-
公开(公告)号:US20200226274A1
公开(公告)日:2020-07-16
申请号:US16833200
申请日:2020-03-27
Applicant: Intel Corporation
Inventor: Marcio Juliato , Shabbir Ahmed , Maria Soledad Elli , Christopher Noe Gutierrez , Vuk Lesi , Manoj R. Sastry , John Charles Weast , Liuyang Lily Yang
Abstract: A vehicle control system, including an in-vehicle bus and a plurality of electronic control units (ECUs) coupled to the in-vehicle bus, wherein at least one ECU of the plurality of ECUs is configured to: receive, at a respective at least one ECU of the plurality of ECUs, a message in a message stream on the in-vehicle bus; evaluate the message to determine at least one of a confidence value of the security classification, a significance value of the message, or a bounds check value of the message; and determine in real-time to allow or deny the message to the vehicle control system based on at least one of the significance value of the message, the bounds check value of the message, or the confidence value of the security classification of the message, to provide a sanitized message stream to the vehicle control system.
-
公开(公告)号:US10355891B2
公开(公告)日:2019-07-16
申请号:US15720389
申请日:2017-09-29
Applicant: Intel Corporation
Inventor: Marcio Juliato , Li Zhao , Ahmed Shabbir , Manoj R. Sastry , Santosh Ghosh , Rafael Misoczki
Abstract: Embodiments may include systems and methods for authenticating a message between a transmitter and a receiver. An apparatus for communication may include a transmitter to transmit a message to a receiver via a physical channel coupling the transmitter and the receiver. The message may be transmitted via a plurality of transmission voltage levels varied from a plurality of nominal voltage levels on the physical channel. The transmitter may include a voltage generator to generate the plurality of transmission voltage levels varied in accordance with a sequence of voltage variations from the plurality of nominal voltage levels for the message. The sequence of voltage variations may serve to authenticate the message between the transmitter and the receiver. Other embodiments may be described and/or claimed.
-
公开(公告)号:US20190158521A1
公开(公告)日:2019-05-23
申请号:US16235812
申请日:2018-12-28
Applicant: Intel Corporation
Inventor: Marcio Juliato , Liuyang Lily Yang , Manoj Sastry , Christopher Gutierrez , Shabbir Ahmed , Vuk Lesi
IPC: H04L29/06 , B60R16/023 , H04L29/08
Abstract: Methods, apparatus, systems and articles of manufacture are disclosed for anomaly detection and recovery. An apparatus to isolate a first controller in an autonomous vehicle includes a first controller to control a reference signal of the autonomous vehicle via a communication bus, a second controller to control the reference signal of the autonomous vehicle when the first controller is compromised, and a message neutralizer to neutralize messages transmitted by the first controller when the first controller is compromised, the neutralized messages to cause the first controller to become isolated from the communication bus.
-
74.
公开(公告)号:US20190039612A1
公开(公告)日:2019-02-07
申请号:US16145285
申请日:2018-09-28
Applicant: Intel Corporation
Inventor: Liuyang Lily Yang , Manoj R. Sastry , Xiruo Liu , Moreno Ambrosin , Shabbir Ahmed , Marcio Juliato , Christopher N. Gutierrez
IPC: B60W30/095 , B60W40/02 , G01S5/00
Abstract: In an automated method for providing driving assistance, an electronic control unit (ECU) of a first driving assistance system of a first vehicle receives local object information from at least one sensing component of the first driving assistance system. The first driving assistance system automatically detects external objects outside of the first vehicle, based on the local object information received from the at least one sensing component. The first driving assistance system also receives a reported object list (ROL) from a second vehicle, wherein the ROL describes objects detected by a second driving assistance system in the second vehicle. The first driving assistance system also affects operation of the first vehicle, based on (a) the external objects detected by the first vehicle and (b) the ROL from the second vehicle. Other embodiments are described and claimed.
-
公开(公告)号:US20250106207A1
公开(公告)日:2025-03-27
申请号:US18373160
申请日:2023-09-26
Applicant: Intel Corporation
Inventor: Marcio Juliato , Manoj Sastry , Christopher Gutierrez , Vuk Lesi , Shabbir Ahmed
IPC: H04L9/40
Abstract: Techniques to perform time recovery from attacks on delayed authentication in a time synchronized network are described. One embodiment comprises a method for decoding time information and a message authentication code (MAC) from a time message, the time information to synchronize a local clock for a device to a network time of a time synchronized network (TSN), and the MAC to authenticate the time message, determining whether the time message is authentic using the MAC, discarding the time information when the time message is not authentic, performing a bounded search to identify authentic time information using the MAC, and passing the authentic time information to a clock manager to synchronize the local clock to the network time of the TSN when the authentic time information is identified. Other embodiments are described and claimed.
