Patents Assigned to Bluerisc Inc.
-
Patent number: 11582211Abstract: An example process includes breaking content into multiple fragments; and transmitting at least two of the multiple fragments over different physical channels in order to isolate the at least two fragments during transmission. The example process may include generating session keys; encrypting at least some of the fragments using different session keys; and associating, with each fragment, a session key used to encrypt a different fragment to produce fragment/session key pairs.Type: GrantFiled: November 13, 2019Date of Patent: February 14, 2023Assignee: BLUERISC, INC.Inventor: Csaba Andras Moritz
-
Patent number: 11507669Abstract: An example process includes identifying, by one or more processing devices, a location in computer code that is subject to vulnerability, where the location corresponds to a memory access that is repeatable and that operates on a particular type of variable; and performing processes, by one or more processing devices, to heal the vulnerability. The memory access may be part of a system-to-system or a user-to-system interaction that is repeatable.Type: GrantFiled: June 27, 2016Date of Patent: November 22, 2022Assignee: BlueRISC, Inc.Inventors: Csaba Andras Moritz, Kristopher Carver, Jeffry Gummeson
-
Patent number: 11507671Abstract: An example process includes: identifying, by one or more processing devices, candidate code in executable code based on a static analysis of the executable code, where the candidate code includes code that is vulnerable to attack or the candidate code being on a path to code that is vulnerable to attack, where information related to the attack is based, at least in part, on the candidate code; customizing, by one or more processing devices, a healing template based on the information to produce a customized healing template; and inserting, by one or more processing devices, the customized healing template into a version of the executable code at a location that is based on a location of the candidate code in the executable code, where the customized healing template includes code that is executable to inhibit the attack.Type: GrantFiled: July 29, 2020Date of Patent: November 22, 2022Assignee: BLUERISC, INC.Inventors: Csaba Andras Moritz, Kristopher Carver, Jeffry Gummeson
-
Patent number: 11163857Abstract: A processor system comprising: performing a compilation process on a computer program; encoding an instruction with a selected encoding; encoding the security mutation information in an instruction set architecture of a processor; and executing a compiled computer program in the processor using an added mutation instruction, wherein executing comprises executing a mutation instruction to enable decoding another instruction. A processor system with a random instruction encoding and randomized execution, providing effective defense against offline and runtime security attacks including software and hardware reverse engineering, invasive microprobing, fault injection, and high-order differential and electromagnetic power analysis.Type: GrantFiled: August 2, 2019Date of Patent: November 2, 2021Assignee: BLUERISC, INC.Inventors: Csaba Andras Moritz, Saurabh Chheda, Kristopher Carver
-
Patent number: 11153286Abstract: An example method performed by one or more processing devices includes: generating encrypted content at a sender device using one or more first keys that are available from a key provider; and outputting the encrypted content to a recipient device over one or more channels; where the key provider enables access, following authorization, by the recipient device to one or more second keys for decrypting the encrypted content; and where an entity that enables the channel is unaffiliated with the key provider.Type: GrantFiled: April 23, 2020Date of Patent: October 19, 2021Assignee: BLUERISC, INC.Inventor: Csaba Andras Moritz
-
Patent number: 10839085Abstract: An example process includes: identifying, by one or more processing devices, candidate code in executable code based on a static analysis of the executable code, where the candidate code includes code that is vulnerable to attack or the candidate code being on a path to code that is vulnerable to attack, where information related to the attack is based, at least in part, on the candidate code; customizing, by one or more processing devices, a healing template based on the information to produce a customized healing template; and inserting, by one or more processing devices, the customized healing template into a version of the executable code at a location that is based on a location of the candidate code in the executable code, where the customized healing template includes code that is executable to inhibit the attack.Type: GrantFiled: February 11, 2019Date of Patent: November 17, 2020Assignee: BLUERISC, INC.Inventors: Csaba Andras Moritz, Kristopher Carver, Jeffry Gummeson
-
