-
公开(公告)号:US12184668B2
公开(公告)日:2024-12-31
申请号:US17356033
申请日:2021-06-23
Applicant: Intel Corporation
Inventor: Marcio Juliato , Shabbir Ahmed , Christopher Gutierrez , Vuk Lesi , Manoj Sastry , Qian Wang
Abstract: Systems, apparatuses, and methods to identify bus-off and masquerade attacks against electronic control units (ECUs) transmitting on a communication bus from behind a gateway coupled to the communication bus are described. The disclosure further describes systems, apparatuses, and methods to mitigate against bus-off attacks made against an ECU coupled to a communication bus through a gateway. Other embodiments are described and claimed.
-
公开(公告)号:US12164627B2
公开(公告)日:2024-12-10
申请号:US17484689
申请日:2021-09-24
Applicant: Intel Corporation
Inventor: Shabbir Ahmed , Marcio Juliato , Vuk Lesi , Qian Wang , Manoj Sastry
Abstract: Systems, apparatuses, and methods to establish ground truth for an intrusion detection system in the presence of an attacker electronic control unit transmitting masqueraded messages on a communication bus, such as an in-vehicle network bus, are provided.
-
公开(公告)号:US12120212B2
公开(公告)日:2024-10-15
申请号:US17706939
申请日:2022-03-29
Applicant: Intel Corporation
Inventor: Vuk Lesi , Christopher Gutierrez , Manoj Sastry , Christopher Hall , Marcio Juliato , Shabbir Ahmed , Qian Wang
CPC classification number: H04L7/0016 , H04J3/06 , H04J3/0673
Abstract: Time recovery techniques are described. A method comprises receiving messages from the first device by the second device in the first network domain, the messages to comprise time information to synchronize a first clock for the first device and a second clock for the second device to a network time, determining the second clock is to recover the network time for the second device without new messages from the first device, retrieving a first set of timestamps previously stored for events in the first network domain using the network time from the second clock, retrieving a second set of timestamps previously stored for the events in the first network domain using a redundant time from a third clock, where the third clock is not synchronized with the first and second clocks, and recovering the network time using a regression model and the redundant time from the third clock.
-
公开(公告)号:US12055655B2
公开(公告)日:2024-08-06
申请号:US17357892
申请日:2021-06-24
Applicant: Intel Corporation
Inventor: Qian Wang , Shabbir Ahmed , Christopher Gutierrez , Wen-Ling Huang , Marcio Juliato , Saiveena Kesaraju , Vuk Lesi , Manoj Sastry , Ivan Simoes Gaspar
IPC: G01S7/28 , G01S7/02 , G01S7/292 , G01S7/35 , G01S13/931
CPC classification number: G01S7/2813 , G01S7/023 , G01S7/2922 , G01S7/354 , G01S13/931
Abstract: Systems, apparatuses, and methods to response to distinguish a ghost target from an actual target based on radar signals is provided. In particular, the disclosure provides an intrusion detection system adapted to receive radar signals and distinguish a potential ghost target from a legitimate target based on a signal to noise ratio of the radar signals and a range to the ghost target and the legitimate target.
-
公开(公告)号:US20240211253A1
公开(公告)日:2024-06-27
申请号:US18145744
申请日:2022-12-22
Applicant: Intel Corporation
Inventor: Santosh Ghosh , Christoph Dobraunig , Manoj Sastry , Andrew H. Reinders , Regev Shemy , Qian Wang , Rotem Ohana Peretz , Wing Shek Wong , Wajdi Feghali
CPC classification number: G06F9/30029 , G06F9/3016 , G06F9/3802
Abstract: A method comprises fetching, by fetch circuitry, an encoded parity instruction comprising at least one opcode, a first source identifier for a first source, a second source identifier for a second source, a third source identifier for a third source, and a destination identifier for a destination, decoding, by decode circuitry, the encoded parity instruction to generate a decoded parity instruction; and executing, by execution circuitry, the decoded parity instruction to retrieve operands representing a first register from the first source, a second register from the second source, a third register from the third source, and an index from the third source, perform an XOR operation of four words of data from the first register and single word of data from the second register in a position represented by the index to generate a parity value, and store the parity value in a the first register in a position represented by the index.