-
公开(公告)号:US20250007802A1
公开(公告)日:2025-01-02
申请号:US18215936
申请日:2023-06-29
Applicant: Intel Corporation
Inventor: Marcio Juliato , Javier Perez-Ramirez , Mikhail Galeev , Manoj Sastry , Dave Cavalcanti , Christopher Gutierrez , Shabbir Ahmed , Vuk Lesi
IPC: H04L43/0817 , H04L9/40 , H04L43/067
Abstract: Techniques include a method, apparatus, system and computer-readable medium to detect, quantify and localize attacks to enhance security for time-synchronized networking. Embodiments include a diagnostic stream producer to produce diagnostic information providing evidence of a timing attack on a node of a time-synchronized network. Embodiments include a diagnostic stream consumer to consume diagnostic information, analyze the diagnostic information, and determine whether a node is under a timing attack. Other embodiments are described and claimed.
-
公开(公告)号:US12184668B2
公开(公告)日:2024-12-31
申请号:US17356033
申请日:2021-06-23
Applicant: Intel Corporation
Inventor: Marcio Juliato , Shabbir Ahmed , Christopher Gutierrez , Vuk Lesi , Manoj Sastry , Qian Wang
Abstract: Systems, apparatuses, and methods to identify bus-off and masquerade attacks against electronic control units (ECUs) transmitting on a communication bus from behind a gateway coupled to the communication bus are described. The disclosure further describes systems, apparatuses, and methods to mitigate against bus-off attacks made against an ECU coupled to a communication bus through a gateway. Other embodiments are described and claimed.
-
公开(公告)号:US12164627B2
公开(公告)日:2024-12-10
申请号:US17484689
申请日:2021-09-24
Applicant: Intel Corporation
Inventor: Shabbir Ahmed , Marcio Juliato , Vuk Lesi , Qian Wang , Manoj Sastry
Abstract: Systems, apparatuses, and methods to establish ground truth for an intrusion detection system in the presence of an attacker electronic control unit transmitting masqueraded messages on a communication bus, such as an in-vehicle network bus, are provided.
-
79.
公开(公告)号:US12141274B2
公开(公告)日:2024-11-12
申请号:US17834446
申请日:2022-06-07
Applicant: Intel Corporation
Inventor: Marcio Juliato , Shabbir Ahmed , Manoj Sastry , Liuyang L. Yang , Vuk Lesi , Li Zhao
IPC: H04L9/40 , G06F21/55 , H04W4/38 , H04W4/48 , H04W12/122
Abstract: Methods and apparatus relating to a physics-based approach for attack detection and/or localization in closed-loop controls for autonomous vehicles are described. In an embodiment, multiple state estimators are used to compute a set of residuals to detect, classify, and/or localize attacks. This allows for determination of an attacker's location and the kind of attack being perpetrated. Other embodiments are also disclosed and claimed.
-
公开(公告)号:US12120212B2
公开(公告)日:2024-10-15
申请号:US17706939
申请日:2022-03-29
Applicant: Intel Corporation
Inventor: Vuk Lesi , Christopher Gutierrez , Manoj Sastry , Christopher Hall , Marcio Juliato , Shabbir Ahmed , Qian Wang
CPC classification number: H04L7/0016 , H04J3/06 , H04J3/0673
Abstract: Time recovery techniques are described. A method comprises receiving messages from the first device by the second device in the first network domain, the messages to comprise time information to synchronize a first clock for the first device and a second clock for the second device to a network time, determining the second clock is to recover the network time for the second device without new messages from the first device, retrieving a first set of timestamps previously stored for events in the first network domain using the network time from the second clock, retrieving a second set of timestamps previously stored for the events in the first network domain using a redundant time from a third clock, where the third clock is not synchronized with the first and second clocks, and recovering the network time using a regression model and the redundant time from the third clock.
-
-
-
-
-
-
-
-
-