Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

181 results about "Backdoor" patented technology

A backdoor is a typically covert method of bypassing normal authentication or encryption in a computer, product, embedded device (e.g. a home router), or its embodiment (e.g. part of a cryptosystem, algorithm, chipset, or even a "homunculus computer" —a tiny computer-within-a-computer such as that found in Intel's AMT technology). Backdoors are most often used for securing remote access to a computer, or obtaining access to plaintext in cryptographic systems. From there it may be used to gain access to privileged information like passwords, corrupt or delete data on hard drives, or transfer information within autoschediastic networks.

Mimicry switch judgment system and method based on trusted measurement

The invention belongs to the technical field of network security, and discloses a mimicry switch decision system based on trusted measurement, and the system comprises a forwarding plane, a managementinterface agent, an intermediate adaptation module, a forwarding plane agent, a plurality of heterogeneous actuators, a trusted measurement-based mimicry decision module and a situation awareness andnegative feedback scheduling module. The invention further discloses a mimicry switch judgment method based on trusted measurement. The mimicry switch judgment method comprises the steps: setting mimicry switch judgment elements; distributing input information; collecting output information; carrying out mimicry decision based on credibility measurement; issuing a judgment result, sensing the threat situation of the switch, and scheduling an executor; the mimicry decision based on credibility measurement comprises the following steps: establishing an executive credible index tree; collectingand updating the credible index data of the executive body; calculating the credible weight of the output result of each executive body; and calculating the credibility of each output result. The method can effectively reduce the influence of unknown loopholes and potential backdoors, and improves the safety protection level of a local area network.
Owner:PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU +1

Detection of Test-Time Evasion Attacks

Embodiments of the present invention concern detecting Test-Time Evasion (TTE) attacks on neural network, particularly deep neural network (DNN), classifiers. The manner of detection is similar to that used to detect backdoors of a classifier whose training dataset was poisoned. Given knowledge of the classifier itself, the adversary subtly (even imperceptibly) perturbs their input to the classifier at test time in order to cause the class decision to change from a source class to a target class. For example, an image of a person who is unauthorized to access a resource can be modified slightly so that the classifier decides the image is that of an authorized person. The detector is based on employing a method (similar to that used to detect backdoors in DNNs) to discover different such minimal perturbations for each in a set of clean (correctly classified) samples, to change the sample's ground-truth (source) class to every other (target) class. For each (source, target) class pair, null distributions of the sizes of these perturbations are modeled. A test sample is similarly minimally perturbed by the detector from its decided-upon (target) class to every other (potential source) class. The p-values according to the corresponding null distributions of these test-sample perturbations are assessed using the corresponding nulls to decide whether the test sample is a TTE attack.
Owner:ANOMALEE INC

Post-Training Detection and Identification of Backdoor-Poisoning Attacks

This patent concerns novel technology for detecting backdoors in neural network, particularly deep neural network (DNN) classification or prediction/regression models. The backdoors are planted by suitably poisoning the training dataset, i.e., a data-poisoning attack. Once added to an input sample from a source class of the attack, the backdoor pattern causes the decision of the neural network to change to the attacker's target class in the case of classification, or causes the output of the network to significantly change in the case of prediction or regression. The backdoors under consideration are small in norm so as to be imperceptible to a human or otherwise innocuous/evasive, but this does not limit their location, support or manner of incorporation. There may not be components (edges, nodes) of the DNN which are specifically dedicated to achieving the backdoor function. Moreover, the training dataset used to learn the classifier or predictor/regressor may not be available. In one embodiment of the present invention, which addresses such challenges, if the classifier or predictor/regressor is poisoned then the backdoor pattern is determined through a feasible optimization process, followed by an inference process, so that both the backdoor pattern itself and the associated source class(es) and target class are determined based only on the classifier or predictor/regressor parameters and using a set of clean (unpoisoned) samples, from the different classes (none of which may be training samples).
Owner:ANOMALEE INC

Industrial network endogenous security boundary protection method, device and architecture

