BR112018069821A2 - sistemas adaptativos e procedimentos para defender um processador contra os ataques de falhas transitórias - Google Patents
sistemas adaptativos e procedimentos para defender um processador contra os ataques de falhas transitóriasInfo
- Publication number
- BR112018069821A2 BR112018069821A2 BR112018069821A BR112018069821A BR112018069821A2 BR 112018069821 A2 BR112018069821 A2 BR 112018069821A2 BR 112018069821 A BR112018069821 A BR 112018069821A BR 112018069821 A BR112018069821 A BR 112018069821A BR 112018069821 A2 BR112018069821 A2 BR 112018069821A2
- Authority
- BR
- Brazil
- Prior art keywords
- processor
- response
- detection system
- attack
- faults
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/75—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09C—CIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
- G09C1/00—Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
- H04L9/004—Countermeasures against attacks on cryptographic mechanisms for fault attacks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Mathematical Physics (AREA)
- Signal Processing (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Health & Medical Sciences (AREA)
- Debugging And Monitoring (AREA)
- Computer And Data Communications (AREA)
- Telephone Function (AREA)
- Microcomputers (AREA)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US15/089,379 US10380341B2 (en) | 2016-04-01 | 2016-04-01 | Adaptive systems and procedures for defending a processor against transient fault attacks |
| PCT/US2017/021455 WO2017172318A1 (en) | 2016-04-01 | 2017-03-08 | Adaptive systems and procedures for defending a processor against transient fault attacks |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| BR112018069821A2 true BR112018069821A2 (pt) | 2019-01-29 |
Family
ID=58398277
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| BR112018069821A BR112018069821A2 (pt) | 2016-04-01 | 2017-03-08 | sistemas adaptativos e procedimentos para defender um processador contra os ataques de falhas transitórias |
Country Status (7)
| Country | Link |
|---|---|
| US (1) | US10380341B2 (enExample) |
| EP (1) | EP3437010A1 (enExample) |
| JP (1) | JP2019510318A (enExample) |
| KR (1) | KR20180132067A (enExample) |
| CN (1) | CN108885663B (enExample) |
| BR (1) | BR112018069821A2 (enExample) |
| WO (1) | WO2017172318A1 (enExample) |
Families Citing this family (12)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10019280B2 (en) * | 2016-03-25 | 2018-07-10 | Intel Corporation | Technologies for dynamically managing data bus bandwidth usage of virtual machines in a network device |
| US10726122B2 (en) * | 2017-07-03 | 2020-07-28 | Nxp B.V. | Automatic reset filter deactivation during critical security processes |
| FR3070076B1 (fr) * | 2017-08-09 | 2019-08-09 | Idemia Identity And Security | Procede de protection d'un dispositif electronique contre des attaques par injection de faute |
| JP6993365B2 (ja) * | 2018-03-09 | 2022-01-13 | 株式会社メガチップス | 情報処理システム、情報処理装置、及び情報処理装置の制御方法 |
| CN109544868B (zh) * | 2018-09-28 | 2021-04-27 | 广州智伴人工智能科技有限公司 | 一种自动报警提醒系统 |
| KR102792178B1 (ko) | 2018-10-10 | 2025-04-08 | 삼성전자주식회사 | 전자 장치 및 이의 제어 방법 |
| US11366898B2 (en) * | 2019-11-18 | 2022-06-21 | Silicon Laboratories Inc. | Integrated circuit with electromagnetic fault injection protection |
| US11321458B2 (en) * | 2020-01-28 | 2022-05-03 | Nuvoton Technology Corporation | Secure IC with soft security countermeasures |
| CN111447106B (zh) * | 2020-03-18 | 2022-05-03 | 深圳市普威技术有限公司 | 一种故障检测方法、装置、存储介质及通信设备 |
| TWI755771B (zh) * | 2020-06-24 | 2022-02-21 | 新唐科技股份有限公司 | 處理電路及處理方法 |
