-
1.
公开(公告)号:US20240244783A1
公开(公告)日:2024-07-18
申请号:US18616009
申请日:2024-03-25
Applicant: PassiveLogic, Inc.
Inventor: Troy Aaron Harvey , Jeremy David Fillingim
IPC: H05K7/14 , F24F11/32 , F24F11/49 , F24F11/63 , F24F11/88 , G01R31/55 , G05B13/02 , G05B15/02 , G05B19/048 , G05B23/02 , G06F1/3209 , G06F1/3246 , G06F3/041 , G06F3/0482 , G06F3/04847 , G06F3/147 , G06F8/41 , G06F8/51 , G06F8/53 , G06F8/74 , G06F9/4401 , G06F30/12 , G06F30/13 , G06F30/18 , G06Q30/0283 , H02J3/00 , H04B3/46 , H04L43/50 , H04L67/12 , H04L67/125 , H04L67/75 , H04M3/30 , H04W4/80 , H04W84/00 , G06F30/392 , G06F111/04 , G06F111/16 , G06F113/04 , G06F113/16 , G06F115/12
CPC classification number: H05K7/1465 , F24F11/32 , F24F11/49 , F24F11/63 , F24F11/88 , G01R31/55 , G05B13/0265 , G05B15/02 , G05B19/048 , G05B23/0216 , G05B23/0264 , G05B23/0272 , G06F1/3209 , G06F1/3246 , G06F3/04186 , G06F3/0482 , G06F3/04847 , G06F3/147 , G06F8/436 , G06F8/51 , G06F8/53 , G06F8/74 , G06F9/4418 , G06F30/12 , G06F30/13 , G06F30/18 , G06Q30/0283 , H02J3/00 , H04B3/46 , H04L43/50 , H04L67/12 , H04L67/125 , H04L67/75 , H04M3/305 , H04W4/80 , H04W84/00 , H05K7/1468 , H05K7/1477 , H05K7/1481 , G06F30/392 , G06F2111/04 , G06F2111/16 , G06F2113/04 , G06F2113/16 , G06F2115/12 , H02J2310/12
Abstract: Tools and techniques are described to automate commissioning of physical spaces. Controllers have access to databases of the devices that are controlled by them, including wiring diagrams and protocols, such that the controller can automatically check that each wire responds correctly to stimulus from the controller. Controllers also have access to databases of the physical space such that they can check that sensors in the space record the correct information for device activity, and sensors can cross-check each other for consistency. Once a physical space is commissioned, incentives can be sought based on commissioning results.
-
公开(公告)号:US12019756B1
公开(公告)日:2024-06-25
申请号:US17870575
申请日:2022-07-21
Applicant: Architecture Technology Corporation
Inventor: Matthew Donovan , Scott Aloisio , Judson Powers
CPC classification number: G06F21/577 , G06F8/53 , G06F9/54 , G06N20/00
Abstract: Embodiments disclosed herein describe systems and methods for assessing vulnerabilities of embedded non-IP devices. In an illustrative embodiment, a system of assessing the vulnerabilities of embedded non-IP devices may be within a portable device. The portable device may include a plurality of wired connectors for various wired communication/data transfer protocols. The portable device may include tools for analyzing the firmware binaries of the embedded non-IP devices, such as disassemblers and modules for concrete and symbolic (concolic) execution. Based upon the disassembly and the concolic execution, the portable device may identify vulnerabilities such as buffer overflows and programming flaws in the firmware binaries.
-
公开(公告)号:US11977868B2
公开(公告)日:2024-05-07
申请号:US17568585
申请日:2022-01-04
Applicant: Palo Alto Research Center Incorporated
Inventor: Alexandre Perez , Ion Matei , Peter Patel-Schneider , Johan de Kleer , Ron Zvi Stern
Abstract: A method includes obtaining a binary code of a controller. The method also includes decompiling the binary code of the controller to generate a source code. The method further includes generating one or more abstract syntax trees based on the source code. The method further includes generating an interpretable model based on the one or more abstract syntax trees. The interpretable model is interpretable by subject matter experts.
-
4.
公开(公告)号:US20230185547A1
公开(公告)日:2023-06-15
申请号:US17643856
申请日:2021-12-13
Applicant: Intel Corporation
Inventor: Alexei KATRANOV , Stanislav BRATANOV
CPC classification number: G06F8/41 , G06F8/53 , G06F9/30094 , G06F9/30032
Abstract: An apparatus comprising at least one interface configured to read one or more high-level code instructions; and at least one processor configured to read the one or more high-level code instructions using the interface, determine atomic operations in the high-level code instructions, and translate the one or more high-level code instructions into assembly code instructions, wherein atomic operations are indicated in the assembly code instructions based on the atomic operations in the high-level code instruction.
