Serving data assets based on security policies by applying space-time optimized inline data transformations

    公开(公告)号:US11210410B2

    公开(公告)日:2021-12-28

    申请号:US16573326

    申请日:2019-09-17

    IPC分类号: G06F21/60 G06F21/62

    摘要: Serving data assets based on security policies is provided. A request to access an asset received from a user having a particular context is evaluated based on a set of asset access enforcement policies. An asset access policy enforcement decision is generated based on evaluating the request. It is determined whether the asset access policy enforcement decision is to transform particular data of the asset prior to allowing access. In response to determining that the asset access policy enforcement decision is to transform the particular data of the asset prior to allowing access, a transformation specification that includes an ordered subset of unit transformations for transforming the particular data of the asset is generated based on the particular context of the user and the set of asset access enforcement policies. A transformed asset is generated by applying the transformation specification to the asset transforming the particular data of the asset.

    Security risk-aware scheduling on container-based clouds

    公开(公告)号:US11921885B2

    公开(公告)日:2024-03-05

    申请号:US17340145

    申请日:2021-06-07

    摘要: A method, apparatus and computer program product for scheduling placement of containers in association with a set of hosts. The technique utilizes metrics that characterize container-specific risks. A first metric is a host interface risk for a container that quantifies how similar or dissimilar the container is relative to other containers running on a host. Preferably, host interface risk is derived with respect to a system call interface comprising a set of system calls, and the metric is based at least in part on a measure of dissimilarity among system calls. A second metric is a data sensitivity score that quantifies a degree to which sensitive data accesses are associated to the container. Based at least in part on the host interface risk scores and the data sensitivity scores, one or more containers are automatically scheduled for placement on the set of hosts to minimize security risk for the set of hosts.

    INACTIVATING BASIC BLOCKS OF PROGRAM CODE TO PREVENT CODE REUSE ATTACKS

    公开(公告)号:US20230069035A1

    公开(公告)日:2023-03-02

    申请号:US17411974

    申请日:2021-08-25

    IPC分类号: G06F21/56 G06F9/30

    摘要: An approach is provided that, after receiving a request to execute a computer program, determines an active set of metadata that corresponds to the requested computer program and then loads basic blocks of the requested computer program into memory. One of the loaded basic blocks is a starting block of the requested computer program. The memory also stores basic blocks corresponding to some previously loaded computer programs. The approach also inactivates basic blocks that are currently stored in the memory, with the inactivated basic blocks being identified based on a comparison of the active set of metadata to the sets of metadata that corresponding to the basic blocks of previously loaded computer programs. After inactivating some basic blocks, the approach executes the starting block of the requested computer program.

    Indirect Function Call Target Identification in Software

    公开(公告)号:US20230185568A1

    公开(公告)日:2023-06-15

    申请号:US17644021

    申请日:2021-12-13

    IPC分类号: G06F8/75 G06N3/08

    CPC分类号: G06F8/75 G06N3/08

    摘要: Indirect function call target identification in software is provided. A set of explicit data flows that pass a function address between software modules of a program is determined using an explicit data dependency analysis. A set of indirect function call targets is generated from results of the explicit data dependency analysis and a dynamic execution analysis of the program. The set of indirect function call targets is expanded by identifying similar target functions based on feature embeddings generated by a graph neural network.

    FEDERATED LEARNING WITH PARTITIONED AND DYNAMICALLY-SHUFFLED MODEL UPDATES

    公开(公告)号:US20220374763A1

    公开(公告)日:2022-11-24

    申请号:US17323099

    申请日:2021-05-18

    IPC分类号: G06N20/00

    摘要: Techniques for distributed federated learning leverage a multi-layered defense strategy to provide for reduced information leakage. In lieu of aggregating model updates centrally, an aggregation function is decentralized into multiple independent and functionally-equivalent execution entities, each running within its own trusted executed environment (TEE). The TEEs enable confidential and remote-attestable federated aggregation. Preferably, each aggregator entity runs within an encrypted virtual machine that support runtime in-memory encryption. Each party remotely authenticates the TEE before participating in the training. By using multiple decentralized aggregators, parties are enabled to partition their respective model updates at model-parameter granularity, and can map single weights to a specific aggregator entity. Parties also can dynamically shuffle fragmentary model updates at each training iteration to further obfuscate the information dispatched to each aggregator execution entity. This architectural prevents the aggregator from being a single point-of-failure, and serves to protect the model even if all aggregators are compromised.

    SECURITY RISK-AWARE SCHEDULING ON CONTAINER-BASED CLOUDS

    公开(公告)号:US20220391532A1

    公开(公告)日:2022-12-08

    申请号:US17340145

    申请日:2021-06-07

    摘要: A method, apparatus and computer program product for scheduling placement of containers in association with a set of hosts. The technique utilizes metrics that characterize container-specific risks. A first metric is a host interface risk for a container that quantifies how similar or dissimilar the container is relative to other containers running on a host. Preferably, host interface risk is derived with respect to a system call interface comprising a set of system calls, and the metric is based at least in part on a measure of dissimilarity among system calls. A second metric is a data sensitivity score that quantifies a degree to which sensitive data accesses are associated to the container. Based at least in part on the host interface risk scores and the data sensitivity scores, one or more containers are automatically scheduled for placement on the set of hosts to minimize security risk for the set of hosts.

    TRUSTED AND DECENTRALIZED AGGREGATION FOR FEDERATED LEARNING

    公开(公告)号:US20220374762A1

    公开(公告)日:2022-11-24

    申请号:US17323006

    申请日:2021-05-18

    IPC分类号: G06N20/00 G06N5/04

    摘要: Techniques for distributed federated learning leverage a multi-layered defense strategy to provide for reduced information leakage. In lieu of aggregating model updates centrally, an aggregation function is decentralized into multiple independent and functionally-equivalent execution entities, each running within its own trusted executed environment (TEE). The TEEs enable confidential and remote-attestable federated aggregation. Preferably, each aggregator entity runs within an encrypted virtual machine that support runtime in-memory encryption. Each party remotely authenticates the TEE before participating in the training. By using multiple decentralized aggregators, parties are enabled to partition their respective model updates at model-parameter granularity, and can map single weights to a specific aggregator entity. Parties also can dynamically shuffle fragmentary model updates at each training iteration to further obfuscate the information dispatched to each aggregator execution entity. This architectural prevents the aggregator from being a single point-of-failure, and serves to protect the model even if all aggregators are compromised.