Patents by Inventor Christopher Huth

Christopher Huth has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230205677
    Abstract: A computer-implemented method for fuzzing a target software running on a computer. In the method: a target program is carried using first input data, memory context information of the target program's run is captured, a machine learning model is trained using the first input data and the memory context information as model input, a fuzzing input is generated based on an output of the machine learning model, the target program is tested using the fuzzing input.
    Type: Application
    Filed: November 2, 2022
    Publication date: June 29, 2023
    Inventors: Max Camillo Eisele, Christopher Huth, Irina Nicolae
  • Patent number: 11681516
    Abstract: A computer-implemented method for carrying out an update management for updating application software on data processing units. The method includes: providing an error model, which indicates a number of errors across software versions of the application software; determining an update sequence for data processing units, depending on their particular software version; and updating the application software or providing an update prompt to update the application software in the data processing units according to the update sequence.
    Type: Grant
    Filed: May 20, 2021
    Date of Patent: June 20, 2023
    Assignee: ROBERT BOSCH GMBH
    Inventors: Christopher Huth, Anupam Sarkar, Simon Greiner
  • Patent number: 11683323
    Abstract: A method for authenticating a message transmitted via a communication channel, including the following: sampling recurring signal edges within a data frame of the message, sampling values being obtained with a start time that is offset between the signal edges, reconstructing an average signal characteristic of a part of the message from the sampling values, calculating signal-technical properties of the data frame from the signal characteristic, and the message is authenticated based on the properties.
    Type: Grant
    Filed: May 21, 2019
    Date of Patent: June 20, 2023
    Assignee: ROBERT BOSCH GMBH
    Inventors: Marcel Kneib, Christopher Huth, Jo Pletinckx
  • Patent number: 11669438
    Abstract: A computer-implemented method for testing a system, the tested system being a computer program, a hardware system, or an embedded system. In the method, using a static analysis, a first part of an execution structure for the system is examined to see if the system runs corresponding execution paths without errors when the first part of the execution structure is executed. If in the static analysis error-free execution is determined for the first part of the execution structure, the system is examined using a dynamic analysis which leaves out execution paths which correspond to the first part of the execution structure.
    Type: Grant
    Filed: June 4, 2020
    Date of Patent: June 6, 2023
    Assignee: ROBERT BOSCH GMBH
    Inventors: Christopher Huth, Hans Loehr, Rakshith Amarnath, Simon Greiner
  • Publication number: 20230146443
    Abstract: A method for obtaining coverage-guided fuzzing of software on a hardware target. The hardware target includes a breakpoint register, and is designed to stop an execution of the software prior to execution of an instruction of the software if the instruction is reached during the execution of the software; a memory address of the instruction is set in the breakpoint register. The method includes setting a first breakpoint prior to a first instruction of the software; executing or continuing a fuzzing iteration of the software; first checking whether the first breakpoint is reached while executing or continuing the fuzzing iteration; storing a piece of log information that includes that the first instruction in the fuzzing iteration has been reached, and optionally deleting the first breakpoint if the first check is positive. The coverage-guided fuzzing of the software includes the piece of log information.
    Type: Application
    Filed: November 3, 2022
    Publication date: May 11, 2023
    Inventors: Christopher Huth, Marius Fischer, Max Camillo Eisele
  • Publication number: 20230065540
    Abstract: A method for communicating data requests to one or more data sources. The method includes receiving a data request, with which data of one or more data types are requested, from an application, and checking the availability of one or more data sources that are able to provide the one or more requested data types. The method further comprises: if at least one of the one or more data sources is available, sending a request to the available data source for the requested associated data type that the data source can provide; and, if no data source is available for at least one of the requested data types, sending a request for this data type to a placeholder module.
    Type: Application
    Filed: August 22, 2022
    Publication date: March 2, 2023
    Inventors: Arne Nordmann, Christian Zimmermann, Christopher Huth, Fredrik Kamphuis, Martin Ring, Max Camillo Eisele, Paulius Duplys, Tobias Gehrmann
  • Patent number: 11396449
    Abstract: A method is provided for checking a sensor value of a MEMS sensor. In the process, an output signal of the MEMS sensor is detected and the sensor value is ascertained as a function of the output signal. In addition, frequency components of the output signal are examined and a determination is made as to whether the ascertained sensor value is reliable or unreliable as a function of the examination of the frequency components. If the sensor value is determined to be unreliable, the sensor value is discarded or provided with a lower weighting, or a warning it output relating to the unreliability of the sensor value or an item of information about the unreliability of the sensor value is stored.
