×

Secure controller operation and malware prevention

  • US 10,380,344 B1
  • Filed: 11/30/2018
  • Issued: 08/13/2019
  • Est. Priority Date: 04/06/2016
  • Status: Active Grant
First Claim
Patent Images

1. A non-transitory computer readable medium including instructions that, when executed by at least one processor, cause the at least one processor to perform operations for deploying embedded runtime whitelist policies in an ECU (electronic control unit) in a vehicle, comprising:

  • maintaining, as embedded software within the ECU in the vehicle, a plurality of whitelist polices for runtime functionality of the ECU;

    wherein a first of the plurality of whitelist policies defines permitted runnable binaries for ECU software installed on the ECU;

    wherein a second of the plurality of whitelist policies defines permitted function sequences in a memory of the ECU; and

    wherein the first or second of the plurality of whitelist policies includes one or more signatures corresponding to one or more verified process calls;

    invoking, by at least one of the plurality of whitelist policies, a stack inspection operation;

    detecting, based on the invoking, a requested operation to be performed by the ECU as part of an identified runtime process call;

    identifying a process identifier associated with the identified runtime process call;

    determining a verified signature from among the one or more signatures based on the process identifier;

    determining that the requested operation violates at least one of the first or second of the plurality of whitelist polices, wherein the determining is based on comparing a signature (i) associated with the identified runtime process call and (ii) based on a pointer to a location in the memory with the verified signature; and

    blocking, based on the determination, the requested operation from being performed by the ECU.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×