-
公开(公告)号:US20190121627A1
公开(公告)日:2019-04-25
申请号:US16231711
申请日:2018-12-24
Applicant: Battelle Memorial Institute
Inventor: Elena S. Peterson , Christopher S. Oehmen , Aaron R. Phillips , Darren S. Curtis
CPC classification number: G06F8/53 , G06F8/427 , G06F8/75 , G06F8/751 , G06F21/563 , G06F21/64 , G16B30/00
Abstract: In a dynamic computing environment, it is a nontrivial task to verify code running in the environment because most approaches to software similarity require extensive and time-consuming analysis of a binary, or the approaches fail to recognize executables that are similar but nonidentical. A biosequence-based method for quantifying similarity of executable binaries is used to identify allowed codes in a real-world multi-user environment.
-
公开(公告)号:US10078498B2
公开(公告)日:2018-09-18
申请号:US15434202
申请日:2017-02-16
Applicant: LINE Corporation
Inventor: Sang Min Chung , SangHun Jeon , Tae Woo Kim , Joo Hyeon Ryu , Dongpil Seo , Sungbeom Ahn , Wang Jin Oh , Seong Yeol Lim , Myungju Chung , Kwang-Hee Han
Abstract: Provided is a method, apparatus, system, and non-transitory computer readable medium for extending at least one function of a package file. A function addition method executed at a computer may include storing a package file for an application; extracting, from the package file, a file in which information about a class most initially called in response to execution of the application is set as configuration information of the application; and setting a class name of a new class to an item to which information about the most initially called class is set in the extracted file.
-
公开(公告)号:US20180131725A1
公开(公告)日:2018-05-10
申请号:US15642450
申请日:2017-07-06
Inventor: Seung-Hyun KIM , Seok Hyun KIM , Soo Hyung KIM , Youngsam KIM , Jong-Hyouk NOH , Sangrae CHO , Young Seob CHO , Jin-Man CHO , Seyoung HUH , Jung Yeon HWANG , Seung Hun JIN
CPC classification number: H04L63/20 , G06F8/44 , G06F8/53 , G06F8/65 , G06F9/46 , H04L63/10 , H04W12/0027 , H04W12/00503
Abstract: Disclosed is a method and apparatus for mobile terminal management supporting security policy. An exemplary embodiment of the present invention provides a terminal management method for installing a mobile device management (MDM) function in which a server supports a security policy for a binary mobile application, including: adding, by the server, an MDM interlocking code for each class-method unit of an original application of the binary mobile application; modifying, by the server, the original application into a modification application; and generating and transmitting, by the server, an MDM policy including at least one MDM function to be applied to the modification application to a mobile terminal.
-
公开(公告)号:US20180096146A1
公开(公告)日:2018-04-05
申请号:US15834985
申请日:2017-12-07
CPC classification number: G06F21/563 , G06F8/10 , G06F8/20 , G06F8/427 , G06F8/53 , G06F8/61 , G06F8/75 , G06F21/566 , G06F21/62 , G06N5/003 , G06N5/04 , G06N20/20
Abstract: A method and apparatus are disclosed for identifying malicious software in the technical field of computers. The method includes: obtaining, according to a source code of to-be-detected software, a function call diagram of the software; generating a feature sequence of the software according to the function call diagram, the feature sequence including an eigenvalue of at least one feature, the feature being a function in a preset function library, and the eigenvalue of the feature being a quantity of times of calling of the function by the software; and identifying whether the software is malicious software according to the feature sequence and a random forest, the random forest including at least one decision tree, and the decision tree including reference eigenvalues of multiple features. The apparatus includes: an obtaining module, a generation module, and an identification module. The present disclosure may improve identification accuracy
-
公开(公告)号:US09921830B2
公开(公告)日:2018-03-20
申请号:US15167581
申请日:2016-05-27
Applicant: Cylance Inc.
Inventor: Derek A. Soeder , Matt Wolff
CPC classification number: G06F8/75 , G06F8/53 , G06F11/34 , G06F11/3414 , G06F11/36 , G06F2201/865
Abstract: Data is received that includes at least a portion of a program. Thereafter, entry point locations and execution-relevant metadata of the program are identified and retrieved. Regions of code within the program are then identified using static disassembly and based on the identified entry point locations and metadata. In addition, entry points are determined for each of a plurality of functions. Thereafter, a set of possible call sequences are generated for each function based on the identified regions of code and the determined entry points for each of the plurality of functions. Related apparatus, systems, techniques and articles are also described.
-
公开(公告)号:US09841960B2
公开(公告)日:2017-12-12
申请号:US14673671
申请日:2015-03-30
Applicant: CA, Inc.
Inventor: Jean David Dahan
CPC classification number: G06F8/47 , G06F8/53 , G06F8/70 , G06F9/44521 , G06F11/3624
Abstract: According to one aspect of the present disclosure, a method comprises receiving a command to load first compiled program code for execution by a processor. The first compiled program code is decompiled to generate source code. The source code is compiled to generate second compiled program code, the second compiled program code comprising information associated with the source code. The second compiled program code is provided to a debugger.
-
-
-
-
-
-
-
-
-