PendingCN113285917AImprove filter review accuracyMitigate the threat of uncertaintyTransmissionOnline and offlineNetwork data
The invention relates to an industrial network endogenous security boundary protection method, device and system, and the method comprises the steps: monitoring and collecting production management network data traffic through a network card, caching the data traffic, and distributing the data traffic to a plurality of heterogeneous filtering review executors; filtering and reviewing the address, the protocol, the industrial control protocol and the control parameter in the data flow by using a filtering and reviewing executor, and outputting a reviewing result; performing mimicry judgment on the review results output by the plurality of heterogeneous filtering review executors, and determining whether to forward the data traffic to the field control network based on the mimicry judgment results and discriminating the abnormal executors to dynamically schedule the executors for filtering and reviewing the data traffic to be online and offline. Aiming at security threats faced by the industrial network boundary protection equipment, a mimicry defense technology is combined, a filtering review function is stripped out, and the uncertainty threats caused by unknown vulnerabilities or backdoors of the industrial network boundary protection equipment are relieved through heterogeneous and redundancy filtering review execution bodies.
Owner:PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU

Computer operation system and establishing method thereof

The invention discloses a computer operation system and an establishing method thereof. An IPv6 protocol is applied, a network address space is expanded, the whole throughput of the network is increased, the service quality is improved, the safety is more efficiently ensured, the plug-and-play and the mobility are supported, and a multicast function is more efficiently realized; multi-network interconnection sharing used for communication, television, computer and Internet of things can meet the functional requirement of a high-grade PC (Personal Computer), a large-size computer and the network running of the large-size computer, and a simplified operation system (OS) image is established based on an installing type OS image; and a well known fact is that the preset backdoor intelligence search in the Windows operation system and the blank screen virus of the backdoor intelligence search are time bombs capable of destroying hardware and hard disk of a user. The invention provides a set of computer operation system with Chinese proprietary intellectual property rights and a safeguard system for information safety; the monopoly of the western countries is broken; the entire international core competitiveness is increased; the system is simple in operation and convenient in maintenance; the running efficiency, the compatibility, the stability and the safety are all ultrahigh; and all the functions of Windows, Linux, Unix and other operation systems can be replaced and covered.
Owner:刘明前

Website back door detection method and device

InactiveCN106301974AAvoid defects that are not easily identifiedData switching networksSpecial data processing applicationsInternet privacyBack door
The invention provides a website back door detection method and device. The website backdoor detection method comprises steps of putting a file of a website to be detected into an independent space isolated from a practical execution environment of the file of the website to be detected for operation; constructing an external parameter carrying a danger label and supplying the external parameter to the file of the website to be detected by responding to an external parameter obtaining request transmitted by the file of the website to be detected during operation in the independent space, wherein the external parameter carrying the danger label goes through a booking string processing function and the danger label is maintained; determining whether the file of the website to be detected executes the danger function during a process of operating in the independent space and whether the parameter of the danger function has the danger label; if afacts that the file of the website to be detected executes the danger function in the process of operating in the independent space and the danger function calls the parameter with the danger labels is determined, detecting that the file of the website to be detected is a backdoor file. The embodiment of the website back door detection method and device can effectively detect the backdoor of the website.
Owner:ALIBABA GRP HLDG LTD

Backdoor confrontation sample generation method of PE malicious software detection model

The invention relates to a backdoor confrontation sample generation method of a PE malicious software detection model based on R-DBSCAN, and belongs to the field of computer malicious software detection. The method mainly aims at solving the problem that a malicious software detection model is high in attack difficulty under the black box condition. The method comprises the following steps: firstly, acquiring a PE sample from a public data set, training a proxy training model, and reducing the dimension of the data set by adopting an SHAP value; clustering the samples by adopting an R-DBSCAN method, and taking a center node of each cluster as a sampling point to construct a new data set; training a neural network model; respectively inputting malicious and benign sample files, and recording neurons which greatly influence a classification result according to the weight change condition of the neurons in the neural network; embedding a character string with any length into the empty PE file, taking a character string which greatly influences the character string according to the weight change condition of the neuron, and recording the neuron; embedding a trigger into an original malicious PE file, and modifying a label to achieve adversarial training of a neural network.
Owner:BEIJING INSTITUTE OF TECHNOLOGYGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products