-
21.
公开(公告)号:US20220277077A1
公开(公告)日:2022-09-01
申请号:US17742865
申请日:2022-05-12
Applicant: Intel Corporation
Inventor: Marcio Juliato , Manoj Sastry , Shabbir Ahmed , Christopher Gutierrez , Qian Wang , Vuk Lesi
Abstract: A platform comprising numerous reconfigurable circuit components arranged to operate as primary and redundant circuits is provided. The platform further comprises security circuitry arranged to monitor the primary circuit for anomalies and reconfigurable circuit arranged to disconnect the primary circuit from a bus responsive to detection of an anomaly. Furthermore, the present disclosure provides for the quarantine, refurbishment and designation as redundant, the anomalous circuit.
-
22.
公开(公告)号:US11423145B2
公开(公告)日:2022-08-23
申请号:US16727565
申请日:2019-12-26
Applicant: Intel Corporation
Inventor: Christopher N. Gutierrez , Marcio Juliato , Shabbir Ahmed , Qian Wang , Manoj Sastry , Liuyang L. Yang , Xiruo Liu
IPC: G06F21/56
Abstract: Logic may implement observation layer intrusion detection systems (IDSs) to combine observations by intrusion detectors and/or other intrusion detection systems. Logic may monitor one or more control units at one or more observation layers of an in-vehicle network, each of the one or more control units to perform a vehicle function. Logic may combine observations of the one or more control units at the one or more observation layers. Logic may determine, based on a combination of the observations, that one or more of the observations represent an intrusion. Logic may determine, based at least on the observations, characteristics of an attack, and to pass the characteristics of the attack information to a forensic logging system to log the attack or pass the characteristics of the attack to a recovery system for informed selection of recovery procedures. Logic may dynamically adjust a threshold for detection of suspicious activity.
-
公开(公告)号:US11409286B2
公开(公告)日:2022-08-09
申请号:US16718495
申请日:2019-12-18
Applicant: Intel Corporation
Inventor: Marcio Juliato , Christopher Gutierrez , Shabbir Ahmed , Manoj Sastry , Liuyang Yang , Xiruo Liu
IPC: G05D1/00 , G06N5/04 , G06F16/901 , G06K9/62
Abstract: Systems, methods, computer program products, and apparatuses for low latency, fully reconfigurable hardware logic for ensemble classification methods, such as random forests. An apparatus may comprise circuitry for an interconnect and circuitry for a random forest implemented in hardware. The random forest comprising a plurality of decision trees connected via the interconnect, each decision tree comprising a plurality of nodes connected via the interconnect. A first decision tree of the plurality of decision trees comprising a first node of the plurality of nodes to: receive a plurality of elements of feature data via the interconnect, select a first element of feature data, of the plurality of elements of feature data, based on a configuration of the first node, and generate an output based on the first element of feature data, an operation, and a reference value, the operation and reference value specified in the configuration of the first node.
-
公开(公告)号:US11240659B2
公开(公告)日:2022-02-01
申请号:US16707544
申请日:2019-12-09
Applicant: INTEL CORPORATION
Inventor: Xiruo Liu , Shabbir Ahmed , Ralf Graefe , Christopher Gutierrez , Marcio Juliato , Rafael Rosales , Manoj Sastry , Liuyang Yang
IPC: H04W12/00 , H04W12/02 , H04W4/40 , H04W12/03 , H04W4/46 , H04W4/029 , H04W4/06 , H04L29/06 , H04W4/08 , H04W4/024 , H04L29/08 , H04W4/80
Abstract: Various embodiments are generally directed to techniques for providing improved privacy protection against vehicle tracking for connected vehicles of a vehicular network. For example, at least one road side unit may: identify a set of vehicles that require pseudonym changes and send an invitation for a pseudonym change event to each of the vehicles, determine at least a total number of the acceptances, determine whether the total number meets or exceeds a predetermined threshold number, send acknowledgement messages to the accepting vehicles if the threshold number is met, and form a vehicle group to coordinate the pseudonym change event during a privacy period. During the privacy period, the RSU and the vehicles may communicate with each other in a confidential and private manner via key-session-based unicast transmission, and coordinate transmission power and vehicle trajectory adjustments to maximize the benefits for safety and obfuscation for privacy.
