G06F2221/034

Discrete Three-Dimensional Processor

A discrete three-dimensional (3-D) processor comprises first and second dice. The first die comprises 3-D random-access memory (3D-RAM) arrays, whereas the second die comprises logic circuits and at least an off-die peripheral-circuit component of the 3D-RAM arrays. The first die does not comprise the off-die peripheral-circuit component of the 3D-RAM arrays.

CONTROL FLOW INTEGRITY SYSTEM AND METHOD
20230049233 · 2023-02-16 ·

A CFI system constituted of: at least one protection module, each comprising a respective allowable flow model associated with at least one of a plurality of portions of a process; and at least one process protection manager, arranged, responsive to a control flow instruction in one of the plurality of portions of the process, to: compare one or more parameters of the control flow instruction to the allowable flow model of the associated protection module; and responsive to an outcome of the comparison indicating that the compared parameters do not meet a respective parameter of the allowable flow model, generate a predetermined signal, wherein each protection module is implemented as a shared object, wherein each process protection manager is implemented as a shared object, and wherein the at least one protection module and the process protection manager are loaded into the process.

System for detecting malicious programmable logic controller code
20230050691 · 2023-02-16 ·

A system (100) and method for detecting a malicious programmable logic controller (PLC) code segment (110) in a PLC program corresponding to a specific type of PLC includes a binary parser (112) that parses the code segment (110) into a plurality of functional elements. A variable and function block mapper (114) maps the functional elements into a high-level data structure. A fuzzer (116) generates a behavioral model of the high-level data structure into an automaton (118). A classifier (120) predicts to which processes the automaton (118) corresponds. A detector (122) detects unsafe states in the automaton (118) and that generates an indication of a detected unsafe state.

REMOTE ATTESTATION

According to aspects of the present disclosure, there is provided methods and devices for verifying integrity of a remote device, including a method comprising generating a first nonce value, transmitting the first nonce value, receiving a message from the remote device, the message comprising measurements of a configuration of the remote device and a cryptographic signature based on a private key of a public-private key pair of the remote device and a second nonce value, determining that the second nonce value was generated based on the first nonce value, and verifying the cryptographic signature based on the second nonce value and a public key of the public-private key pair of the remote device.

SECURE COMPUTATION SYSTEM, SECURE COMPUTATION SERVER APPARATUS, SECURECOMPUTATION METHOD, AND SECURE COMPUTATION PROGRAM
20230046000 · 2023-02-16 · ·

Each of a secure computation server apparatuses includes a random number generation part that generates random numbers using a pseudo random number generator shared among the secure computation server apparatuses; a seed storage part that shares and stores a seed(s) used for generating random numbers in the random number generation part; a pre-generated random number storage part that stores random numbers generated by the random number generation part; a share value storage part that stores a share(s) to be a target of processing; a logical operation part that computes a carry to be transmitted and received among the secure computation server apparatuses using the random numbers and the share(s) to be a target of processing; an inner product calculation part that removes a mask from the carry; and an arithmetic operation part that performs a processing of erasing the carry to obtain a processing result.

APPARATUS AND METHODS FOR EXTENDED RANGE MEASUREMENT OF MAGNETIC SIDE-CHANNELS
20230046678 · 2023-02-16 ·

Apparatus, systems, methods for measuring a side-channel is disclosed. The methods involve obtaining a first measurement of a magnetic field in a first range from the side-channel of the at least one electronic device; generating a version of the side-channel; obtaining a second measurement of the magnetic field in a second range from the version of the side-channel; and generating a composite measurement of the magnetic field from the side-channel of the at least one electronic device based on the first measurement and the second measurement. The first range includes a minimum threshold and at least a portion of the second range is less than the minimum threshold of the first range.

SYSTEM AND METHOD FOR IMPROVING CYBERSECURITY FOR TELECOMMUNICATION DEVICES

Methods and systems are described herein for improvements for cybersecurity of telecommunication devices. For example, cybersecurity for telecommunication devices may be improved by analyzing activity log data of telecommunication devices for a candidate event (e.g., the uploading of malware) and disabling one or more services of a telecommunication device. By doing so, cybersecurity for telecommunication devices may be improved by detecting a possible malware intrusion attempt and disabling one or more services of the telecommunication devices. For example, activity log data of telecommunication devices may be obtained. A candidate event indicating malware may be detected in the activity log data. A number of proximate telecommunication devices satisfying a proximity threshold condition may be determined. The number of proximate telecommunication devices that satisfy a density threshold condition may be determined. Responsive to the number of telecommunication devices satisfying a density threshold condition, services of telecommunication devices may be disabled.

SYSTEMS AND METHODS FOR BLOCKING MALICIOUS SCRIPT EXECUTION
20230053314 · 2023-02-16 ·

Disclosed herein are systems and method for blocking malicious script execution. In one exemplary aspect, the method may comprise detecting an execution of a script that creates or modifies a file on a computing device and recording a first report comprising a list of operations involved in the execution of the script, an identifier of the script, and an identifier of the file. The method may comprise determining that the file includes malicious code using a malware scanner and recording a second report comprising an indication that the file includes malicious code and an identifier of the file. In response to determining that identifier of the file is present in both the first report and the second report, the method may comprise generating and storing a first rule that prevents complete execution of any script that shares at least one operation in the list of operations with the script.

Resource Provisioning Based on Estimation of Risk

Methods, systems, devices, and tangible non-transitory computer readable media for resource provisioning based on risk scores. The disclosed technology can include accessing resource request data including information associated with a request for a resource from an entity associated with an organization. Organizational data associated with the entity can be accessed. The organizational data can include information associated with risk factors and previous resource allocations of the entity. Based on performance of risk evaluation operations on the organizational data, a risk score associated with provisioning the resource to the entity can be determined. A resource provisioning amount can be determined based on the risk score. The resource provisioning amount can include an amount of the resource authorized to be provisioned to the entity. Furthermore, output including indications associated with the resource provisioning amount can be generated.

REFERENCE LESS GLITCH DETECTION CIRCUITRY WITH AUTOCALIBRATION

Detection circuitry for an integrated circuit (IC) includes voltage divider circuitry, comparison circuitry, and calibration circuitry. The voltage divider circuitry receives a power supply signal and output a first reference voltage signal and a supply voltage signal based on the power supply signal. The comparison circuitry compares the first reference voltage signal and the supply voltage signal to generate an output signal. The calibration circuitry alters one or more parameters of the voltage divider circuitry to increase a voltage value of the supply voltage signal based on the comparison of the first reference voltage signal with the supply voltage signal.