| TWI812042B (zh) * | 2021-03-30 | 2023-08-11 | 新唐科技股份有限公司 | 安全系統 |
| TWI830443B (zh) * | 2022-10-18 | 2024-01-21 | 新唐科技股份有限公司 | 針對攻擊進行處置的安全處理裝置、方法與電子設備 |
Family Cites Families (20)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7743262B2 (en) * | 1997-07-15 | 2010-06-22 | Silverbrook Research Pty Ltd | Integrated circuit incorporating protection from power supply attacks |
| US6965673B1 (en) * | 1997-09-19 | 2005-11-15 | Telcordia Technologies, Inc. | Method of using transient faults to verify the security of a cryptosystem |
| US6144739A (en) * | 1998-01-20 | 2000-11-07 | Motorola, Inc. | Computer network protection using cryptographic sealing software agents and objects |
| AU5203899A (en) | 1998-06-03 | 1999-12-20 | Cryptography Research, Inc. | Using unpredictable information to minimize leakage from smartcards and other cryptosystems |
| US6816968B1 (en) * | 1998-07-10 | 2004-11-09 | Silverbrook Research Pty Ltd | Consumable authentication protocol and system |
| US7827223B2 (en) * | 2004-04-22 | 2010-11-02 | Fortress Gb Ltd. | Accelerated throughput synchronized word stream cipher, message authenticator and zero-knowledge output random number generator |
| KR20070083760A (ko) * | 2004-10-25 | 2007-08-24 | 로베르트 보쉬 게엠베하 | 적어도 2개의 실행 유닛을 구비한 컴퓨터 시스템에서전환을 위한 방법 및 장치 |
| US7570205B2 (en) * | 2005-07-29 | 2009-08-04 | Honeywell International Inc. | Automatic detection of GPS SA base value for HFOM |
| US7689866B2 (en) * | 2006-10-18 | 2010-03-30 | Alcatel-Lucent Usa Inc. | Method and apparatus for injecting transient hardware faults for software testing |
| CN101334744B (zh) * | 2007-12-27 | 2012-05-23 | 华为技术有限公司 | 一种检测多处理器系统故障的方法、系统和装置 |
| US7849387B2 (en) * | 2008-04-23 | 2010-12-07 | Intel Corporation | Detecting architectural vulnerability of processor resources |
| EP2466506A1 (fr) * | 2010-12-17 | 2012-06-20 | Gemalto SA | Procédé dynamique de contrôle de l'intégrité de l'exécution d'un code exécutable |
| US8810216B2 (en) * | 2011-06-30 | 2014-08-19 | Advanced Analogic Technologies Incorporated | Current sink with low side voltage regulation |
| US8732523B2 (en) * | 2011-10-24 | 2014-05-20 | Arm Limited | Data processing apparatus and method for analysing transient faults occurring within storage elements of the data processing apparatus |
| US9571289B2 (en) * | 2012-11-12 | 2017-02-14 | Cryptography Research, Inc. | Methods and systems for glitch-resistant cryptographic signing |
| US8848429B2 (en) * | 2013-02-14 | 2014-09-30 | Qualcomm Incorporated | Latch-based array with robust design-for-test (DFT) features |
| US8619445B1 (en) * | 2013-03-15 | 2013-12-31 | Arctic Sand Technologies, Inc. | Protection of switched capacitor power converter |
| FR3012637B1 (fr) | 2013-10-28 | 2015-12-25 | Commissariat Energie Atomique | Procede et dispositif de detection d'attaque d'une source d'entropie |
| EP2942732A1 (en) | 2014-05-07 | 2015-11-11 | Gemalto SA | Dynamic change of security configurations |
| US9661015B2 (en) | 2014-05-23 | 2017-05-23 | Nxp B.V. | Randomizing countermeasures for fault attacks |
-
2016
- 2016-04-01 US US15/089,379 patent/US10380341B2/en active Active
-
2017
- 2017-03-08 JP JP2018550438A patent/JP2019510318A/ja active Pending
- 2017-03-08 EP EP17712905.3A patent/EP3437010A1/en not_active Withdrawn
- 2017-03-08 WO PCT/US2017/021455 patent/WO2017172318A1/en not_active Ceased
- 2017-03-08 BR BR112018069821A patent/BR112018069821A2/pt not_active IP Right Cessation
- 2017-03-08 CN CN201780019255.4A patent/CN108885663B/zh active Active
- 2017-03-08 KR KR1020187028234A patent/KR20180132067A/ko not_active Ceased
Also Published As
| Publication number | Publication date |
