-
公开(公告)号:US12099622B2
公开(公告)日:2024-09-24
申请号:US17553536
申请日:2021-12-16
Applicant: Cryptography Research, Inc.
Inventor: Mark Evan Marson , Michael Alexander Hamburg , Helena Handschuh
CPC classification number: G06F21/6218 , G06F21/14 , G06F21/6227 , G06N3/02 , G06N3/048 , G06V10/82
Abstract: Aspects of the present disclosure involve implementations that may be used to protect neural network models against adversarial attacks by obfuscating neural network operations and architecture. Obfuscation techniques include obfuscating weights and biases of neural network nodes, obfuscating activation functions used by neural networks, as well as obfuscating neural network architecture by introducing dummy operations, dummy nodes, and dummy layers into the neural networks.
-
公开(公告)号:US11996167B2
公开(公告)日:2024-05-28
申请号:US17636982
申请日:2020-08-14
Applicant: Cryptography Research, Inc.
Inventor: Scott C. Best , Mark Evan Marson , Joel Wittenauer
CPC classification number: G11C8/16 , G06F7/58 , G11C8/12 , G11C8/20 , G11C13/0035
Abstract: A random number generator selects addresses while a ‘scoreboard’ bank of registers (or bits) tracks which addresses have already been output (e.g., for storing or retrieval of a portion of the data.) When the scoreboard detects an address has already been output, a second address which has not been used yet is output rather than the randomly selected one. The second address may be selected from nearby addresses that have not already been output.
-
公开(公告)号:US20240056295A1
公开(公告)日:2024-02-15
申请号:US18229328
申请日:2023-08-02
Applicant: Cryptography Research, Inc.
Inventor: Mark Evan Marson , Thi Nguyen , Matthew Evan Orzen
Abstract: Aspects of the present disclosure involve a method, a system and a computer readable memory to perform a secure update of a target device, including communicating an update instruction to the target device, generating one or more data values using the update instruction, generating a first authentication value using the data value(s), receiving a second authentication value from the target device, wherein the second authentication value is generated by the target device in response to the update instruction, and determining whether the secure update has been successful based on a comparison of the first authentication value and the second authentication value.
-
公开(公告)号:US11329010B2
公开(公告)日:2022-05-10
申请号:US16838577
申请日:2020-04-02
Applicant: Cryptography Research, Inc
Inventor: Scott C. Best , Ming Li , Gary B. Bronner , Mark Evan Marson
IPC: H01L23/00
Abstract: An anti-tamper layer is applied to a blank wafer. The layered wafer is then diced into shield dies. A shield die is oxide-to-oxide bonded to the top of an active die such that removing the shield die will damage the active die. The shield die may be sized and positioned such that wirebond pads along one or more edges of the active die remain exposed. The exposed wirebond pads may be used to electrically connect, via wirebonds, the active die to a substrate. A second shield die may be attached to the bottom of the active die to help protect against the use of bottom-to-top delayering.
-
公开(公告)号:US20200007328A1
公开(公告)日:2020-01-02
申请号:US16445708
申请日:2019-06-19
Applicant: Cryptography Research, Inc.
Inventor: Ambuj Kumar , Mark Evan Marson , Daniel Robert Beitel
Abstract: A first entity may provide a request to transmit data from the first entity to a second entity. The first entity may receive a session key from the second entity in response to the request where the session key is encrypted by a second key that is based on a combination of a public key and a location associated with the second entity. A location associated with the first entity may be identified. Furthermore, a first key may be generated based on a combination of the location associated with the first entity and a private key that corresponds to the public key. The first key may decrypt data encrypted by the second key when the location associated with the first entity corresponds to the location associated with the second entity.
-
公开(公告)号:US09923719B2
公开(公告)日:2018-03-20
申请号:US14949254
申请日:2015-11-23
Applicant: Cryptography Research, Inc.
