-
公开(公告)号:US20210287110A1
公开(公告)日:2021-09-16
申请号:US16816346
申请日:2020-03-12
Applicant: NXP B.V.
Inventor: JAN HOOGERBRUGGE
Abstract: A data processing system and a method for detecting an anomaly in the data processing system are provided. The method includes receiving a plurality of program counter values from a processing core of the data processing system. Each of the plurality of program counter values corresponds to an instruction being executed in the data processing system. A histogram is constructed using the plurality of program counter values. The histogram is provided to a machine learning (ML) model and used for training the ML model. If training has already been accomplished, the histogram is provided during inference operation of the ML model. The ML model and the histogram are used to detect an anomaly in the data processing system. If an anomaly is detected, an indication of the anomaly may be provided.
-
2.
公开(公告)号:US20180351918A1
公开(公告)日:2018-12-06
申请号:US15614810
申请日:2017-06-06
Applicant: NXP B.V.
CPC classification number: H04L9/002 , G06F21/12 , H04L2209/16
Abstract: A method for distributing a software application having an encryption program is provided. In the method, the encryption program is generated for securing the software application, the encryption program being implemented by applying user diversification data that is unique to a user device having the encryption program and software application. The encryption program with the software application is distributed to a plurality of users without including the user diversification data. The user diversification data is made available for downloading from a computer server by each of the plurality of users. The user diversification data is downloaded separately from the encryption program, and the user diversification data is unique to, and generated specifically for, each of the plurality of users. This allows the distribution of application software without having to create a unique program for every user.
-
公开(公告)号:US20180351743A1
公开(公告)日:2018-12-06
申请号:US15607730
申请日:2017-05-30
Applicant: NXP B.V.
Abstract: A method is provided for performing a cryptographic operation in a white-box implementation on a mobile device. The cryptographic operation is performed in the mobile device for a response to a challenge from a mobile device reader. The mobile device reader includes a time-out period within which the cryptographic operation must be completed by the mobile device. In accordance with an embodiment, a first time period to complete the cryptographic operation on the mobile device is determined. A predetermined number of dummy computations are added to the cryptographic operation to increase the first time period to a second time period. The second time period is only slightly less than the time-out period by a predetermined safety value to make it less likely a relay attack with be successful.
-
公开(公告)号:US20210117301A1
公开(公告)日:2021-04-22
申请号:US16659937
申请日:2019-10-22
Applicant: NXP B.V.
Inventor: JAN HOOGERBRUGGE
Abstract: A data processing system includes a monitoring system, the monitoring system includes a processor and a data analysis block. The processor executes a monitoring application for monitoring an operation of a monitored system coupled to the monitoring system. When assistance is needed from the monitored system, the processor has an output coupled to the monitored system for providing an assistance request. When the assistance request is sent to the monitored system, the processor also sends a disturbance indication to the data analysis block. The disturbance indication indicates that the output data from the monitored system may be disturbed by the assistance request. The data analysis block can then take an action to reduce the effect the disturbance may have on the analysis results. A method for monitoring the monitored system is also provided.
-
公开(公告)号:US20180276392A1
公开(公告)日:2018-09-27
申请号:US15464711
申请日:2017-03-21
Applicant: NXP B.V.
IPC: G06F21/60 , G06F12/0891
CPC classification number: G06F21/602 , G06F12/0891 , G06F12/1408 , G06F21/64 , G06F21/74 , G06F21/79 , G06F2212/1021 , G06F2212/1052 , G06F2212/402 , G06F2212/60 , H04L9/0643 , H04L9/0897 , H04L9/3236
Abstract: A data processing system having rich execution environment (REE) and a trusted execution environment (TEE) is provided. In the data processing system, an unsecure memory is coupled to the REE and used for storing encrypted data for use in the TEE. The TEE may have a cache for storing the encrypted data after it is decrypted. The data in both the memory and the cache is organized in blocks, and the cache is smaller than the memory. An interpreter is provided in the TEE, along with a service block in the REE, for fetching and decrypting the data to be stored in the cache. The interpreter checks an integrity of the decrypted data using a hash tree having multiple levels. In the event of a cache miss, all blocks of the hash tree in a path from the data block to a root block are retrieved from the memory in one access operation. A method for operating the cache in the data processing system is also provided.
-
-
-
-