DATA PROCESSING SYSTEM HAVING TAGGED AND UNTAGGED ADDRESS POINTERS AND METHOD FOR ACCESSING A LOCATION IN THE DATA PROCESSING SYSTEM

    公开(公告)号:US20250077439A1

    公开(公告)日:2025-03-06

    申请号:US18456732

    申请日:2023-08-28

    Applicant: NXP B.V.

    Abstract: A data processing system is provided that includes a processor and a memory. The processor is configured to execute instructions to access a location pointed to by an address pointer. The memory is coupled to the processor and configured to have a plurality of memory portions. A first address pointer for accessing a first portion of the memory includes a type bit field, a tag bit field, and a first address bit field. A second address pointer for accessing a second portion of the memory is configured to have only the type bit field and a second address bit field without the tag bit field. The type bit field is set to a first value for the tagged pointer and a second value for the untagged pointer. In another embodiment, a method is provided for accessing a location in the data processing system.

    METHOD FOR DETECTING NON-PROBLEM DOMAIN DATA IN A MACHINE LEARNING MODEL

    公开(公告)号:US20240249184A1

    公开(公告)日:2024-07-25

    申请号:US18156767

    申请日:2023-01-19

    Applicant: NXP B.V.

    CPC classification number: G06N20/00

    Abstract: A method is provided for detecting non-problem domain (NPD) data in a machine learning (ML) model. The method includes training the ML model using problem domain (PD) training data. A second fully connected layer is added to the trained ML model in parallel with a first fully connected layer in the trained ML model. The trained ML model is retrained with NPD training data while preventing weights in the ML model from changing except for weights of the second fully connected layer. An inference operation is performed with the retrained ML model. Output vectors are received from the first and second fully connected layers via a Softmax layer. A metric is computed using the output vectors. The metric is compared to a threshold metric to determine if input samples are PD or NPD. An indication is provided when NPD data is detected. In another embodiment, a ML model is provided.

    Method for protecting a machine learning model from a side channel attack

    公开(公告)号:US12032690B2

    公开(公告)日:2024-07-09

    申请号:US17810428

    申请日:2022-07-01

    Applicant: NXP B.V.

    CPC classification number: G06F21/554 G06N3/08 G06F2221/031

    Abstract: A method is provided for protecting a machine learning model from a side channel attack. A weighted sum vector having first and second elements is initialized. A weight vector for a connection between a node of a first layer and a node of a second layer is multiplied with an input vector to the node of the first layer. A first element of the weight vector includes a weight, and a first element of the input vector includes the input. A second element of the weight vector is a negation of the first element of the weight vector and the second element of the input vector equals the first element of the input vector. A multiplication result is added to the weighted sum vector to produce a computed weighted sum vector. An output vector including the computed weighted sum vector is provided to the node of the second layer.

    DATA PROCESSING SYSTEM AND METHOD FOR PROTECTING DATA IN THE DATA PROCESSING SYSTEM

    公开(公告)号:US20220215103A1

    公开(公告)日:2022-07-07

    申请号:US17143762

    申请日:2021-01-07

    Applicant: NXP B.V.

    Abstract: A data processing system has a processor and a system memory. The system memory may be a dynamic random-access memory (DRAM). The processor includes an embedded memory. The system memory is coupled to the processor and is organized in a plurality of pages. A portion of the code or data stored in the plurality of memory pages is selected for permutation. A permutation order is generated and the memory pages containing the portion of code or data is permuted using a permutation order. The permutation order and/or a reverse permutation order to recover the original order may be stored in the embedded memory. Permuting the memory pages with a permutation order stored in the embedded memory prevents the code or data from being read during a freeze attack on the system memory in a way that is useful to an attacker.

    Compilation scheme for tagged global variables

    公开(公告)号:US11055202B1

    公开(公告)日:2021-07-06

    申请号:US16715656

    申请日:2019-12-16

    Applicant: NXP B.V.

    Abstract: A system and method for accessing a tagged global variable in software, including: randomly generating tags for global variables in the software; tagging the global variables with the random tags; creating a pointer to each global variable with the random tags in unused bits of the pointer wherein the pointer points to the associated global variable; accessing one global variable indirectly using the tagged pointer; determining whether tag on the accessed global variable matches the tag on the accessed pointer; and indicating a fault when the tag on the accessed global variable does not match the tag on the accessed pointer.

    Data processing system having a monitoring system and method for monitoring

    公开(公告)号:US11023344B2

    公开(公告)日:2021-06-01

    申请号:US16659937

    申请日:2019-10-22

    Applicant: NXP B.V.

    Inventor: Jan Hoogerbrugge

    Abstract: A data processing system includes a monitoring system, the monitoring system includes a processor and a data analysis block. The processor executes a monitoring application for monitoring an operation of a monitored system coupled to the monitoring system. When assistance is needed from the monitored system, the processor has an output coupled to the monitored system for providing an assistance request. When the assistance request is sent to the monitored system, the processor also sends a disturbance indication to the data analysis block. The disturbance indication indicates that the output data from the monitored system may be disturbed by the assistance request. The data analysis block can then take an action to reduce the effect the disturbance may have on the analysis results. A method for monitoring the monitored system is also provided.

    Using secure key storage to bind a white-box implementation to one platform

    公开(公告)号:US10389517B2

    公开(公告)日:2019-08-20

    申请号:US15194001

    申请日:2016-06-27

    Applicant: NXP B.V.

    Abstract: A method for performing a secure function in a data processing system is provided. In accordance with one embodiment, the method includes generating and encoding an encryption key. The encoded encryption key may be encrypted in a key store in a trusted execution environment (TEE) of the data processing system. The encrypted encryption key may encrypted, stored, and decrypted in the key store in the TEE, but used in a white-box implementation to perform a secure function. The secure function may include encrypting a value in the white-box implementation for securing a monetary value on, for example, a smart card. In one embodiment, each time an encryption key or decryption key is used, it is changed to a new key. The method makes code lifting and rollback attacks more difficult for an attacker because the key is stored separately from, for example, a white-box implementation in secure storage.

Patent Agency Ranking