ANOMALY DETECTION IN A DATA PROCESSING SYSTEM

    公开(公告)号:US20210287110A1

    公开(公告)日:2021-09-16

    申请号:US16816346

    申请日:2020-03-12

    Applicant: NXP B.V.

    Inventor: JAN HOOGERBRUGGE

    Abstract: A data processing system and a method for detecting an anomaly in the data processing system are provided. The method includes receiving a plurality of program counter values from a processing core of the data processing system. Each of the plurality of program counter values corresponds to an instruction being executed in the data processing system. A histogram is constructed using the plurality of program counter values. The histogram is provided to a machine learning (ML) model and used for training the ML model. If training has already been accomplished, the histogram is provided during inference operation of the ML model. The ML model and the histogram are used to detect an anomaly in the data processing system. If an anomaly is detected, an indication of the anomaly may be provided.

    METHOD FOR DISTRIBUTING A SOFTWARE APPLICATION AND ENCRYPTION PROGRAM FOR A WHITE-BOX IMPLEMENTATION

    公开(公告)号:US20180351918A1

    公开(公告)日:2018-12-06

    申请号:US15614810

    申请日:2017-06-06

    Applicant: NXP B.V.

    CPC classification number: H04L9/002 G06F21/12 H04L2209/16

    Abstract: A method for distributing a software application having an encryption program is provided. In the method, the encryption program is generated for securing the software application, the encryption program being implemented by applying user diversification data that is unique to a user device having the encryption program and software application. The encryption program with the software application is distributed to a plurality of users without including the user diversification data. The user diversification data is made available for downloading from a computer server by each of the plurality of users. The user diversification data is downloaded separately from the encryption program, and the user diversification data is unique to, and generated specifically for, each of the plurality of users. This allows the distribution of application software without having to create a unique program for every user.

    PROTECTION AGAINST RELAY ATTACKS IN A WHITE-BOX IMPLEMENTATION

    公开(公告)号:US20180351743A1

    公开(公告)日:2018-12-06

    申请号:US15607730

    申请日:2017-05-30

    Applicant: NXP B.V.

    Abstract: A method is provided for performing a cryptographic operation in a white-box implementation on a mobile device. The cryptographic operation is performed in the mobile device for a response to a challenge from a mobile device reader. The mobile device reader includes a time-out period within which the cryptographic operation must be completed by the mobile device. In accordance with an embodiment, a first time period to complete the cryptographic operation on the mobile device is determined. A predetermined number of dummy computations are added to the cryptographic operation to increase the first time period to a second time period. The second time period is only slightly less than the time-out period by a predetermined safety value to make it less likely a relay attack with be successful.

    DATA PROCESSING SYSTEM HAVING A MONITORING SYSTEM AND METHOD FOR MONITORING

    公开(公告)号:US20210117301A1

    公开(公告)日:2021-04-22

    申请号:US16659937

    申请日:2019-10-22

    Applicant: NXP B.V.

    Inventor: JAN HOOGERBRUGGE

    Abstract: A data processing system includes a monitoring system, the monitoring system includes a processor and a data analysis block. The processor executes a monitoring application for monitoring an operation of a monitored system coupled to the monitoring system. When assistance is needed from the monitored system, the processor has an output coupled to the monitored system for providing an assistance request. When the assistance request is sent to the monitored system, the processor also sends a disturbance indication to the data analysis block. The disturbance indication indicates that the output data from the monitored system may be disturbed by the assistance request. The data analysis block can then take an action to reduce the effect the disturbance may have on the analysis results. A method for monitoring the monitored system is also provided.

Patent Agency Ranking