G06F11/3636

METHOD AND SYSTEM FOR FUZZING WINDOWS KERNEL BY UTILIZING TYPE INFORMATION OBTAINED THROUGH BINARY STATIC ANALYSIS
20230051654 · 2023-02-16 ·

Disclosed is a window kernel fuzzing technique utilizing type information obtained through binary static analysis. The method of fuzzing a kernel of a computer operating system performed by a fuzzing system may include the steps of: automatically inferring type information of a system call using a library file provided by the computer operating system; and performing system call fuzzing on the basis of the type information of the system call obtained through the inference.

Automated honeypot creation within a network

Systems and methods for managing Application Programming Interfaces (APIs) are disclosed. Systems may involve automatically generating a honeypot. For example, the system may include one or more memory units storing instructions and one or more processors configured to execute the instructions to perform operations. The operations may include receiving, from a client device, a call to an API node and classifying the call as unauthorized. The operation may include sending the call to a node-imitating model associated with the API node and receiving, from the node-imitating model, synthetic node output data. The operations may include sending a notification based on the synthetic node output data to the client device.

CACHE-BASED TRACE LOGGING USING TAGS IN AN UPPER-LEVEL CACHE
20230038186 · 2023-02-09 ·

Cache-based trace logging using tags in an upper cache level. A processor influxes a cache line into a first cache level from an upper second cache level. Influxing the cache line into the first cache level includes, based on the first cache level being a recording cache, the processor reading a tag that is (i) stored in the second cache level and (ii) associated with the cache line. Based on reading the tag, the processor determines whether a first value of the cache line within the second cache level has been previously captured by a trace. The processor performs one of (i) when the first value is determined to have been previously logged, following a logged value logic path when influxing the cache line; or (ii) when the first value is determined to have not been previously logged, following a non-logged value logic path when influxing the cache line.

Data race detection with per-thread memory protection

Data race detection in multi-threaded programs can be achieved by leveraging per-thread memory protection technology in conjunction with a custom dynamic memory allocator to protect shared memory objects with unique memory protection keys, allowing data races to be turned into inter-thread memory access violations. Threads may acquire or release the keys used for accessing protected memory objects at the entry and exit points of critical sections within the program. An attempt by a thread to access a protected memory object within a critical section without the associated key triggers a protection fault, which may be indicative of a data race.

Processor with debug pipeline

A processor includes an execution pipeline that includes a plurality of execution stages, execution pipeline control logic, and a debug system. The execution pipeline control logic is configured to control flow of an instruction through the execution stages. The debug system includes a debug pipeline and debug pipeline control logic. The debug pipeline includes a plurality of debug stages. Each debug pipeline stage corresponds to an execution pipeline stage, and the total number of debug stages corresponds to the total number of execution stages. The debug pipeline control logic is coupled to the execution pipeline control logic. The debug pipeline control logic is configured to control flow through the debug stages of debug information associated with the instruction, and to advance the debug information into a next of the debug stages in correspondence with the execution pipeline control logic advancing the instruction into a corresponding stage of the execution pipeline.

DEBUGGING FAILURE OF A SERVICE VALIDATION TEST

The present disclosure generally discloses a testing capability related to service testing in a communication network. The testing capability may be configured to support debugging of failures identified during service validation testing of a service in a communication network. The testing capability may be configured to support debugging of failures (e.g., transmission failures or the like) associated with a failed service validation test (e.g., a transmission verification test or the like). The testing capability may be configured to support debugging of failures identified during service validation testing of an Ethernet service. The testing capability may be configured to support debugging of failures (e.g., frame loss or the like) identified during service validation testing of an Ethernet service where the service validation testing of the Ethernet service is performed based on International Telecommunication Union (ITU)-Standardization (ITU-T) Y.1564, which is an Ethernet-based service activation test methodology.

LIGHTWEIGHT TRACE BASED MEASUREMENT SYSTEMS AND METHODS
20180011776 · 2018-01-11 ·

An automotive electronics system includes an electronic control unit and a trace adapter. The electronic control unit is configured to receive measurement signals and provide control signals. Additionally, the electronic control unit is configured to generate or provide trace signals by replacing original instructions in a binary image with trace instructions. The trace instructions are functionally equivalent, but trigger providing the trace signals. The trace adapter is coupled to the electronic control unit. The trace adapter is configured to obtain the trace signals from the electronic control unit.

DEBUGGING STREAMING APPLICATIONS USING DEBUG REGIONS

A method for debugging a streaming application is provided. The method may include establishing, by a processor, a debug region in the streaming application to mark a subgraph for debugging. The method may further include receiving a tuple flow suspension notification from a job control plane. The method may also include displaying a plurality of debugging options for debugging a streaming application on a graphical user interface based on the received tuple flow suspension notification. The method may further include determining a debugging option from the displayed plurality of debugging options based on a user selection on the graphical user interface. The method may also include translating the determined debugging option into a format compatible with the job control plane. The method may further include transmitting the translated debugging option to the job control plane.

Anomaly detection in real-time multi-threaded processes on embedded systems and devices using hardware performance counters and/or stack traces

An aspect of behavior of an embedded system may be determined by (a) determining a baseline behavior of the embedded system from a sequence of patterns in real-time digital measurements extracted from the embedded system; (b) extracting, while the embedded system is operating, real-time digital measurements from the embedded system; (c) extracting features from the real-time digital measurements extracted from the embedded system while the embedded system was operating; and (d) determining the aspect of the behavior of the embedded system by analyzing the extracted features with respect to features of the baseline behavior determined.

Dynamic distributed tracing instrumentation in a microservice architecture
11709756 · 2023-07-25 · ·

A tracing operation is initiated on a service, wherein the service comprises a plurality of method calls. A span is generated comprising timing information associated with the service, wherein the span comprises a plurality of nested spans associated with the plurality of method calls. A determination is made as to whether one or more method calls of the plurality of method calls are causing the service to underperform in view of the plurality of nested spans. In response to determining that the one or more method calls of the plurality of method calls are causing the service to underperform, a remedial action associated with the one or more method calls is performed.