-
公开(公告)号:US11132875B1
公开(公告)日:2021-09-28
申请号:US16891938
申请日:2020-06-03
Applicant: Oracle International Corporation
Inventor: Guang C. Wang , William A. Wimsatt , Andrew J. Lewis , Michael H. S. Dayringer , Kenny C. Gross
Abstract: A system is provided that detects a card skimmer in a target system, wherein the card skimmer surreptitiously gathers credit/debit card information during operation of the target system. This system first gathers target electromagnetic interference (EMI) signals by monitoring EMI signals generated by the target system through an external scanner with a directional antenna. Next, the system generates a target EMI fingerprint from the target EMI signals. The system then compares the target EMI fingerprint against a reference EMI fingerprint for the target system to determine whether the target system contains a card skimmer.
-
公开(公告)号:US20210081573A1
公开(公告)日:2021-03-18
申请号:US16572439
申请日:2019-09-16
Applicant: Oracle International Corporation
Inventor: Kenny C. Gross , Guang C. Wang , Michael H.S. Dayringer , Andrew J. Lewis
Abstract: The disclosed embodiments provide a system that generates a reference EMI fingerprint to be used in detecting unwanted electronic components in a target asset. During operation, the system gathers reference EMI signals generated by a reference asset while the reference asset is executing a periodic workload, wherein the reference asset is of the same type as the target asset and is certified not to contain unwanted electronic components. Next, the system divides the reference EMI signals into a set of profiles, which comprise EMI signals for non-overlapping time intervals of a fixed size. The system then temporally aligns and merges profiles in the set of profiles to produce a reference profile. Next, the system generates the reference EMI fingerprint from the reference profile. Finally, the system compares a target EMI fingerprint for the target asset against the reference EMI fingerprint to determine whether the target asset contains unwanted electronic components.
-
公开(公告)号:US20210011990A1
公开(公告)日:2021-01-14
申请号:US16506803
申请日:2019-07-09
Applicant: Oracle International Corporation
Inventor: Kenny C. Gross , Michael H. S. Dayringer , Andrew J. Lewis , Guang C. Wang
Abstract: The disclosed embodiments provide a system that detects unwanted electronic components in a target asset. During operation, the system generates a sinusoidal load for the target asset. Next, the system obtains target electromagnetic interference (EMI) signals by monitoring EMI signals generated by the target asset while the target asset is executing the sinusoidal load. The system then generates a target EMI fingerprint from the target EMI signals. Finally, the system compares the target EMI fingerprint against a reference EMI fingerprint for the target asset to determine whether the target asset contains unwanted electronic components.
-
公开(公告)号:US10685226B1
公开(公告)日:2020-06-16
申请号:US16292623
申请日:2019-03-05
Applicant: Oracle International Corporation
Inventor: Kenny C. Gross , Andrew J. Lewis , Edward R. Wetherbee
IPC: G06K9/00
Abstract: The disclosed embodiments provide a system that detects counterfeit electronic components in a target device, which is part of an electrical generation and distribution system. During operation, the system obtains target EMI signals, which were gathered by monitoring target electromagnetic interference (EMI) emissions generated by the target device using one or more target antennas positioned in proximity to the target device. Next, the system generates a target EMI fingerprint for the target device from the target EMI signals. Finally, the system compares the target EMI fingerprint against a reference EMI fingerprint for the target device to determine whether the target device contains one or more counterfeit electronic components.
-
公开(公告)号:US11055396B2
公开(公告)日:2021-07-06
申请号:US16506803
申请日:2019-07-09
Applicant: Oracle International Corporation
Inventor: Kenny C. Gross , Michael H. S. Dayringer , Andrew J. Lewis , Guang C. Wang
Abstract: The disclosed embodiments provide a system that detects unwanted electronic components in a target asset. During operation, the system generates a sinusoidal load for the target asset. Next, the system obtains target electromagnetic interference (EMI) signals by monitoring EMI signals generated by the target asset while the target asset is executing the sinusoidal load. The system then generates a target EMI fingerprint from the target EMI signals. Finally, the system compares the target EMI fingerprint against a reference EMI fingerprint for the target asset to determine whether the target asset contains unwanted electronic components.
-
公开(公告)号:US11120134B2
公开(公告)日:2021-09-14
申请号:US16384722
申请日:2019-04-15
Applicant: Oracle International Corporation
Inventor: Andrew J. Lewis , Kenny C. Gross , Michael H. S. Dayringer , Guang C. Wang
Abstract: The disclosed embodiments provide a system that detects unwanted electronic components in a target computing system. During operation, the system obtains target electromagnetic interference (EMI) signals, which were gathered by monitoring EMI signals generated by the target computing system, using an insertable device, wherein when the insertable device is inserted into the target computing system, the insertable device gathers the target EMI signals from the target computing system. Next, the system generates a target EMI fingerprint from the target EMI signals. Finally, the system compares the target EMI fingerprint against a reference EMI fingerprint for the target computing system to determine whether the target computing system contains any unwanted electronic components.
-
公开(公告)号:US10984106B2
公开(公告)日:2021-04-20
申请号:US16419861
申请日:2019-05-22
Applicant: Oracle International Corporation
Inventor: Kenny C. Gross , Andrew J. Lewis , Guang C. Wang , Michael H. S. Dayringer
Abstract: The disclosed embodiments provide a system that detects execution of malicious cryptomining software in a target computing system. During operation, the system monitors target electromagnetic interference (EMI) signals generated during operation of the target computing system. Next, the system generates a target EMI fingerprint from the target EMI signals. The system then compares the target EMI fingerprint against a set of malicious EMI fingerprints for different pieces of malicious cryptomining software to determine whether the target computing system is executing malicious cryptomining software.
-
-
-
-
-
-