to create the data volume.

Inference engine circuit architecture

An inference engine circuit architecture is disclosed which includes a matrix-matrix (MM) processor circuit and a MM accelerator circuit having multiple operating modes to provide a complete matrix multiplication. A representative MM accelerator circuit includes a first buffer circuit storing maps data; a first data network; multiple second buffer circuits each storing different kernel data; multiple second, serial data networks, with each coupled to a corresponding second buffer circuit; and a plurality of vector-vector (VV) acceleration circuits arranged in a plurality of arrays. Each VV acceleration circuit includes multiply and accumulate circuits; a shift register; a control multiplexer to provide a selected output, in response to a mode control word, of a bias parameter or a first accumulation sum; and a second adder circuit which adds the multiplicative product to the bias parameter or to the first accumulation sum to generate a second or next accumulation sum.

Distributed threaded streaming platform reader

A streaming platform reader includes: a reader thread configured to retrieve messages from a plurality of partitions of a streaming platform, wherein each message in the plurality of partitions is associated with a unique identifier; a plurality of queues coupled to the reader thread configured to store messages or an end of partition signal from the reader thread, wherein each queue includes a first position that stores the earliest message stored by a queue; an extraction thread controlled by gate control logic that: compares the identifiers of all of the messages in the first positions of the queues of the plurality of queues, and forwards, to a pool of queues associated with a pool of processing threads, the message content of the message associated with the earliest identifier; and wherein the gate control logic blocks the extraction thread unless each of the queues contains a message or an end of partition signal.

Cache coherence shared state suppression

A method includes receiving, by a level two (L2) controller, a first request for a cache line in a shared cache coherence state; mapping, by the L2 controller, the first request to a second request for a cache line in an exclusive cache coherence state; and responding, by the L2 controller, to the second request.

OBJECT DESCRIPTORS
20170344468 · 2017-11-30 ·

In one example in accordance with the present disclosure, a method may include identifying, by a first operating system process in a computer system accessing a shared memory heap, a first object at a first memory address in the shared memory heap. The first object may have been previously allocated in the shared memory heap by a second operating system process. The method may also include identifying an object descriptor associated with the first object at a second memory address in the shared memory heap. The object descriptor occupies a number of bits of memory independent of the type. The method may also include determining a size of the first object based on the object descriptor, enumerating, based on the object descriptor, fields associated with the first object and performing an action based on each field of the enumerated fields.

Active input/output expander of a memory sub-system

A value setting associated with one or more parameters of a host-side interface and a memory-side interface of an input/output (I/O) expander is configured to enable Open NAND Flash Interface (ONFI)-compliant communications between a host system and a target memory die of a memory sub-system. The I/O expander processes one or more ONFI-compliant communications between the host system and the target memory die, wherein the one or more ONFI-compliant communications relate to execution of a memory access operation.

Computer-based systems configured for automated computer script analysis and malware detection and methods thereof

Systems and methods enable automated and scalable obfuscation detection in programming scripts, including processing devices that receive software programming scripts and a symbol set. The processing devices determine a frequency of each symbol and an average frequency of the symbols in the script text. The processing devices determine a normal score of each symbol based on the frequency of each symbol and the average frequency to create a symbol feature for each symbol including the normal score. The processing devices utilize an obfuscation machine learning model including a classifier for binary obfuscation classification to detect obfuscation in the script based on the symbol features. The processing devices cause to display an alert indicting an obfuscated software programming script on a screen of a computing device associated with an administrative user to recommend security analysis of the software programming script based on the binary obfuscation classification.