    Type: Grant
    Filed: November 15, 2019
    Date of Patent: July 26, 2022
    Assignee: Robert Bosch GmbH
    Inventors: Christopher Huth, Oliver Willers
  • Publication number: 20220138092
    Abstract: A computer-implemented method for selecting a fuzzing method for carrying out fuzzing testing of a predefined program code. The method includes: providing one or multiple reference performance metrics that characterize the result of reference fuzzing testing of the program code to be tested, using a reference fuzzing method; carrying out fuzzing tests, based on various fuzzing methods, on the predefined program code in order to ascertain one or multiple performance metrics in each case; selecting one or multiple fuzzing methods corresponding to the associated performance metrics, as a function of the reference performance metric; and carrying out fuzzing testing corresponding to the one or multiple selected fuzzing methods.
    Type: Application
    Filed: November 1, 2021
    Publication date: May 5, 2022
    Inventors: Christopher Huth, Anupam Sarkar, Simon Greiner
  • Publication number: 20220138080
    Abstract: A computer-implemented method for selecting a fuzzing method for carrying out fuzzing testing of a predefined program code. The method includes: providing program code metrics that characterize the program code to be tested; applying the program code metrics to a data-based fuzzing selection model for ascertaining performance metrics, associated with the fuzzing methods, for a number of fuzzing methods, the data-based fuzzing selection model being trained to output a performance metric for each of the fuzzing methods; selecting one or multiple fuzzing methods corresponding to the associated performance metrics; carrying out fuzzing testing corresponding to the one or multiple selected fuzzing methods.
    Type: Application
    Filed: November 1, 2021
    Publication date: May 5, 2022
    Inventors: Anupam SARKAR, Christopher Huth, Hans Loehr, Simon Greiner
  • Publication number: 20220027142
    Abstract: A computer-implemented method for carrying out an update management for updating application software on data processing units. The method includes: providing an error model, which indicates a number of errors across software versions of the application software; determining an update sequence for data processing units, depending on their particular software version; and updating the application software or providing an update prompt to update the application software in the data processing units according to the update sequence.
    Type: Application
    Filed: May 20, 2021
    Publication date: January 27, 2022
    Inventors: Christopher Huth, Anupam Sarkar, Simon Greiner
  • Publication number: 20220027261
    Abstract: A computer-implemented method for performing a test for a program code. The method includes the following steps: providing a modified program code, which includes the program code to be tested and at least one code segment, the at least one code segment monitoring an execution sequence of execution segments, and the code segment being developed to induce a program termination when an impermissible execution sequence is detected; performing a fuzz test for the modified program code; signaling a program termination when an impermissible execution sequence is detected.
    Type: Application
    Filed: June 2, 2021
    Publication date: January 27, 2022
    Inventors: Anupam Sarkar, Christopher Huth, Hans Loehr, Simon Greiner
  • Patent number: 11223490
    Abstract: A method and system for authenticating a device is disclosed. The method includes the steps of: receiving a helper bit string and a first MAC; measuring a first response bit string of a physical unclonable function of the device with respect to a challenge bit string; subtracting the first response bit string from the helper bit string; decoding a result of the subtraction using a uniformly distributed random matrix, the shared secret bit string being provided from the decoding if the helper bit string was encoded using a previously measured second response bit string that is within a threshold level of similarity to the first response bit string, the decoding outputting an error value otherwise; determining a second MAC based on the shared secret bit string, the uniformly distributed random matrix, and the helper bit string; and determining whether the second MAC matches the first MAC.
    Type: Grant
    Filed: December 27, 2017
    Date of Patent: January 11, 2022
    Assignee: Robert Bosch GmbH
    Inventors: Jorge Guajardo Merchan, Paulius Duplys, Christopher Huth
  • Patent number: 11165594
    Abstract: A method and system for authenticating a first device is disclosed. The method includes the steps of: measuring a first response bit string of a physical unclonable function of the first device with respect to a challenge bit string, the physical unclonable function being provided by one of the processor of the first device and a further physical component of the first device; deriving a shared secret bit string from a uniformly distributed random vector; encoding a helper bit string by multiplying a uniformly distributed random matrix with the uniformly distributed random vector and adding the first response bit string to a result of the multiplication; and transmitting the helper bit string to a second device that is remote from the first device.
    Type: Grant
    Filed: December 27, 2017
    Date of Patent: November 2, 2021
    Assignee: Robert Bosch GmbH
    Inventors: Jorge Guajardo Merchan, Paulius Duplys, Christopher Huth
  • Patent number: 11146410
    Abstract: A method for authenticating a first device is disclosed. In one embodiment, the method includes the steps of: receiving a helper bit string from a second device that is remote from the first device; measuring a first response bit string of a physical unclonable function of the first device with respect to a challenge bit string; subtracting the first response bit string from the helper bit string; reconstructing a random matrix using a pseudo-random number generator initialized with a seed; and decoding a result of the subtraction using the random matrix, the shared secret bit string being provided from the decoding if the helper bit string was encoded using a previously measured second response bit string that is within a threshold level of similarity to the first response bit string, the decoding outputting an error value otherwise.
