-
公开(公告)号:US12111908B2
公开(公告)日:2024-10-08
申请号:US18215924
申请日:2023-06-29
Applicant: Intel Corporation
Inventor: Eduardo Alban , Shabbir Ahmed , Marcio Juliato , Christopher Gutierrez , Qian Wang , Vuk Lesi , Manoj Sastry
CPC classification number: G06F21/44 , G06F13/20 , G06F21/85 , H04L12/40 , H04L2012/40215 , H04L2012/40273
Abstract: Systems, apparatuses, and methods to identify an electronic control unit transmitting a message on a communication bus, such as an in-vehicle network bus, are provided. ECUs transmit messages by manipulating voltage on conductive lines of the bus. Observation circuitry can observe voltage signals associated with the transmission at a point on the in-vehicle network bus. A distribution can be generated from densities of the voltage signals. ECUs can be identified and/or fingerprinted based on the distributions.
-
2.
公开(公告)号:US20220350888A1
公开(公告)日:2022-11-03
申请号:US17867780
申请日:2022-07-19
Applicant: INTEL CORPORATION
Inventor: Christopher N. Gutierrez , Marcio Juliato , Shabbir Ahmed , Qian Wang , Manoj Sastry , Liuyang L. Yang , Xiruo Liu
IPC: G06F21/56
Abstract: Logic may implement observation layer intrusion detection systems (IDSs) to combine observations by intrusion detectors and/or other intrusion detection systems. Logic may monitor one or more control units at one or more observation layers of an in-vehicle network, each of the one or more control units to perform a vehicle function. Logic may combine observations of the one or more control units at the one or more observation layers. Logic may determine, based on a combination of the observations, that one or more of the observations represent an intrusion. Logic may determine, based at least on the observations, characteristics of an attack, and to pass the characteristics of the attack information to a forensic logging system to log the attack or pass the characteristics of the attack to a recovery system for informed selection of recovery procedures. Logic may dynamically adjust a threshold for detection of suspicious activity.
-
公开(公告)号:US20220224701A1
公开(公告)日:2022-07-14
申请号:US17706955
申请日:2022-03-29
Applicant: Intel Corporation
Inventor: Christopher Gutierrez , Vuk Lesi , Manoj Sastry , Christopher Hall , Marcio Juliato , Shabbir Ahmed , Qian Wang
Abstract: Techniques to secure a time sensitive network are described. An apparatus may establish a data stream between a first device and a second device in a network domain, the network domain includes a plurality of switching nodes, receive messages from the first device by the second device in the network domain, the messages to comprise time information to synchronize a first clock for the first device and a second clock for the second device to a network time for the network domain, update a correction field for a received message with a residence time and time delay value by the second device, determine whether the updated message is benign or malicious, update the correction field for the updated message with an inference time when the updated message is benign, and prevent relay of the updated message to other devices in the network domain when the updated message is malicious.
-
公开(公告)号:US20220014540A1
公开(公告)日:2022-01-13
申请号:US17484197
申请日:2021-09-24
Applicant: Intel Corporation
Inventor: Marcio Juliato , Javier Perez-Ramirez , Vuk Lesi , Dave Cavalcanti , Manoj Sastry , Christopher Gutierrez , Qian Wang , Shabbir Ahmed
IPC: H04L29/06
Abstract: Systems, apparatuses and methods may provide for technology that detects one or more non-compliant nodes with respect to a timing schedule, detects one or more compliant nodes with respect to the timing schedule, and identifies a malicious node based on positions of the one or more non-compliant nodes and the one or more compliant nodes in a network topography. The non-compliant node(s) and the compliant node(s) may be detected based on post-synchronization messages, historical attribute data and/or plane diversity data.
-
5.
公开(公告)号:US20210026955A1
公开(公告)日:2021-01-28
申请号:US17031140
申请日:2020-09-24
Applicant: Intel Corporation
Inventor: Marcio Juliato , Manoj Sastry , Shabbir Ahmed , Christopher Gutierrez , Qian Wang , Vuk Lesi
Abstract: A platform comprising numerous reconfigurable circuit components arranged to operate as primary and redundant circuits is provided. The platform further comprises security circuitry arranged to monitor the primary circuit for anomalies and reconfigurable circuit arranged to disconnect the primary circuit from a bus responsive to detection of an anomaly. Furthermore, the present disclosure provides for the quarantine, refurbishment and designation as redundant, the anomalous circuit.
