-
公开(公告)号:US20240249184A1
公开(公告)日:2024-07-25
申请号:US18156767
申请日:2023-01-19
申请人: NXP B.V.
IPC分类号: G06N20/00
CPC分类号: G06N20/00
摘要: A method is provided for detecting non-problem domain (NPD) data in a machine learning (ML) model. The method includes training the ML model using problem domain (PD) training data. A second fully connected layer is added to the trained ML model in parallel with a first fully connected layer in the trained ML model. The trained ML model is retrained with NPD training data while preventing weights in the ML model from changing except for weights of the second fully connected layer. An inference operation is performed with the retrained ML model. Output vectors are received from the first and second fully connected layers via a Softmax layer. A metric is computed using the output vectors. The metric is compared to a threshold metric to determine if input samples are PD or NPD. An indication is provided when NPD data is detected. In another embodiment, a ML model is provided.
-
公开(公告)号:US12032690B2
公开(公告)日:2024-07-09
申请号:US17810428
申请日:2022-07-01
申请人: NXP B.V.
CPC分类号: G06F21/554 , G06N3/08 , G06F2221/031
摘要: A method is provided for protecting a machine learning model from a side channel attack. A weighted sum vector having first and second elements is initialized. A weight vector for a connection between a node of a first layer and a node of a second layer is multiplied with an input vector to the node of the first layer. A first element of the weight vector includes a weight, and a first element of the input vector includes the input. A second element of the weight vector is a negation of the first element of the weight vector and the second element of the input vector equals the first element of the input vector. A multiplication result is added to the weighted sum vector to produce a computed weighted sum vector. An output vector including the computed weighted sum vector is provided to the node of the second layer.
-
公开(公告)号:US11687678B2
公开(公告)日:2023-06-27
申请号:US17081589
申请日:2020-10-27
申请人: NXP B.V.
发明人: Marcel Medwed , Tobias Schneider , Ventzislav Nikov , Jorge Miguel Ventuzelos Pereira , Rudi Verslegers , Nikita Veshchikov , Joppe Willem Bos , Jan Hoogerbrugge
CPC分类号: G06F21/74 , G06F21/606
摘要: A device and methods are described that comprise at least one host application and a rich execution environment. At least one interface is operably coupled to the REE for communicating with a remote server. A security sub-system comprises a security monitoring and control circuit coupled to the REE and connectable to the remote server via the REE and the at least one interface. The security monitoring and control circuit comprises an analytics circuit configured to detect an anomaly following a compromisation of the device. The security monitoring and control circuit is arranged to treat the REE as an untrusted component and in response to a detection of a compromisation of the REE or a component in the device that is accessible by the REE by the analytics circuit, the security monitoring and control circuit is configured to re-establish a secure connection to the remote server that tunnels through the REE and at least partially removes the compromisation from the device.
-
公开(公告)号:US20220215103A1
公开(公告)日:2022-07-07
申请号:US17143762
申请日:2021-01-07
申请人: NXP B.V.
IPC分类号: G06F21/60 , G06F12/1009
摘要: A data processing system has a processor and a system memory. The system memory may be a dynamic random-access memory (DRAM). The processor includes an embedded memory. The system memory is coupled to the processor and is organized in a plurality of pages. A portion of the code or data stored in the plurality of memory pages is selected for permutation. A permutation order is generated and the memory pages containing the portion of code or data is permuted using a permutation order. The permutation order and/or a reverse permutation order to recover the original order may be stored in the embedded memory. Permuting the memory pages with a permutation order stored in the embedded memory prevents the code or data from being read during a freeze attack on the system memory in a way that is useful to an attacker.
-
公开(公告)号:US11055202B1
公开(公告)日:2021-07-06
申请号:US16715656
申请日:2019-12-16
申请人: NXP B.V.
发明人: Jan Hoogerbrugge , Marcel Medwed
摘要: A system and method for accessing a tagged global variable in software, including: randomly generating tags for global variables in the software; tagging the global variables with the random tags; creating a pointer to each global variable with the random tags in unused bits of the pointer wherein the pointer points to the associated global variable; accessing one global variable indirectly using the tagged pointer; determining whether tag on the accessed global variable matches the tag on the accessed pointer; and indicating a fault when the tag on the accessed global variable does not match the tag on the accessed pointer.