|---|---|
| US10380341B2 (en) | 2019-08-13 |
| CN108885663A (zh) | 2018-11-23 |
| JP2019510318A (ja) | 2019-04-11 |
| CN108885663B (zh) | 2021-11-26 |
| WO2017172318A1 (en) | 2017-10-05 |
| US20170286680A1 (en) | 2017-10-05 |
| KR20180132067A (ko) | 2018-12-11 |
| EP3437010A1 (en) | 2019-02-06 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| BR112018069821A2 (pt) | sistemas adaptativos e procedimentos para defender um processador contra os ataques de falhas transitórias | |
| BR112018067735A2 (pt) | sistema de segurança de elevador, sistema de elevador, e, método para operar um sistema de elevador. | |
| BR112014030580A2 (pt) | sistemas de supressão de incêndio, dispositivos e métodos | |
| BR112017028077A2 (pt) | método combinado para detectar anomalias em um sistema de distribuição de água | |
| WO2018107048A3 (en) | Prevention of malicious automation attacks on a web service | |
| BR112012016773A2 (pt) | "sistema de controle para um sistema de segurança que inclui uma pluralidade de sensores, sistema de segurança,e, método para monitorar uma localização." | |
| BR112017017490A2 (pt) | ?sistemas de controle de bop e métodos relacionados? | |
| BR112017005622A2 (pt) | detecção e remediação de anomalia de pressão de centro de dados | |
| BR112018003579A2 (pt) | sistema e método de detecção | |
| MX387575B (es) | Métodos y sistemas para generar automaticamente una acción correctiva en una instalación industrial. | |
| BR112016014491A2 (pt) | Dispositivo e método de controle, e, programa de computador | |
| BR112016014763A2 (pt) | Sistema e métodos controlados para proteção de armazenamentos contra incêndios | |
| BR112015007133A2 (pt) | sistemas e métodos para administração em tempo real de fluido de perfuração | |
| WO2015036517A3 (en) | Triggering an action in a computer device | |
| BR112016027464A8 (pt) | aparelho de rede, e método de rede | |
| WO2014021919A3 (en) | Methods, systems, and computer readable medium for active monitoring, memory protection and integrity verification of target devices | |
| JP2016149131A5 (enExample) | ||
| WO2016085883A3 (en) | Call stack integrity check on client/server systems | |
| BR102012009708B8 (pt) | Aparelho e método para fornecer detecção e controle automáticos | |
| BR112016025340A2 (pt) | configurar fluxos de trabalho em um dispositivo host que operam em um sistema de controle do processo | |
| BR112018000463A2 (pt) | uso de capacitância para detectar pressão de toque | |
| BR112017027587A2 (pt) | arranjo de controle para um cruzamento de nível de ferrovia | |
| GB2500509A (en) | Slug countermeasure systems and methods | |
| BR112018002469A2 (pt) | látex de água em óleo, métodos para formar um látex invertível e para recuperar compostos de hidrocarboneto, e, uso de um látex. | |
| Emeribeole | Managing Flood Disaster in Nigerian Cities: Issues and Strategies Toward Meetingthe Challenges in the Modern World–a Case Study of Owerri Metropolis Imo State, Nigeria |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| B350 | Update of information on the portal [chapter 15.35 patent gazette] | ||
| B08F | Application dismissed because of non-payment of annual fees [chapter 8.6 patent gazette] |
Free format text: REFERENTE A 5A ANUIDADE. |
|
| B08K | Patent lapsed as no evidence of payment of the annual fee has been furnished to inpi [chapter 8.11 patent gazette] |
Free format text: EM VIRTUDE DO ARQUIVAMENTO PUBLICADO NA RPI 2661 DE 04-01-2022 E CONSIDERANDO AUSENCIA DE MANIFESTACAO DENTRO DOS PRAZOS LEGAIS, INFORMO QUE CABE SER MANTIDO O ARQUIVAMENTO DO PEDIDO DE PATENTE, CONFORME O DISPOSTO NO ARTIGO 12, DA RESOLUCAO 113/2013. |