-
公开(公告)号:US20220012371A1
公开(公告)日:2022-01-13
申请号:US17484627
申请日:2021-09-24
Applicant: Intel Corporation
Inventor: Marcio Juliato , Vuk Lesi , Christopher Gutierrez , Shabbir Ahmed , Qian Wang , Manoj Sastry
Abstract: Systems, apparatuses, and methods to mitigate effects of glitch attacks on a broadcast communication bus are provided. The voltage levels of the communication bus are repeatedly sampled to identify glitch attacks. The voltage level on the communication bus can be overdriven or overwritten to either corrupt received messages or correct received messages.
-
公开(公告)号:US11038909B2
公开(公告)日:2021-06-15
申请号:US16235812
申请日:2018-12-28
Applicant: Intel Corporation
Inventor: Marcio Juliato , Liuyang Lily Yang , Manoj Sastry , Christopher Gutierrez , Shabbir Ahmed , Vuk Lesi
IPC: B60R16/02 , H04W4/48 , H04W12/122 , H04L29/06 , B60R16/023 , H04L29/08
Abstract: Methods, apparatus, systems and articles of manufacture are disclosed for anomaly detection and recovery. An apparatus to isolate a first controller in an autonomous vehicle includes a first controller to control a reference signal of the autonomous vehicle via a communication bus, a second controller to control the reference signal of the autonomous vehicle when the first controller is compromised, and a message neutralizer to neutralize messages transmitted by the first controller when the first controller is compromised, the neutralized messages to cause the first controller to become isolated from the communication bus.
-
公开(公告)号:US20210119789A1
公开(公告)日:2021-04-22
申请号:US17133304
申请日:2020-12-23
Applicant: Intel Corporation
Inventor: Santosh Ghosh , Marcio Juliato , Manoj Sastry
Abstract: A method comprises receiving an image of an update for a software module, a rate parameter, an index parameter, and a public key, generating a 32-byte aligned string, computing a state parameter using the 32-byte aligned string, generating a modified message representative, computing a Merkle Tree root node, and in response to a determination that the Merkle Tree root node matches the public key, forwarding, to a remote device, the image of the update for a software module, the state parameter; and the modified message representative.
-
公开(公告)号:US20210006576A1
公开(公告)日:2021-01-07
申请号:US17025797
申请日:2020-09-18
Applicant: Intel Corporation
Inventor: Marcio Juliato , Shabbir Ahmed , Qian Wang , Christopher Gutierrez , Vuk Lesi , Manoj Sastry
Abstract: Systems, apparatuses, and methods to accelerate classification of malicious activity by an intrusion detection system are provided. An intrusion detection system can speculate on classification of labels in a random forest model based on temporary and incomplete set of features. Additionally, an intrusion detection system can classify malicious context based on a set of committed nodes in the random forest model.
-
公开(公告)号:US20190052654A1
公开(公告)日:2019-02-14
申请号:US16026413
申请日:2018-07-03
Applicant: Intel Corporation
Inventor: Marcio Juliato , Shabbir Ahmed , Santosh Ghosh , Manoj R. Sastry
Abstract: A data processing system that provides for active prevention of masquerading attacks comprises a microcontroller, a transceiver, and an active attack prevention module (AAPM) in communication with the microcontroller and the transceiver. The microcontroller enables the data processing system to operate as a node in a vehicle control system (VCS). The transceiver enables the node to communicate with a local area network (LAN) of the VCS. The AAPM enables the node to monitor the LAN for messages. In response to detecting a message on the LAN, the AAPM automatically determines whether the message falsely identifies the node as a source, based on a value in an identifier field in the message. In response to determining that the message falsely identifies the node as the source, the AAPM automatically takes at least one remedial action to neutralize the message. Other embodiments are described and claimed.
-
30.
公开(公告)号:US12301599B2
公开(公告)日:2025-05-13
申请号:US17484197
申请日:2021-09-24
Applicant: Intel Corporation
Inventor: Marcio Juliato , Javier Perez-Ramirez , Vuk Lesi , Dave Cavalcanti , Manoj Sastry , Christopher Gutierrez , Qian Wang , Shabbir Ahmed
IPC: H04L9/40
Abstract: Systems, apparatuses and methods may provide for technology that detects one or more non-compliant nodes with respect to a timing schedule, detects one or more compliant nodes with respect to the timing schedule, and identifies a malicious node based on positions of the one or more non-compliant nodes and the one or more compliant nodes in a network topography. The non-compliant node(s) and the compliant node(s) may be detected based on post-synchronization messages, historical attribute data and/or plane diversity data.
-
-
-
-
-
-
-
-
-