-
公开(公告)号:EP3770759A1
公开(公告)日:2021-01-27
申请号:EP20164722.9
申请日:2020-03-20
申请人: Intel Corporation
IPC分类号: G06F9/48
摘要: Examples are described that relate to waking up or invoking a function such as a processor-executed application or a hardware device. The application or a hardware device can specify which sources can cause wake-ups and which sources are not to cause wake-ups. A device or processor-executed software can monitor reads from or writes to a region of memory and cause the application or a hardware device to wake-up unless the wake-up is specified as inhibited. The updated region of memory can be precisely specified to allow a pinpoint retrieval of updated content instead of scanning a memory range for changes. In some cases, a write to a region of memory can include various parameters that are to be used by the woken-up application or a hardware device. Parameters can include a source of a wake-up, a timer to cap execution time, or any other information.
-
公开(公告)号:EP3525088A1
公开(公告)日:2019-08-14
申请号:EP19151260.7
申请日:2019-01-10
申请人: Intel Corporation
摘要: A processor of an aspect includes a decode unit to decode an instruction. The instruction is to indicate a destination memory address information. An execution unit is coupled with the decode unit. The execution unit, in response to the decode of the instruction, is to store memory addresses, for at least all initial writes to corresponding data items, which are to occur after the instruction in original program order, to a memory address log. A start of the memory address log is to correspond to the destination memory address information. Other processors, methods, systems, and instructions are also disclosed.
-
公开(公告)号:EP3906508A1
公开(公告)日:2021-11-10
申请号:EP19907690.2
申请日:2019-04-23
申请人: Intel Corporation
-
公开(公告)号:EP4369229A2
公开(公告)日:2024-05-15
申请号:EP24163021.9
申请日:2019-04-23
申请人: INTEL Corporation
发明人: POGORELIK, Oleg , NAYSHTUT, Alex , BEN-SHALOM, Omer , KLIMOV, Denis , KELLERMANN, Raizy , BARNHART-MAGEN, Guy , SUKHOMLINOV, Vadim
IPC分类号: G06F21/55
CPC分类号: G06N3/04 , G06N20/00 , G06F21/554 , G06N7/01
摘要: Techniques and apparatuses to harden AI systems against various attacks are provided. Among the different techniques and apparatuses, is provided, techniques and apparatuses that expand the domain for an inference model to include both visible classes and well as hidden classes. The hidden classes can be used to detect possible probing attacks against the model.
-
公开(公告)号:EP3588360A1
公开(公告)日:2020-01-01
申请号:EP19176635.1
申请日:2019-05-24
申请人: INTEL Corporation
发明人: LEMAY, Michael , DURHAM, David M. , KOUNAVIS, Michael E. , HUNTLEY, Barry E. , SHANBHOGUE, Vedvyas , BRANDT, Jason W. , TRIPLETT, Josh , NEIGER, Gilbert , GREWAL, Karanvir , PATEL, Baiju V. , ZHUANG, Ye , TSAI, Jr-Shian , SUKHOMLINOV, Vadim , SAHITA, Ravi , ZHANG, Mingwei , FARWELL, James C. , DAS, Amitabh , BHUYAN, Krishna
摘要: Disclosed embodiments relate to encoded inline capabilities. In one example, a system includes a trusted execution environment (TEE) to partition an address space within a memory into a plurality of compartments each associated with code to execute a function, the TEE further to assign a message object in a heap to each compartment, receive a request from a first compartment to send a message block to a specified destination compartment, respond to the request by authenticating the request, generating a corresponding encoded capability, conveying the encoded capability to the destination compartment, and scheduling the destination compartment to respond to the request, and subsequently, respond to a check capability request from the destination compartment by checking the encoded capability and, when the check passes, providing a memory address to access the message block, and, otherwise, generating a fault, wherein each compartment is isolated from other compartments.
-
公开(公告)号:EP4369229A3
公开(公告)日:2024-09-25
申请号:EP24163021.9
申请日:2019-04-23
申请人: INTEL Corporation
发明人: POGORELIK, Oleg , NAYSHTUT, Alex , BEN-SHALOM, Omer , KLIMOV, Denis , KELLERMANN, Raizy , BARNHART-MAGEN, Guy , SUKHOMLINOV, Vadim
摘要: Techniques and apparatuses to harden AI systems against various attacks are provided. Among the different techniques and apparatuses, is provided, techniques and apparatuses that expand the domain for an inference model to include both visible classes and well as hidden classes. The hidden classes can be used to detect possible probing attacks against the model.
-
公开(公告)号:EP3624416A1
公开(公告)日:2020-03-18
申请号:EP19191514.9
申请日:2019-08-13
申请人: INTEL Corporation
IPC分类号: H04L29/06 , H04L12/851 , H04L12/741 , H04L12/721
摘要: Technologies for filtering network traffic on ingress include a network interface controller (NIC) configured to parse a header of a network packet received by the NIC to extract data from a plurality of header fields of the header. The NIC is additionally configured to determine an input set based on the field vector, retrieve a matching list from a plurality of matching lists, and compare the input set to each of the plurality of rules to identify a matching rule of the plurality of rules that matches a corresponding portion of the input set. The NIC is further configured to perform an action on the network packet based on an actionable instruction associated with the one of the plurality of rules that matches the corresponding portion of the input set. Other embodiments are described herein.
-
-
-
-
-
-