Inventor: Ambuj Kumar , Mark Evan Marson , Daniel Robert Beitel
CPC classification number: H04L9/3066 , G06F21/606 , G06F2221/2107 , G06F2221/2111 , H04L9/0872 , H04L9/3263 , H04L63/0442 , H04L63/107 , H04W4/046 , H04W4/40 , H04W12/02
Abstract: Encrypted data transmitted from a second entity to a first entity may be received. The encrypted data may be encrypted by a location based public key based on a public key and a location associated with the second entity. A location associated with the first entity may be identified. A location based private key may be generated based on a private key that corresponds to the public key and the location associated with the first entity. Furthermore, the encrypted data may be decrypted with the location based private key when the location associated with the first entity matches the location associated with the second entity.
-
公开(公告)号:US12056219B2
公开(公告)日:2024-08-06
申请号:US17553545
申请日:2021-12-16
Applicant: Cryptography Research, Inc.
Inventor: Mark Evan Marson , Michael Alexander Hamburg , Helena Handschuh
Abstract: Aspects of the present disclosure involve implementations that may be used to protect neural network models against adversarial attacks by obfuscating neural network operations and architecture. Obfuscation techniques include obfuscating weights and biases of neural network nodes, obfuscating activation functions used by neural networks, as well as obfuscating neural network architecture by introducing dummy operations, dummy nodes, and dummy layers into the neural networks.
-
8.
公开(公告)号:US12013751B2
公开(公告)日:2024-06-18
申请号:US16972560
申请日:2019-06-05
Applicant: Cryptography Research, Inc.
Inventor: Mark Evan Marson , Scott C. Best , Helena Handschuh , Winthrop John Wu
CPC classification number: G06F11/10 , H04L9/0866 , H04L9/3278
Abstract: A value corresponding to a physical variation of a device may be received. Furthermore, helper data associated with the physical variation of the device may be received. A result data may be generated based on a combination of the value corresponding to the physical variation of the device and the helper data. An error correction operation may be performed on the result data to identify one or more code words associated with the error correction operation. Subsequently, a target data may be generated based on the one or more code words.
-
公开(公告)号:US11863670B2
公开(公告)日:2024-01-02
申请号:US17601205
申请日:2020-04-04
Applicant: CRYPTOGRAPHY RESEARCH, INC.
Inventor: Mark Evan Marson , Michael Hutter , Bart Stevens
CPC classification number: H04L9/0891 , H04L9/003 , H04L9/16
Abstract: Disclosed are memory encryption systems and methods that rotate encryption keys for robust resistance against side-channel-analysis (SCA)-based attacks on communication paths between an encryption engine within a trust boundary and an external memory component. A key data structure has a plurality of keys that are used to encrypt a plurality of memory blocks in the external memory. The memory blocks encrypted with the oldest key of the key data structure are identified. Encrypted data is read from the identified memory blocks. The encrypted data is decrypted from the identified memory blocks. The data is then re-encrypted using the selected key that is newer than the oldest key, and re-written to the identified memory blocks.
-
公开(公告)号:US11789625B2
公开(公告)日:2023-10-17
申请号:US17876960
申请日:2022-07-29
Applicant: Cryptography Research, Inc.
Inventor: Benjamin Che-Ming Jun , William Craig Rawlings , Ambuj Kumar , Mark Evan Marson
CPC classification number: G06F3/0637 , G06F3/0622 , G06F3/0688 , G06F21/71 , G06F21/76 , G11C17/16 , G11C17/18
Abstract: A request associated with one or more privileges assigned to a first entity may be received. Each of the one or more privileges may correspond to an operation of an integrated circuit. Information corresponding to the first entity and stored in a memory that is associated with the integrated circuit may be identified. Furthermore, the memory may be programmed to modify the information stored in the memory that is associated with the integrated circuit in response to the request associated with the one or more privileges assigned to the first entity.
-
-
-
-
-
-
-
-
-