ENHANCED VECTOR-BASED IDENTIFICATION OF CIRCUIT TROJANS

    公开(公告)号:US20190108344A1

    公开(公告)日:2019-04-11

    申请号:US15728469

    申请日:2017-10-09

    Abstract: A system and method for detecting Trojans and other intermittent severe defects in a digital circuit design. A simulation of the digital circuit design results in a value change dump file, which is compiled to form a value change summary file containing counts of the numbers of value changes for the signals in the digital circuit design. A discriminative neural network analyzes the value change summary file to determine whether an intermittent severe defect is present. A corpus of digital circuit designs, with and without intermittent severe defects, is used to train the discriminative neural network. The training process may involve dimensionality reduction of the data, enlargement of the data set, and data compression using an autoencoder.

    Radio frequency clocked device
    3.
    发明授权

    公开(公告)号:US11316553B2

    公开(公告)日:2022-04-26

    申请号:US16833356

    申请日:2020-03-27

    Abstract: An RF clocked device can include a signal processor operable to receive an RF signal having an RF signal frequency and output a clock signal having a clock frequency based on the RF signal frequency. The RF clocked device can also include a clock operable to receive, and operate, using the clock signal. The clock can output at least one of a time and a date. In addition, a clock system can include an RF clocked device. The RF clocked device can include a signal processor operable to receive an RF signal having an RF signal frequency and output a clock signal having a clock frequency based on the RF signal frequency. The RF clocked device can also include a clock operable to receive, and operate, using the clock signal. The clock can output at least one of a time and a date. The clock system can also include a client device operable to receive timing information from the RF clocked device.

    Malware and tamper resistant computer architecture
    4.
    发明授权
    Malware and tamper resistant computer architecture 有权
    恶意软件和防篡改计算机体系结构

    公开(公告)号:US09208353B2

    公开(公告)日:2015-12-08

    申请号:US13766401

    申请日:2013-02-13

    CPC classification number: G06F21/71 G06F21/79 G06F2221/2107

    Abstract: Generally described herein are methods and systems for enhanced tamper and malware resistant computer architectures. A system for enhanced tamper and malware resistance can include a harvardizer configured to receive comingled instructions and data and produce separated instructions and data. A data memory can be configured to receive the separated data. An instruction memory that is physically separate from the data memory can be configured to receive the separated instructions. The system can include one or more computer processors that can be configured to execute the separated instructions and data. The system can include one or more encryptors or decryptors to help thwart injection based attacks.

    Abstract translation: 这里通常描述了用于增强篡改和防恶意软件的计算机体系结构的方法和系统。 用于增强篡改和恶意软件阻力的系统可以包括被配置为接收附带的指令和数据并产生分离的指令和数据的哈佛器。 可以将数据存储器配置为接收分离的数据。 物理上与数据存储器分离的指令存储器可以被配置为接收分离的指令。 该系统可以包括一个或多个可配置为执行分离的指令和数据的计算机处理器。 该系统可以包括一个或多个加密器或解密器,以帮助阻止基于注射的攻击。

    Radio Frequency Clocked Device
    5.
    发明申请

    公开(公告)号:US20210250059A1

    公开(公告)日:2021-08-12

    申请号:US16833356

    申请日:2020-03-27

    Abstract: An RF clocked device can include a signal processor operable to receive an RF signal having an RF signal frequency and output a clock signal having a clock frequency based on the RF signal frequency. The RF clocked device can also include a clock operable to receive, and operate, using the clock signal. The clock can output at least one of a time and a date. In addition, a clock system can include an RF clocked device. The RF clocked device can include a signal processor operable to receive an RF signal having an RF signal frequency and output a clock signal having a clock frequency based on the RF signal frequency. The RF clocked device can also include a clock operable to receive, and operate, using the clock signal. The clock can output at least one of a time and a date. The clock system can also include a client device operable to receive timing information from the RF clocked device.

    Enhanced vector-based identification of circuit trojans

    公开(公告)号:US10853493B2

    公开(公告)日:2020-12-01

    申请号:US15728469

    申请日:2017-10-09

    Abstract: A system and method for detecting Trojans and other intermittent severe defects in a digital circuit design. A simulation of the digital circuit design results in a value change dump file, which is compiled to form a value change summary file containing counts of the numbers of value changes for the signals in the digital circuit design. A discriminative neural network analyzes the value change summary file to determine whether an intermittent severe defect is present. A corpus of digital circuit designs, with and without intermittent severe defects, is used to train the discriminative neural network. The training process may involve dimensionality reduction of the data, enlargement of the data set, and data compression using an autoencoder.

    MALWARE AND TAMPER RESISTANT COMPUTER ARCHITECTURE
    7.
    发明申请
    MALWARE AND TAMPER RESISTANT COMPUTER ARCHITECTURE 有权
    恶意和防篡改计算机架构

    公开(公告)号:US20140229743A1

    公开(公告)日:2014-08-14

    申请号:US13766401

    申请日:2013-02-13

    CPC classification number: G06F21/71 G06F21/79 G06F2221/2107

    Abstract: Generally described herein are methods and systems for enhanced tamper and malware resistant computer architectures. A system for enhanced tamper and malware resistance can include a harvardizer configured to receive comingled instructions and data and produce separated instructions and data. A data memory can be configured to receive the separated data. An instruction memory that is physically separate from the data memory can be configured to receive the separated instructions. The system can include one or more computer processors that can be configured to execute the separated instructions and data. The system can include one or more encryptors or decryptors to help thwart injection based attacks.

    Abstract translation: 这里通常描述了用于增强篡改和防恶意软件的计算机体系结构的方法和系统。 用于增强篡改和恶意软件阻力的系统可以包括被配置为接收附带的指令和数据并产生分离的指令和数据的哈佛器。 可以将数据存储器配置为接收分离的数据。 物理上与数据存储器分离的指令存储器可以被配置为接收分离的指令。 该系统可以包括一个或多个可配置为执行分离的指令和数据的计算机处理器。 该系统可以包括一个或多个加密器或解密器,以帮助阻止基于注射的攻击。

Patent Agency Ranking