Dynamic computational acceleration using a heterogeneous hardware infrastructure

    公开(公告)号:US10372428B1

    公开(公告)日:2019-08-06

    申请号:US15989064

    申请日:2018-05-24

    Abstract: An example method includes, during execution of a software application in a computing system comprising a plurality of processing units, identifying platform-independent instructions that are configured to perform at least one computational task, wherein the plurality of processing units comprises a heterogeneous group, and wherein the platform-independent instructions have a format that is not specific to any particular processing unit in the plurality of processing units, determining one or more scheduling criteria that are associated with the platform-independent instructions, and selecting, from the heterogeneous group of processing units and based on the scheduling criteria, a processing unit to perform the at least one computational task. The example method further includes converting the platform-independent instructions into platform-dependent instructions, wherein the platform-dependent instructions have a format that is specific to the selected processing unit, and executing, by the selected processing unit, the platform-dependent instructions to perform the at least one computational task.

    Dynamic computational acceleration using a heterogeneous hardware infrastructure

    公开(公告)号:US09983857B2

    公开(公告)日:2018-05-29

    申请号:US14741399

    申请日:2015-06-16

    Abstract: An example method includes, during execution of a software application in a computing system comprising a plurality of processing units, identifying platform-independent instructions that are configured to perform at least one computational task, wherein the plurality of processing units comprises a heterogeneous group, and wherein the platform-independent instructions have a format that is not specific to any particular processing unit in the plurality of processing units, determining one or more scheduling criteria that are associated with the platform-independent instructions, and selecting, from the heterogeneous group of processing units and based on the scheduling criteria, a processing unit to perform the at least one computational task. The example method further includes converting the platform-independent instructions into platform-dependent instructions, wherein the platform-dependent instructions have a format that is specific to the selected processing unit, and executing, by the selected processing unit, the platform-dependent instructions to perform the at least one computational task.

    NETWORK DEFENSE SYSTEM AND FRAMEWORK FOR DETECTING AND GEOLOCATING BOTNET CYBER ATTACKS
    44.
    发明申请
    NETWORK DEFENSE SYSTEM AND FRAMEWORK FOR DETECTING AND GEOLOCATING BOTNET CYBER ATTACKS 有权
    网络防御系统和框架用于检测和接地网络攻击

    公开(公告)号:US20130174256A1

    公开(公告)日:2013-07-04

    申请号:US13730706

    申请日:2012-12-28

    Inventor: Judson Powers

    CPC classification number: H04L63/145 H04L63/1416 H04L63/1425 H04L2463/144

    Abstract: A network defense system is described that provides network sensor infrastructure and a framework for managing and executing advanced cyber security algorithms specialized for detecting highly-distributed, stealth network attacks. In one example, a system includes a data collection and storage subsystem that provides a central repository to store network traffic data received from sensors positioned within geographically separate networks. Cyber defense algorithms analyze the network traffic data and detect centrally-controlled malware that is configured to perform distributed network attacks (“botnet attacks”) from devices within the geographically separate networks. A visualization and decision-making subsystem generates a user interface that presents an electronic map of geographic locations of source devices and target devices of the botnet attacks. The data collection and storage subsystem stores a manifest of parameters for the network traffic data to be analyzed by each of the cyber defense algorithms.

    Abstract translation: 描述了一种网络防御系统,其提供网络传感器基础设施和用于管理和执行专用于检测高度分布式隐形网络攻击的高级网络安全算法的框架。 在一个示例中,系统包括数据收集和存储子系统,其提供中央存储库以存储从位于地理上分离的网络内的传感器接收的网络流量数据。 网络防御算法分析网络流量数据,并检测被配置为从地理上分离的网络中的设备执行分布式网络攻击(“僵尸网络攻击”)的集中控制的恶意软件。 可视化和决策子系统生成用户界面,其显示源设备和僵尸网络攻击的目标设备的地理位置的电子地图。 数据采集​​和存储子系统存储每个网络防御算法要分析的网络流量数据的参数清单。

    Distributed network nodes defining a database access gateway

    公开(公告)号:US12160471B2

    公开(公告)日:2024-12-03

    申请号:US18113392

    申请日:2023-02-23

    Abstract: A plurality of distributed network nodes may provide a decentralized access gateway to multiple, diverse types of databases. The plurality of distributed network nodes may host a private party blockchain. Each node may execute a peer-to-peer (P2P) client to perform operations associated with the private party blockchain. A subset of the nodes may be configured as validator nodes that may implement gossip protocols to cooperatively validate one or more database operations and generate a new block for the private party blockchain. Another subset of nodes may be configured as host nodes that may receive the new block and update a corresponding local copy of the private party blockchain appending the new block. Utilizing the co-operative validation of database operations and the updates appending the new blocks, the private party blockchain may maintain an immutable digital record of access and updates to the multiple and diverse types of databases.

    Automated cyber evaluation system
    46.
    发明授权

    公开(公告)号:US12019756B1

    公开(公告)日:2024-06-25

    申请号:US17870575

    申请日:2022-07-21

    CPC classification number: G06F21/577 G06F8/53 G06F9/54 G06N20/00

    Abstract: Embodiments disclosed herein describe systems and methods for assessing vulnerabilities of embedded non-IP devices. In an illustrative embodiment, a system of assessing the vulnerabilities of embedded non-IP devices may be within a portable device. The portable device may include a plurality of wired connectors for various wired communication/data transfer protocols. The portable device may include tools for analyzing the firmware binaries of the embedded non-IP devices, such as disassemblers and modules for concrete and symbolic (concolic) execution. Based upon the disassembly and the concolic execution, the portable device may identify vulnerabilities such as buffer overflows and programming flaws in the firmware binaries.

    Automated software bug discovery and assessment

    公开(公告)号:US10949338B1

    公开(公告)日:2021-03-16

    申请号:US16440654

    申请日:2019-06-13

    Abstract: In general, this disclosure describes methods and devices for analyzing source code to detect potential bugs in the code. Specifically, a device retrieves source code of an application. For each distinct execution of a plurality of executions of the application, the device initiates the respective execution at a particular starting point of the source code and inputs, into the source code, a unique set of inputs relative to any other execution. The device stores, into a path log, an indication of each line of source code and stores, into an output log, an indication of each output object encountered during the respective execution. Each output object includes a local variable dependent on the inputs. The device analyzes, using a machine learning model, the path and output logs to identify an abnormality indicative of a potential bug in the source code. The device outputs a graphical representation of the abnormality.

    Distributed data storage and sharing in a peer-to-peer network

    公开(公告)号:US10664574B1

    公开(公告)日:2020-05-26

    申请号:US15791258

    申请日:2017-10-23

    Abstract: In general, the disclosure is directed to data storage within a peer-to-peer network that includes a plurality of computing devices. A first computing device of the peer-to-peer network stores an encrypted file in a data storage component. The first computing device creates file information metadata comprising details of the encrypted file and peer information metadata comprising details of the first computing device. The first computing device updates a file distributed hash table to include the file information metadata and a peer distributed hash table to include the peer information metadata. At least a portion of the file distributed hash table is stored on a first group of one or more computing devices of the plurality of computing devices. Further, at least a portion of the peer distributed hash table is stored on a second group of one or more computing devices of the plurality of computing devices.

Patent Agency Ranking