Method for runtime mitigation of software and firmware code weaknesses

    公开(公告)号:US11544383B2

    公开(公告)日:2023-01-03

    申请号:US16368113

    申请日:2019-03-28

    申请人: Red Bend Ltd.

    摘要: A system of mitigating code weaknesses in a target code by adding micro functionality fixes. The system includes a mitigation module installed a memory chip of a device and a server for identifying a plurality of code weaknesses in a target code installed in a memory chip of a device and sending configuration instructions to the mitigation module, the configuration instructions comprising: a plurality of micro functionality fixes, and a plurality of code weakness locations each associated with one of the plurality of code weaknesses and one of the plurality of micro functionality fixes. The execution of the mitigation module by at least one processor of the device induces an installment of the plurality of micro functionality fixes in the plurality of code weakness locations.

    Means and methods for regulating CAN communication

    公开(公告)号:US10992495B2

    公开(公告)日:2021-04-27

    申请号:US16697723

    申请日:2019-11-27

    申请人: Red Bend Ltd.

    摘要: Methods, systems, and devices manipulate operation of at least one electronic control unit (ECU) connected to a controller area network (CAN) bus. The at least one ECU includes at least one error counter, by counting errors associated with at least one ECU. The manipulating is based on generating and broadcasting via the CAN at least one bit stream destined to at least one ECU, thereby manipulating at least one ECU status, determined by the ECU error counter and querying for its status state.

    Security system for machine to machine cyber attack detection and prevention

    公开(公告)号:US10944765B2

    公开(公告)日:2021-03-09

    申请号:US15549365

    申请日:2015-02-08

    申请人: Red Bend Ltd.

    摘要: Apparatus, system and method useful for machine to machine (M2M) communication cyber-attack detection and prevention, are provided. An embedded security bridge (ESB), operatively connected to at least one proximal machine and at least one M2M module. The M2M module is in communication with at least one remote machine, and configured to enable communication between at least one remote machine and at least one proximal machine through the ESB. The ESB includes: one or more inspection units, configured for communication analysis for identifying communication and/or content suspicious as malicious, and, one or more decision units operatively connected to the inspection unit. The decision unit is configured to perform at least one action based on analysis of at least one inspection unit. The ESB is configured to detect by means of the inspection unit and prevent by means of the decision unit cyber-attacks on the proximal machine, the remote machine, or both.