-
公开(公告)号:US11023344B2
公开(公告)日:2021-06-01
申请号:US16659937
申请日:2019-10-22
申请人: NXP B.V.
发明人: Jan Hoogerbrugge
摘要: A data processing system includes a monitoring system, the monitoring system includes a processor and a data analysis block. The processor executes a monitoring application for monitoring an operation of a monitored system coupled to the monitoring system. When assistance is needed from the monitored system, the processor has an output coupled to the monitored system for providing an assistance request. When the assistance request is sent to the monitored system, the processor also sends a disturbance indication to the data analysis block. The disturbance indication indicates that the output data from the monitored system may be disturbed by the assistance request. The data analysis block can then take an action to reduce the effect the disturbance may have on the analysis results. A method for monitoring the monitored system is also provided.
-
公开(公告)号:US10389517B2
公开(公告)日:2019-08-20
申请号:US15194001
申请日:2016-06-27
申请人: NXP B.V.
摘要: A method for performing a secure function in a data processing system is provided. In accordance with one embodiment, the method includes generating and encoding an encryption key. The encoded encryption key may be encrypted in a key store in a trusted execution environment (TEE) of the data processing system. The encrypted encryption key may encrypted, stored, and decrypted in the key store in the TEE, but used in a white-box implementation to perform a secure function. The secure function may include encrypting a value in the white-box implementation for securing a monetary value on, for example, a smart card. In one embodiment, each time an encryption key or decryption key is used, it is changed to a new key. The method makes code lifting and rollback attacks more difficult for an attacker because the key is stored separately from, for example, a white-box implementation in secure storage.
-
8.
公开(公告)号:US10361855B2
公开(公告)日:2019-07-23
申请号:US15166925
申请日:2016-05-27
申请人: NXP B.V.
发明人: Joppe Willem Bos , Artur Tadeusz Burchard , Jan Hoogerbrugge , Wilhelmus Petrus Adrianus Johannus Michiels
摘要: A system includes a secure processor and an unsecure processor. The secure processor is configured to: split a secure scalar K into m2 random values ki, where i is an integer index; randomly select m1-m2 values ki for the indices m2
-
9.
公开(公告)号:US20170346633A1
公开(公告)日:2017-11-30
申请号:US15166925
申请日:2016-05-27
申请人: NXP B.V.
发明人: Joppe Willem Bos , Artur Tadeusz Burchard , Jan Hoogerbrugge , Wilhelmus Petrus Adrianus Johannus Michiels
CPC分类号: H04L9/3066 , G06F7/725 , G06F12/1433 , G06F2207/7242 , G06F2207/7252 , H04L9/002 , H04L2209/16 , H04L2209/46
摘要: A system for securely computing an elliptic curve scalar multiplication in an unsecured environment, including: a secure processor including secure memory, the secure processor configured to: split a secure scalar K into m2 random values ki, where i is an integer index; randomly select m1−m2 values ki for the indices m2
-
公开(公告)号:US20160328542A1
公开(公告)日:2016-11-10
申请号:US14815474
申请日:2015-07-31
申请人: NXP B.V.
发明人: Jan Hoogerbrugge , Wil Michiels , Pim Vullers
CPC分类号: G06F21/14 , G06F21/50 , G06F21/602 , G06F2221/0748 , H04L9/3066
摘要: A method of obscuring software code implementing an elliptic curve cryptography (ECC) point multiplication function, including: receiving ECC parameters including a multiplier d having N bits; transforming multiplier d into an array d(i) with −1, 0, and +1 values while maintaining the same value for d; and generating ECC point multiplication function operations using the transformed multiplier array d(i) and N, wherein the generated ECC point multiplication function operations are split variable operations.
摘要翻译: 一种模糊实施椭圆曲线密码术(ECC)点乘法函数的软件代码的方法,包括:接收包括具有N位的乘法器d的ECC参数; 将乘数d变换为具有-1,0和+1值的数组d(i),同时保持d相同的值; 以及使用变换乘法器阵列d(i)和N生成ECC点乘法函数运算,其中所生成的ECC点乘法函数运算是分割可变运算。
-
-
-
-
-
-
-
-
-