US 11,809,609 B2
Malicious attack detection techniques
Shashank Guruprasad, Bangalore (IN); Roma Rudra, Bangalore (IN); and Abhishek Tripathi, Bangalore (IN)
Assigned to Arm Limited, Cambridge (GB)
Filed by Arm Limited, Cambridge (GB)
Filed on Sep. 3, 2021, as Appl. No. 17/466,363.
Prior Publication US 2023/0074623 A1, Mar. 9, 2023
Int. Cl. G06F 21/75 (2013.01); G06F 21/57 (2013.01)
CPC G06F 21/755 (2017.08) [G06F 21/57 (2013.01)] 20 Claims
OG exemplary drawing
 
16. A method comprising:
receiving a reset-synchronizing signal;
generating branch sensing signals with a reset tree having multiple branches of the leaf buffers based on the reset-synchronizing signal;
generating an attack detection signal based on sensing a malicious attack associated with the branch sensing signals from the multiple branches of the leaf buffers;
comparing the reset-synchronizing signal to the attack detection signal; and
generating a reset alarm signal based on duration of a timing glitch associated with a difference between the reset-synchronizing signal and the attack detection signal.