Patent number: 10706144Abstract: An example process that is performed by one or more processing devices uses one or more system states to detect cyber-attacks. The example process includes the following operations: generating a first graph that models states based on information obtained from an electronic device; and performing a correlation of the first graph with one or more second graphs to detect a possibility of a cyber-attack against the electronic device.Type: GrantFiled: September 9, 2016Date of Patent: July 7, 2020Assignee: BlueRISC, Inc.Inventors: Csaba Andras Moritz, Kristopher Carver, Santosh Khasanvis, Jeffry Gummeson
-
Patent number: 10666627Abstract: An example method performed by one or more processing devices includes: generating encrypted content at a sender device using one or more first keys that are available from a key provider; and outputting the encrypted content to a recipient device over one or more channels; where the key provider enables access, following authorization, by the recipient device to one or more second keys for decrypting the encrypted content; and where an entity that enables the channel is unaffiliated with the key provider.Type: GrantFiled: January 16, 2019Date of Patent: May 26, 2020Assignee: BlueRISC, Inc.Inventor: Csaba Andras Moritz
-
Patent number: 10516524Abstract: An example process includes breaking content into multiple fragments; and transmitting at least two of the multiple fragments over different physical channels in order to isolate the at least two fragments during transmission. The example process may include generating session keys; encrypting at least some of the fragments using different session keys; and associating, with each fragment, a session key used to encrypt a different fragment to produce fragment/session key pairs.Type: GrantFiled: January 15, 2019Date of Patent: December 24, 2019Assignee: BlueRISC, Inc.Inventor: Csaba Andras Moritz
-
Patent number: 10430565Abstract: A processor system comprising: performing a compilation process on a computer program; encoding an instruction with a selected encoding; encoding the security mutation information in an instruction set architecture of a processor; and executing a compiled computer program in the processor using an added mutation instruction, wherein executing comprises executing a mutation instruction to enable decoding another instruction. A processor system with a random instruction encoding and randomized execution, providing effective defense against offline and runtime security attacks including software and hardware reverse engineering, invasive microprobing, fault injection, and high-order differential and electromagnetic power analysis.Type: GrantFiled: February 27, 2018Date of Patent: October 1, 2019Assignee: BlueRISC, Inc.Inventors: Csaba Andras Moritz, Saurabh Chheda, Kristopher Carver
-
Patent number: 10248792Abstract: An example process includes: identifying, by one or more processing devices, candidate code in executable code based on a static analysis of the executable code, where the candidate code includes code that is vulnerable to attack or the candidate code being on a path to code that is vulnerable to attack, where information related to the attack is based, at least in part, on the candidate code; customizing, by one or more processing devices, a healing template based on the information to produce a customized healing template; and inserting, by one or more processing devices, the customized healing template into a version of the executable code at a location that is based on a location of the candidate code in the executable code, where the customized healing template includes code that is executable to inhibit the attack.Type: GrantFiled: August 10, 2017Date of Patent: April 2, 2019Assignee: BlueRISC, Inc.Inventors: Csaba Andras Moritz, Kristopher Carver, Jeffry Gummeson
-
Patent number: 10230702Abstract: An example method performed by one or more processing devices includes: generating encrypted content at a sender device using one or more first keys that are available from a key provider; and outputting the encrypted content to a recipient device over one or more channels; where the key provider enables access, following authorization, by the recipient device to one or more second keys for decrypting the encrypted content; and where an entity that enables the channel is unaffiliated with the key provider.Type: GrantFiled: August 15, 2016Date of Patent: March 12, 2019Assignee: BlueRISC, Inc.Inventor: Csaba Andras Moritz
-
Patent number: 10225075Abstract: An example process includes breaking content into multiple fragments and transmitting at least two of the multiple fragments over different physical channels in order to isolate the at least two fragments during transmission. The example process may include generating session keys; encrypting at least some of the fragments using different session keys; and associating, with each fragment, a session key used to encrypt a different fragment to produce fragment/session key pairs.Type: GrantFiled: August 15, 2016Date of Patent: March 5, 2019Assignee: BlueRISC, Inc.Inventor: Csaba Andras Moritz
-