    Type: Grant
    Filed: December 27, 2017
    Date of Patent: October 12, 2021
    Assignee: Robert Bosch GmbH
    Inventors: Jorge Guajardo Merchan, Paulius Duplys, Christopher Huth
  • Publication number: 20210064969
    Abstract: A method for detecting a deterioration of network components in a network. The method includes the evaluation, in an evaluation unit, of at least one ascertained signal parameter of a signal that is transmitted in a network, in order to determine a signal quality of the signal, and establishing that a deterioration of the network exists if the signal quality lies outside a predefined range.
    Type: Application
    Filed: June 9, 2020
    Publication date: March 4, 2021
    Inventors: Christopher Huth, Marcel Kneib
  • Publication number: 20210026760
    Abstract: A computer-implemented method for testing a system, the tested system being a computer program, a hardware system, or an embedded system. In the method, using a static analysis, a first part of an execution structure for the system is examined to see if the system runs corresponding execution paths without errors when the first part of the execution structure is executed. If in the static analysis error-free execution is determined for the first part of the execution structure, the system is examined using a dynamic analysis which leaves out execution paths which correspond to the first part of the execution structure.
    Type: Application
    Filed: June 4, 2020
    Publication date: January 28, 2021
    Inventors: Christopher Huth, Hans Loehr, Rakshith Amarnath, Simon Greiner
  • Patent number: 10757119
    Abstract: A method for protecting a network having multiple network subscribers against a cyberattack, in which bits or bit sequences of a message are transmitted between the network subscribers in the network via different voltage levels on at least one transmission route of the network. For this purpose, at least one characteristic of the voltage levels or of the transmitted bits or bit sequences is actively modified in at least one of the network subscribers or on the at least one transmission route and the origin of the transmitted bits or of the at least one transmission route is determined on the basis of the at least one characteristic. The cyberattack on the network is detected or the cyberattack on the network is localized in the network as a function of the ascertained origin.
    Type: Grant
    Filed: May 1, 2018
    Date of Patent: August 25, 2020
    Assignee: Robert Bosch GmbH
    Inventors: Christopher Huth, Clemens Schroff, Herve Seudie, Marcel Kneib
  • Publication number: 20200172392
    Abstract: A method is provided for checking a sensor value of a MEMS sensor. In the process, an output signal of the MEMS sensor is detected and the sensor value is ascertained as a function of the output signal. In addition, frequency components of the output signal are examined and a determination is made as to whether the ascertained sensor value is reliable or unreliable as a function of the examination of the frequency components. If the sensor value is determined to be unreliable, the sensor value is discarded or provided with a lower weighting, or a warning it output relating to the unreliability of the sensor value or an item of information about the unreliability of the sensor value is stored.
    Type: Application
    Filed: November 15, 2019
    Publication date: June 4, 2020
    Inventors: Christopher Huth, Oliver Willers
  • Publication number: 20190364054
    Abstract: A method for authenticating a message transmitted via a communication channel, including the following: sampling recurring signal edges within a data frame of the message, sampling values being obtained with a start time that is offset between the signal edges, reconstructing an average signal characteristic of a part of the message from the sampling values, calculating signal-technical properties of the data frame from the signal characteristic, and the message is authenticated based on the properties.
    Type: Application
    Filed: May 21, 2019
    Publication date: November 28, 2019
    Inventors: Marcel Kneib, Christopher Huth, Jo Pletinckx
  • Publication number: 20190349207
    Abstract: A method and system for authenticating a device is disclosed. The method includes the steps of: receiving a helper bit string and a first MAC; measuring a first response bit string of a physical unclonable function of the device with respect to a challenge bit string; subtracting the first response bit string from the helper bit string; decoding a result of the subtraction using a uniformly distributed random matrix, the shared secret bit string being provided from the decoding if the helper bit string was encoded using a previously measured second response bit string that is within a threshold level of similarity to the first response bit string, the decoding outputting an error value otherwise; determining a second MAC based on the shared secret bit string, the uniformly distributed random matrix, and the helper bit string; and determining whether the second MAC matches the first MAC.
    Type: Application
    Filed: December 27, 2017
    Publication date: November 14, 2019
    Inventors: Jorge Guajardo MERCHAN, Paulius DUPLYS, Christopher HUTH