-
公开(公告)号:US12000957B2
公开(公告)日:2024-06-04
申请号:US17357291
申请日:2021-06-24
Applicant: Intel Corporation
Inventor: Vuk Lesi , Shabbir Ahmed , Christopher Gutierrez , Wen-Ling Huang , Marcio Juliato , Saiveena Kesaraju , Manoj Sastry , Ivan Simoes Gaspar , Qian Wang
IPC: G01S7/41 , G01S13/56 , G01S13/931
CPC classification number: G01S7/415 , G01S13/56 , G01S13/931 , G01S2013/9321
Abstract: Systems, apparatuses, and methods to response to distinguish a ghost target from an actual target based on radar signals and ranges determined from the radar signals. In particular, the disclosure provides an intrusion detection system receiving ranges and velocities for targets detected based on radar signals, determining a potential ghost target from the received velocities and confirming the potential ghost target based on estimated ranges and perturbations of the vehicle speed.
-
公开(公告)号:US11902297B2
公开(公告)日:2024-02-13
申请号:US17214444
申请日:2021-03-26
Applicant: Intel Corporation
Inventor: Christopher Gutierrez , Shabbir Ahmed , Marcio Juliato , Vuk Lesi , Manoj Sastry , Qian Wang
CPC classification number: H04L63/1408 , B60R16/0231 , H04L1/08 , H04L12/40143 , H04L67/12 , G06N20/00 , H04L2012/40273
Abstract: Systems, apparatuses, and methods to establish a mapping between message identifications for messages transmitted on a communication bus and electronic control units transmitting the messages is provided. In particular, retransmission of a low priority message onto the bus is forced such that the retransmitted low priority message overlaps with a higher priority message to determine whether the messages originated from the same ECU.
-
公开(公告)号:US11875235B2
公开(公告)日:2024-01-16
申请号:US17024232
申请日:2020-09-17
Applicant: Intel Corporation
Inventor: Shabbir Ahmed , Christopher Gutierrez , Marcio Juliato , Qian Wang , Vuk Lesi , Manoj Sastry
CPC classification number: G06N20/00 , G06F21/554 , G06N5/04 , G06F2221/034
Abstract: Systems, apparatuses, and methods to establish ground truth for an intrusion detection system using machine learning models to identify an electronic control unit transmitting a message on a communication bus, such as an in-vehicle network bus, are provided. Voltage signatures for overlapping message identification (MID) numbers are collapsed and trained on a single ECU label.
-
公开(公告)号:US20230342450A1
公开(公告)日:2023-10-26
申请号:US18215924
申请日:2023-06-29
Applicant: Intel Corporation
Inventor: Eduardo Alban , Shabbir Ahmed , Marcio Juliato , Christopher Gutierrez , Qian Wang , Vuk Lesi , Manoj Sastry
CPC classification number: G06F21/44 , G06F21/85 , H04L12/40 , G06F13/20 , H04L2012/40273 , H04L2012/40215
Abstract: Systems, apparatuses, and methods to identify an electronic control unit transmitting a message on a communication bus, such as an in-vehicle network bus, are provided. ECUs transmit messages by manipulating voltage on conductive lines of the bus. Observation circuitry can observe voltage signals associated with the transmission at a point on the in-vehicle network bus. A distribution can be generated from densities of the voltage signals. ECUs can be identified and/or fingerprinted based on the distributions.
-
公开(公告)号:US20220224501A1
公开(公告)日:2022-07-14
申请号:US17706939
申请日:2022-03-29
Applicant: Intel Corporation
Inventor: Vuk Lesi , Christopher Gutierrez , Manoj Sastry , Christopher Hall , Marcio Juliato , Shabbir Ahmed , Qian Wang
IPC: H04L7/00
Abstract: Time recovery techniques are described. A method comprises receiving messages from the first device by the second device in the first network domain, the messages to comprise time information to synchronize a first clock for the first device and a second clock for the second device to a network time, determining the second clock is to recover the network time for the second device without new messages from the first device, retrieving a first set of timestamps previously stored for events in the first network domain using the network time from the second clock, retrieving a second set of timestamps previously stored for the events in the first network domain using a redundant time from a third clock, where the third clock is not synchronized with the first and second clocks, and recovering the network time using a regression model and the redundant time from the third clock.
-
-
-
-
-
-
-
-
-