Systems and methods for nested autoencoding of radar for neural image analysis

    公开(公告)号:US10719706B1

    公开(公告)日:2020-07-21

    申请号:US16012624

    申请日:2018-06-19

    Abstract: Disclosed herein are embodiments of systems, methods, and products comprise an analytic server, which provides a terrain segmentation and classification tool for synthetic aperture radar (SAR) imagery. The server accurately segments and classifies terrain types in SAR imagery and automatically adapts to new radar sensors data. The server receives a first SAR imagery and trains an autoencoder based on the first SAR imagery to generate learned representations of the first SAR imagery. The server trains a classifier based on labeled data of the first SAR imagery data to recognize terrain types from the learned representations of the first SAR imagery. The server receives a terrain query for a second SAR imagery. The server translates the second imagery data into the first imagery data and classifies the second SAR imagery terrain types using the classifier trained for the first SAR imagery. By reusing the original classifier, the server improves system efficiency.

    Self-healing architecture for resilient computing services

    公开(公告)号:US10554685B1

    公开(公告)日:2020-02-04

    申请号:US15604850

    申请日:2017-05-25

    Abstract: For each respective virtual machine (VM) of a plurality of VMs, a distributed computing system generates a unique Application Binary Interface (ABI) for an operating system for the respective VM, compiles a software application to use the unique ABI, and installs the operating system and the compiled software application on the respective VM. A dispatcher node dispatches, to one or more VMs of the plurality of VMs that provide a service and are in the active mode, request messages for the service. Furthermore, a first host device may determine, in response to software in the first VM invoking a system call in a manner inconsistent with the unique ABI for the operating system of the first VM, that a failover event has occurred. Responsive to the failover event, the distributed computing system fails over from the first VM to a second VM.

    MULTI-DOMAIN APPLICATION EXECUTION MANAGEMENT

    公开(公告)号:US20170177892A1

    公开(公告)日:2017-06-22

    申请号:US15164673

    申请日:2016-05-25

    Abstract: An example method includes selecting, based at least on first and second policies, first and second containers in which to execute first and second applications, respectively. The example method further includes isolating execution of the first application in the first container, and isolating execution of the second application in the second container. The example method also includes applying, based at least on the first policy, a first group of security controls to the first application executing in the first container, wherein the first container defines a first domain in which the first application is executed, and applying, based at least on the second policy, a second group of security controls to the second application executing in the second container, wherein the second container defines a second domain in which the second application is executed.

    Mediating communication of a universal serial bus device
    14.
    发明授权
    Mediating communication of a universal serial bus device 有权
    通信串行总线设备的通信

    公开(公告)号:US09081911B2

    公开(公告)日:2015-07-14

    申请号:US14339390

    申请日:2014-07-23

    Abstract: In an example, an apparatus includes a memory storing a hypervisor, where the hypervisor is configured to determine whether one or more universal serial bus (USB) devices in communication with the hypervisor are authorized to communicate with a guest operating system of the hypervisor and, after determining that the one or more USB devices are authorized to communicate with the guest, virtualize the one or more USB devices at the guest operating system and transfer messages between the one or more USB devices and the virtualized USB device.

    Abstract translation: 在一个示例中,设备包括存储管理程序的存储器,其中管理程序被配置为确定与管理程序通信的一个或多个通用串行总线(USB)设备是否被授权与管理程序的客户操作系统通信, 在确定一个或多个USB设备被授权与访客通信之后,虚拟化客户操作系统处的一个或多个USB设备,并在一个或多个USB设备与虚拟化USB设备之间传送消息。

    MEDIATING COMMUNICATION OF A UNIVERSAL SERIAL BUS DEVICE
    15.
    发明申请
    MEDIATING COMMUNICATION OF A UNIVERSAL SERIAL BUS DEVICE 有权
    介绍通用串行总线设备的通信

    公开(公告)号:US20140337558A1

    公开(公告)日:2014-11-13

    申请号:US14339390

    申请日:2014-07-23

    Abstract: In an example, an apparatus includes a memory storing a hypervisor, where the hypervisor is configured to determine whether one or more universal serial bus (USB) devices in communication with the hypervisor are authorized to communicate with a guest operating system of the hypervisor and, after determining that the one or more USB devices are authorized to communicate with the guest, virtualize the one or more USB devices at the guest operating system and transfer messages between the one or more USB devices and the virtualized USB device.

