METHODS AND APPARATUS FOR ANOMALY DETECTION AND RECOVERY

    公开(公告)号:US20190158521A1

    公开(公告)日:2019-05-23

    申请号:US16235812

    申请日:2018-12-28

    Abstract: Methods, apparatus, systems and articles of manufacture are disclosed for anomaly detection and recovery. An apparatus to isolate a first controller in an autonomous vehicle includes a first controller to control a reference signal of the autonomous vehicle via a communication bus, a second controller to control the reference signal of the autonomous vehicle when the first controller is compromised, and a message neutralizer to neutralize messages transmitted by the first controller when the first controller is compromised, the neutralized messages to cause the first controller to become isolated from the communication bus.

    TIME RECOVERY FROM ATTACKS ON DELAYED AUTHENTICATION

    公开(公告)号:US20250106207A1

    公开(公告)日:2025-03-27

    申请号:US18373160

    申请日:2023-09-26

    Abstract: Techniques to perform time recovery from attacks on delayed authentication in a time synchronized network are described. One embodiment comprises a method for decoding time information and a message authentication code (MAC) from a time message, the time information to synchronize a local clock for a device to a network time of a time synchronized network (TSN), and the MAC to authenticate the time message, determining whether the time message is authentic using the MAC, discarding the time information when the time message is not authentic, performing a bounded search to identify authentic time information using the MAC, and passing the authentic time information to a clock manager to synchronize the local clock to the network time of the TSN when the authentic time information is identified. Other embodiments are described and claimed.

    CONTINUED TIME SYNCHRONIZATION IN THE PRESENCE OF ATTACKS USING ATTACK-AWARE TWIN

    公开(公告)号:US20250080549A1

    公开(公告)日:2025-03-06

    申请号:US18240822

    申请日:2023-08-31

    Abstract: Techniques for an attack-aware digital twin in a time sensitive network are described. A method includes receiving time information for a network by an attack-aware digital twin (AADT), the AADT to simulate operations of a clock manager for a node in the network based on models of the clock manager, generating model clock control information to adjust a clock to a network time for the network, the model clock control information to contain a malicious time sample introduced by a time desynchronization attack in the network, and removing the malicious time sample from the model clock control information to adjust the clock to the network time for the network. Other embodiments are described and claimed.

Patent Agency Ranking