SYSTEMS AND METHODS FOR WHITEBOX DEVICE BINDING

    公开(公告)号:WO2021236446A1

    公开(公告)日:2021-11-25

    申请号:PCT/US2021/032475

    申请日:2021-05-14

    Abstract: A method is disclosed. The method includes receiving, by a user device, an encrypted message from a server computer. The encrypted message is a message encrypted with a master secret key or a key derived from the master secret key. The user device signs the encrypted message with a secure element private key. The user device, using a whitebox, cryptographically recovers a secure element public key from a certified key using a server computer public key. The certified key is certified by the server computer and based on at least the secure element public key. The user device, using the whitebox, cryptographically recovers the encrypted message from the signed encrypted message using the secure element public key. The user device, using the whitebox, decrypts the encrypted message using the master secret key or the key derived from the master secret key in the whitebox to obtain the message.

    MACHINE LEARNING WITH FEATURE OBFUSCATION
    4.
    发明申请

    公开(公告)号:WO2021034602A1

    公开(公告)日:2021-02-25

    申请号:PCT/US2020/046157

    申请日:2020-08-13

    Abstract: A system having multiple devices that can host different versions of an artificial neural network (ANN). In the system, inputs for the ANN can be obfuscated for centralized training of a master version of the ANN at a first computing device. A second computing device in the system includes memory that stores a local version of the ANN and user data for inputting into the local version. The second computing device includes a processor that extracts features from the user data and obfuscates the extracted features to generate obfuscated user data. The second device includes a transceiver that transmits the obfuscated user data. The first computing device includes a memory that stores the master version of the ANN, a transceiver that receives obfuscated user data transmitted from the second computing device, and a processor that trains the master version based on the received obfuscated user data using machine learning.

    SYSTEMS AND METHODS FOR MANAGING STATE
    5.
    发明申请

    公开(公告)号:WO2021021949A1

    公开(公告)日:2021-02-04

    申请号:PCT/US2020/044095

    申请日:2020-07-29

    Abstract: The disclosure relates to systems and methods for managing state using relatively small assistance from protected hardware. Obfuscated code segments may communicate with supporting protected hardware, store encrypted state values in main memory, and/or communicate via secure channels to secure platform hardware components. In various embodiments, consistent state may be achieved, at least in part, by computing secure tag information and storing the secure tag information in a secure and/or otherwise protected device register. Consistent with embodiments disclosed herein, the tag information may be used to derive keys used to encrypt and/or decrypt stored state information. Tag information may further be used in connection with verification operations prior to using the information to derive associated keys.

    A HYBRID SECURITY-ENABLED LOOKAHEAD MICROPROCESSOR BASED METHOD AND APPARATUS FOR SECURING COMPUTER SYSTEMS AND DATA

    公开(公告)号:WO2021011138A1

    公开(公告)日:2021-01-21

    申请号:PCT/US2020/037659

    申请日:2020-06-14

    Applicant: JUNG, Yong-Kyu

    Inventor: JUNG, Yong-Kyu

    Abstract: A hybrid security-enabled lookahead (SEL) microprocessor is invented for preventing unauthorized persons or computer systems from unauthorized usages of computer systems. The invention protects data generated by the hybrid SEL microprocessor-based computer systems from cyber-attacks without security software. The invention provides real-time protection and continuous detection regardless of unknown or known threats for any type of computer systems. The invention forbids Artificial Intelligence (AI) machines from utilizing malicious data created by attackers. Therefore, the AI machines are not evolved according to intentions of unauthorized devices or persons. The invention dynamically transforms an executable program into a security-enabled compatible program.

    PROCÉDÉ D'EXÉCUTION DE CODE SÉCURISÉ, DISPOSITIFS, SYSTÈME ET PROGRAMMES CORRESPONDANTS

    公开(公告)号:WO2020193583A1

    公开(公告)日:2020-10-01

    申请号:PCT/EP2020/058229

    申请日:2020-03-24

    Abstract: L'invention se rapporte à un procédé de contrôle de l'exécution d'une application AppO, procédé mis en œuvre au sein de l'application AppO, ladite application AppO s'exécutant sur un dispositif électronique, nommé dispositif d'exécution (B), ledit dispositif d'exécution (B) étant connecté à un dispositif appelant (A) par l'intermédiaire d'un réseau de communication, ledit procédé comprenant les étapes suivantes : - Réception (10) en provenance du dispositif appelant (A), d'une structure de données d'exécution (StrExec), comprenant au moins un d'enregistrement, chaque enregistrement comprenant au moins un champ de données comprenant un nom de fonction codé (CFN_x); - Sauvegarde (20), au sein d'une zone mémoire spécifique (MZone), de ladite structure de données d'exécution (StrExec); - Pour chaque enregistrement courant (CUEnr) de la structure de données d'exécution (StrExec) mise en œuvre (30) d'une fonction portant un nom de fonction décodé (UCFN_x) correspondant au nom de fonction codé (CFN_x), lorsque la fonction portant un nom de fonction décodé (UCFN_x) de l'application AppO peut être associée au nom de fonction codé (CFN_x).

    SYSTEMS, METHODS, AND STORAGE MEDIA FOR OBFUSCATING A COMPUTER PROGRAM BY REPRESENTING THE CONTROL FLOW OF THE COMPUTER PROGRAM AS DATA

    公开(公告)号:WO2020157590A1

    公开(公告)日:2020-08-06

    申请号:PCT/IB2020/050274

    申请日:2020-01-14

    Applicant: IRDETO B.V.

    Abstract: Systems, methods, and storage media for obfuscating a computer program by representing the control flow of the computer program as data that is not source code are disclosed. Exemplary implementations may: receive source code of a computer program; parse the source code; extract the control flow of the source code; represent at least a portion of the control flow as a control flow model using a mathematical modeling language; store the control flow model as control flow data that represents the control flow of the program and is not executable code; and remove the at least a portion of the control flow from the source code, to thereby obfuscate the control flow of the source code and render the source code more resistant to tampering.

    PROTECTED PROCESSING OF OPERATIONS
    9.
    发明申请

    公开(公告)号:WO2020126711A1

    公开(公告)日:2020-06-25

    申请号:PCT/EP2019/084533

    申请日:2019-12-11

    Abstract: A computer-implemented method of obfuscating a computer code comprises receiving (1201) an original computer program comprising a plurality of code blocks with computer instructions, the original computer program operable on input data within an input space, the original computer program operable to follow an execution path through the plurality of code blocks when receiving the input data, wherein the input space is segmented into at least one segment according to a segmentation, each segment comprising a subset of the input space containing inputs that correspond to a same execution path. A plurality of updated code blocks is included (1302) in the updated computer program. Selection code is operable 1303, during execution of the updated computer program, to select an updated code block of the plurality of updated code blocks in dependence on the input data. The selection code is included (1304) in the updated computer program.

    SOFTWARE TAMPER RESISTANCE
    10.
    发明申请

    公开(公告)号:WO2020043871A1

    公开(公告)日:2020-03-05

    申请号:PCT/EP2019/073187

    申请日:2019-08-30

    Abstract: The present disclosure relates to software tampering resistance. In one aspect, a method for generating protected code is provided, comprising identifying a primary function in code to be obscured, the primary function being a function used to verify the integrity of the code run-time. The method then comprises generating a finite state machine from the primary function, wherein a state of the finite state machine at a given instance defines an element of the primary function to be executed. The method then comprises distributing the finite state machine throughout the code to obscure one or more areas of the code.

Patent Agency Ranking