    Abstract translation: 在一个示例中,设备包括存储管理程序的存储器,其中管理程序被配置为确定与管理程序通信的一个或多个通用串行总线(USB)设备是否被授权与管理程序的客户操作系统通信, 在确定一个或多个USB设备被授权与访客通信之后,虚拟化客户操作系统处的一个或多个USB设备,并在一个或多个USB设备与虚拟化USB设备之间传送消息。

    Systems and methods for mapping data structures to memory in multi-level memory hierarchies

    公开(公告)号:US12175103B1

    公开(公告)日:2024-12-24

    申请号:US16126728

    申请日:2018-09-10

    Abstract: Systems and methods for analyzing memory architectures and for mapping data structures in software programs to appropriate memory to take advantage of the different memory architectures. A computer architecture having a processor connected to one or more first memories and one or more second memories is defined, wherein the first memories and the second memories are characterized by different performance profiles. An executable of a software program is instrumented to capture, during runtime, patterns of access to selected data structures of the executable. Based on an analysis of the patterns of access, allocation of the selected data structures between the first and second memories is determined.

    Applying constraints models for application layer security

    公开(公告)号:US12158960B2

    公开(公告)日:2024-12-03

    申请号:US18317807

    申请日:2023-05-15

    Inventor: Judson Powers

    Abstract: A computer-implemented method of securing vulnerabilities in a program, the method including receiving, by a computer, state information generated by an executed application program, training, by the computer, a constraints model based on the state information, generating, by the computer, one or more constraints with the constraints model, each of the one or more constraints describing an execution constraint for executing the application program, wherein the execution constraint enforces an intended operation of the application program, and applying, by the computer, the one or more constraints to the application program.

    Systems and methods for data flow integrity according to a controlled environment

    公开(公告)号:US11669642B1

    公开(公告)日:2023-06-06

    申请号:US17322524

    申请日:2021-05-17

    CPC classification number: G06F21/64 G06F8/52 G06F21/52

    Abstract: Disclosed herein are embodiments of systems, methods, and products comprise a processor, which provides runtime enforcement of data flow integrity. The processor accesses the application binary file from the disk to execute an application and translates the application binary into intermediate representation. The processor applies the logic of data flow integrity controls to the intermediate representation. Specifically, the processor identifies the vulnerable code in the intermediate representation. The processor applies data flow integrity controls to the vulnerable code. The processor adds simple instrumentation that only changes the application's behavior when unauthorized data tampering occurs while preserving the application's normal behavior. When certain operations may cause unauthorized data tampering, the processor takes proper measures to stop the operations. The processor translates the intermediate representation back to a machine code and replaces the original binary with the machine code.

    Artificial intelligence modeling for cyber-attack simulation protocols

    公开(公告)号:US11429713B1

    公开(公告)日:2022-08-30

    申请号:US16256810

    申请日:2019-01-24

    Abstract: The methods and systems disclosed herein generally relate to automated execution and evaluation of computer network training exercises, such as in a virtual environment. A server generates a training system having a virtual attack machine and a virtual target machine where the virtual target machine is operatively controlled by a trainee computer. The server then executes a simulated cyber-attack and monitors/collects actions and responses by the trainee. The server then executes an artificial intelligence model to evaluate the trainee's action and to identify a subsequent simulated cyber-attack (e.g., a next step to the simulated cyber-attack). The server may then train the artificial intelligence model using various machine-learning techniques using the collected data during the exercise.

Patent Agency Ranking