Patent number: 9940445Abstract: A processor system comprising: performing a compilation process on a computer program; encoding an instruction with a selected encoding; encoding the security mutation information in an instruction set architecture of a processor; and executing a compiled computer program in the processor using an added mutation instruction, wherein executing comprises executing a mutation instruction to enable decoding another instruction. A processor system with a random instruction encoding and randomized execution, providing effective defense against offline and runtime security attacks including software and hardware reverse engineering, invasive microprobing, fault injection, and high-order differential and electromagnetic power analysis.Type: GrantFiled: June 25, 2015Date of Patent: April 10, 2018Assignee: BlueRISC, Inc.Inventors: Csaba Andras Moritz, Saurabh Chheda, Kristopher Carver
-
Patent number: 9754112Abstract: An example process includes: identifying, by one or more processing devices, candidate code in executable code based on a static analysis of the executable code, where the candidate code includes code that is vulnerable to attack or the candidate code being on a path to code that is vulnerable to attack, where information related to the attack is based, at least in part, on the candidate code; customizing, by one or more processing devices, a healing template based on the information to produce a customized healing template; and inserting, by one or more processing devices, the customized healing template into a version of the executable code at a location that is based on a location of the candidate code in the executable code, where the customized healing template includes code that is executable to inhibit the attack.Type: GrantFiled: November 24, 2014Date of Patent: September 5, 2017Assignee: BlueRISC, Inc.Inventors: Csaba Andras Moritz, Kristopher Carver, Jeffrey Gummeson
-
Patent number: 9582650Abstract: A method, for use in a processor context, wherein instructions in a program executable are encoded with plural instruction set encodings. A method wherein a control instruction encoded with an instruction set encoding contains information about decoding of an instruction that is encoded with another instruction set encoding scheme. A method wherein instruction set encodings are randomly generated at compile time. A processor framework wherein an instruction is decoded during execution with the help of information provided by a previously decoded control instruction.Type: GrantFiled: November 21, 2012Date of Patent: February 28, 2017Assignee: BlueRisc, Inc.Inventors: Saurabh Chheda, Kristopher Carver, Raksit Ashok
-
Patent number: 9411964Abstract: An example process includes identifying, by one or more processing devices, a location in computer code that is subject to vulnerability, where the location corresponds to a memory access that is repeatable and that operates on a particular type of variable; and performing processes, by one or more processing devices, to heal the vulnerability. The memory access may be part of a system-to-system or a user-to-system interaction that is repeatable.Type: GrantFiled: November 24, 2014Date of Patent: August 9, 2016Assignee: BlueRISC, Inc.Inventors: Csaba Andras Moritz, Kristopher Carver, Jeffry Gummeson
-
Patent number: 9069938Abstract: A processor system comprising: performing a compilation process on a computer program; encoding an instruction with a selected encoding; encoding the security mutation information in an instruction set architecture of a processor; and executing a compiled computer program in the processor using an added mutation instruction, wherein executing comprises executing a mutation instruction to enable decoding another instruction. A processor system with a random instruction encoding and randomized execution, providing effective defense against offline and runtime security attacks including software and hardware reverse engineering, invasive microprobing, fault injection, and high-order differential and electromagnetic power analysis.Type: GrantFiled: November 27, 2012Date of Patent: June 30, 2015Assignee: BlueRISC, Inc.Inventors: Csaba Andras Moritz, Saurabh Chheda, Kristopher Carver
-
Publication number: 20140372994Abstract: A method comprising of analyzing and transforming a program executable at compile-time such that a processor design objective is optimized. A method including analyzing an executable to estimate energy consumption of an application component in a processor. A method including transforming an executable to reduce energy consumption in a processor. A processor framework controlled by compiler inserted control that statically exposes parallelism in an instruction sequence. A processor framework to reduce energy consumption in an instruction memory system with compiler inserted control.Type: ApplicationFiled: March 14, 2014Publication date: December 18, 2014Applicant: BlueRISC Inc.Inventors: Saurabh Chheda, Kristopher Carver, Raksit Ashok
-
Publication number: 20140331030Abstract: A system, for use with a compiler architecture framework, includes performing a statically speculative compilation process to extract and use speculative static information, encoding the speculative static information in an instruction set architecture of a processor, and executing a compiled computer program using the speculative static information, wherein executing supports static speculation driven mechanisms and controls.Type: ApplicationFiled: February 27, 2014Publication date: November 6, 2014Applicant: BlueRISC Inc.Inventor: Csaba Andras Moritz