-
公开(公告)号:US20210334373A1
公开(公告)日:2021-10-28
申请号:US16855716
申请日:2020-04-22
Applicant: Arm Limited
Inventor: Subbayya Chowdary YANAMADALA , Jeremy Patrick DUBEUF , Carl Wayne VINEYARD , Matthias Lothar BOETTCHER , Hugo John Martin VINCENT , Shidhartha DAS
Abstract: A moderator system that can receive outputs of various stages of the security analytic framework and can receive input from external sources to provide information about emerging styles of attacks. One or more models/behavioral profiles can be curated by the moderator system, and the moderator system can provide updates to components of the security analytics framework.
-
公开(公告)号:US20210334415A1
公开(公告)日:2021-10-28
申请号:US16855659
申请日:2020-04-22
Applicant: Arm Limited
Inventor: Subbayya Chowdary YANAMADALA , Jeremy Patrick DUBEUF , Carl Wayne VINEYARD , Matthias Lothar BOETTCHER , Hugo John Martin VINCENT , Shidhartha DAS
Abstract: Analytics processing circuitry can include a data scavenger and a data analyzer coupled to receive the data from the data scavenger. The data scavenger collects data from at least one element of interest of a plurality of elements of interest of an IC. The data analyzer identifies patterns in the data from the data scavenger over a time frame or for a snapshot of time based on a predefined metric. The analytics processing circuitry can further include a moderator and a risk predictor. The risk predictor generates a risk assessment regarding whether the data collected by the data scavenger is indicative of normal behavior or abnormal behavior based at least on the output of the data analyzer and a behavioral model for the IC, which can be device and application specific. A threat response can be performed based on the risk assessment.
-
公开(公告)号:US20230135566A1
公开(公告)日:2023-05-04
申请号:US17655235
申请日:2022-03-17
Applicant: Arm Limited
Inventor: Einat LUKO , Jeremy Patrick DUBEUF
Abstract: A method of generating a digital signature. The method comprises calculating a first random number and, based on second and third random numbers, first and second modified versions thereof. A curve point on an elliptic curve is determined based on a base point and the first modified version. A first signature part is calculated based on the curve point. Based on the second and third random numbers, the modified versions of the first random number, data to be signed, the first signature part, and a private key, a second signature part and a check value for the second signature part are calculated. The second signature part is compared with the check value for the second signature part and, responsive to the check value for the second signature part matching the second signature part, a cryptographic signature is output comprising the first signature part and the second signature part.
-
-