-
公开(公告)号:US12301599B2
公开(公告)日:2025-05-13
申请号:US17484197
申请日:2021-09-24
Applicant: Intel Corporation
Inventor: Marcio Juliato , Javier Perez-Ramirez , Vuk Lesi , Dave Cavalcanti , Manoj Sastry , Christopher Gutierrez , Qian Wang , Shabbir Ahmed
IPC: H04L9/40
Abstract: Systems, apparatuses and methods may provide for technology that detects one or more non-compliant nodes with respect to a timing schedule, detects one or more compliant nodes with respect to the timing schedule, and identifies a malicious node based on positions of the one or more non-compliant nodes and the one or more compliant nodes in a network topography. The non-compliant node(s) and the compliant node(s) may be detected based on post-synchronization messages, historical attribute data and/or plane diversity data.
-
公开(公告)号:US12205065B2
公开(公告)日:2025-01-21
申请号:US16994089
申请日:2020-08-14
Applicant: Intel Corporation
Inventor: Christopher Gutierrez , Marcio Juliato , Qian Wang , Shabbir Ahmed , Vuk Lesi , Manoj Sastry
IPC: G06Q10/0833 , G08G1/00 , H04L9/08 , H04L9/32
Abstract: Systems, apparatuses, and methods to attest to and verify the integrity of cargo during transport by an autonomous vehicle are provided. An autonomous vehicle can discretize parameters associated with transportation of cargo and can generate a keyed hash digest from the discretized parameters. The keyed hash digest can be sent to a stakeholder in the transportation of the cargo to attest to the integrity of the cargo during transport.
-
公开(公告)号:US12148061B2
公开(公告)日:2024-11-19
申请号:US17133076
申请日:2020-12-23
Applicant: Intel Corporation
Inventor: Vuk Lesi , Qian Wang , Christopher Gutierrez , Marcio Rogerio Juliato , Shabbir Ahmed , Manoj R. Sastry
IPC: G06Q50/47
Abstract: Systems and techniques for malicious request detection in automated resource dispatch are described herein. A request for a resource may be received from a user device. A location may be obtained for delivery of the resource. Sensor data may be retrieved for the location. The sensor data and user profile data may be evaluated to determine if the request is malicious. A disincentivizing message may be generated based on the determination that the request is malicious. In response to receipt of a response to the disincentivizing message, a resource may be dispatched to the location.
-
公开(公告)号:US12095782B2
公开(公告)日:2024-09-17
申请号:US17706955
申请日:2022-03-29
Applicant: Intel Corporation
Inventor: Christopher Gutierrez , Vuk Lesi , Manoj Sastry , Christopher Hall , Marcio Juliato , Shabbir Ahmed , Qian Wang
CPC classification number: H04L63/1416 , H04J3/0667 , H04L63/145 , H04L63/1475
Abstract: Techniques to secure a time sensitive network are described. An apparatus may establish a data stream between a first device and a second device in a network domain, the network domain includes a plurality of switching nodes, receive messages from the first device by the second device in the network domain, the messages to comprise time information to synchronize a first clock for the first device and a second clock for the second device to a network time for the network domain, update a correction field for a received message with a residence time and time delay value by the second device, determine whether the updated message is benign or malicious, update the correction field for the updated message with an inference time when the updated message is benign, and prevent relay of the updated message to other devices in the network domain when the updated message is malicious.
-
公开(公告)号:US11966503B2
公开(公告)日:2024-04-23
申请号:US17484627
申请日:2021-09-24
Applicant: Intel Corporation
Inventor: Marcio Juliato , Vuk Lesi , Christopher Gutierrez , Shabbir Ahmed , Qian Wang , Manoj Sastry
CPC classification number: G06F21/755 , G06F21/51 , G06F21/554 , G06F21/81 , H04L12/40013 , H04L2012/40215 , H04L2012/40267 , H04L2012/40273 , H04L63/1416
Abstract: Systems, apparatuses, and methods to mitigate effects of glitch attacks on a broadcast communication bus are provided. The voltage levels of the communication bus are repeatedly sampled to identify glitch attacks. The voltage level on the communication bus can be overdriven or overwritten to either corrupt received messages or correct received messages.
-
-
-
-
-
-
-
-
-