-
公开(公告)号:US20210081793A1
公开(公告)日:2021-03-18
申请号:US17093938
申请日:2020-11-10
Applicant: INTEL CORPORATION
Inventor: LI CHEN , RAVI L. SAHITA
Abstract: Various embodiments are generally directed to techniques for training deep neural networks, such as with an iterative approach, for instance. Some embodiments are particularly directed to a deep neural network (DNN) training system that generates a hardened DNN by iteratively training DNNs with images that were misclassified by previous iterations of the DNN. One or more embodiments, for example, may include logic to generate an adversarial image that is misclassified by a first DNN that was previously trained with a set of sample images. In some embodiments, the logic may determine a second training set that includes the adversarial image that was misclassified by the first DNN and the first training set of one or more sample images. The second training set may be used to train a second DNN. In various embodiments, the above process may be repeated for a predetermined number of iterations to produce a hardened DNN.
-
公开(公告)号:US20180341767A1
公开(公告)日:2018-11-29
申请号:US15605573
申请日:2017-05-25
Applicant: INTEL CORPORATION
Inventor: ABHISHEK BASAK , RAVI L. SAHITA , VEDVYAS SHANBHOGUE
CPC classification number: G06F21/52 , G06F12/06 , G06F2212/1008 , G06F2212/1052 , G06F2212/154 , G06F2221/033
Abstract: Various embodiments are generally directed to techniques for control flow protection with minimal performance overhead, such as by utilizing one or more micro-architectural optimizations to implement a shadow stack (SS) to verify a return address before returning from a function call, for instance. Some embodiments are particularly directed to a computing platform, such as an internet of things (IoT) platform, that overlaps or parallelizes one or more SS access operations with one or more data stack (DS) access operations.
-
公开(公告)号:US20170249261A1
公开(公告)日:2017-08-31
申请号:US15175348
申请日:2016-06-07
Applicant: Intel Corporation
Inventor: DAVID M. DURHAM , RAVI L. SAHITA , GILBERT NEIGER , VEDVYAS SHANBHOGUE , ANDREW V. ANDERSON , MICHAEL LEMAY , JOSEPH F. CIHULA , ARUMUGAM THIYAGARAJAH , ASIT K. MALLICK , BARRY E. HUNTLEY , DAVID A. KOUFATY , DEEPAK K. GUPTA , BAIJU V. PATEL
CPC classification number: G06F12/145 , G06F9/45533 , G06F12/1009 , G06F12/1027 , G06F21/78 , G06F2212/1016 , G06F2212/1052 , G06F2212/151 , G06F2212/656 , G06F2212/657
Abstract: This disclosure is directed to a system for address mapping and translation protection. In one embodiment, processing circuitry may include a virtual machine manager (VMM) to control specific guest linear address (GLA) translations. Control may be implemented in a performance sensitive and secure manner, and may be capable of improving performance for critical linear address page walks over legacy operation by removing some or all of the cost of page walking extended page tables (EPTs) for critical mappings. Alone or in combination with the above, certain portions of a page table structure may be selectively made immutable by a VMM or early boot process using a sub-page policy (SPP). For example, SPP may enable non-volatile kernel and/or user space code and data virtual-to-physical memory mappings to be made immutable (e.g., non-writable) while allowing for modifications to non-protected portions of the OS paging structures and particularly the user space.
-
公开(公告)号:US20150378633A1
公开(公告)日:2015-12-31
申请号:US14320334
申请日:2014-06-30
Applicant: Intel Corporation
Inventor: RAVI L. SAHITA , VEDVYAS SHANBHOGUE , GILBERT NEIGER , JONATHAN EDWARDS , IDO OUZIEL , BARRY E. HUNTLEY , STANISLAV SHWARTSMAN , DAVID M. DURHAM , ANDREW V. ANDERSON , MICHAEL LEMAY
CPC classification number: G06F9/45558 , G06F9/3004 , G06F9/30076 , G06F12/1009 , G06F2009/45583 , G06F2212/657
Abstract: An apparatus and method for fine grain memory protection. For example, one embodiment of a method comprises: performing a first lookup operation using a virtual address to identify a physical address of a memory page, the memory page comprising a plurality of sub-pages; determining whether sub-page permissions are enabled for the memory page; if sub-page permissions are enabled, then performing a second lookup operation to determine permissions associated with one or more of the sub-pages of the memory page; and implementing the permissions associated with the one or more sub-pages.
Abstract translation: 一种细粒度记忆保护装置和方法。 例如,方法的一个实施例包括:使用虚拟地址执行第一查找操作以识别存储器页面的物理地址,所述存储器页面包括多个子页面; 确定是否为所述存储器页启用子页面许可; 如果启用子页面许可,则执行第二查找操作以确定与存储器页面的一个或多个子页面相关联的许可; 以及实现与一个或多个子页面相关联的许可。
-
-
-