Time-bounded execution for privileged code

    公开(公告)号:US10419483B1

    公开(公告)日:2019-09-17

    申请号:US14489267

    申请日:2014-09-17

    Abstract: A system and method for generating remediated instructions that complies with one or more policies that specify constraints for computer executable instructions. The remediated instructions are generated based at least in part on an evaluation of a set of straight-line paths of the set of executable instructions and an execution flow for the set of straight-line paths.

    Reliability estimator for ad hoc applications

    公开(公告)号:USRE47593E1

    公开(公告)日:2019-09-03

    申请号:US15449814

    申请日:2017-03-03

    Abstract: In certain embodiments, a computer-implemented method includes receiving a request for a reliability estimate associated with an ad hoc application. In response to the request, one or more components associated with the ad hoc application and upon which the ad hoc application relies are identified. The method also includes generating a directed graph. The directed graph identifies one or more dependency relationships among the identified components. The method also includes calculating, based at least in part on the directed graph, a reliability estimate for the ad hoc application.

    Generation of Merkle trees as proof-of-work

    公开(公告)号:US10291408B2

    公开(公告)日:2019-05-14

    申请号:US15389991

    申请日:2016-12-23

    Abstract: A proof-of-work system where a first party (e.g., a client computer system) may request access to a computing resource. A second party (e.g., a service provider) may determine a challenge that may be provided to the first party. A valid solution to the challenge may be generated and provided for the request to be fulfilled. The challenge may include a message and a seed, such that the seed may be used at least in part to cryptographically derive information that may be used to generate a solution to the challenge. A hash tree may be generated as of generating the solution.

    KEY REVOCATION
    16.
    发明申请
    KEY REVOCATION 审中-公开

    公开(公告)号:US20180183771A1

    公开(公告)日:2018-06-28

    申请号:US15390205

    申请日:2016-12-23

    Abstract: A signature authority generates revocable one-time-use keys that are able to generate digital signatures. The signature authority generates a set of one-time-use keys, where each one-time-use key has a secret key and a public key derived from a hash of the secret key. The signature authority generates one or more revocation values that, when published, proves that the signature authority has the authority to revoke corresponding cryptographic keys. The signature authority hashes the public keys and the revocation values and arranges the hashes in a hash tree where the root of the hash tree acts as a public key of the signature authority. In some implementations, the one-time-use cryptographic keys are generated from a tree of seed values, and a particular revocation value is linked to a particular seed value, allowing for the revocation of a block of one-time-use cryptographic keys associated with the particular seed.

    HYPERVISOR ENFORCEMENT OF CRYPTOGRAPHIC POLICY

    公开(公告)号:US20180157828A1

    公开(公告)日:2018-06-07

    申请号:US15876020

    申请日:2018-01-19

    Abstract: Techniques for restricting the execution of algorithms contained in applications executing on virtual machines executing within a computer system are described herein. A first sampled set of computer executable instructions is gathered from a virtual machine by a controlling domain and compared against a reference set of computer executable instructions. If the first set is similar to the reference set, and if the execution of the algorithm corresponding to the reference set is restricted by one or more computer system polices, one or more operations limiting the execution of the restricted algorithm are performed, thus ensuring conformance with the computer system policies.

    SCANNING KERNEL DATA STRUCTURE CHARACTERISTICS

    公开(公告)号:US20170372065A1

    公开(公告)日:2017-12-28

    申请号:US15698399

    申请日:2017-09-07

    Abstract: A method and apparatus for detecting kernel data structure tampering are disclosed. In the method and apparatus, a memory region of a computer system is scanned for one or more characteristics of a kernel data structure of an operating system kernel. It is then determined, based at least in part on identifying whether the one or more characteristics are found in the memory region, whether the kernel data structure is stored in the memory region of the computer system for tampering with the kernel data structure.

    Converting a non-workflow program to a workflow program using workflow inferencing

    公开(公告)号:US09818078B1

    公开(公告)日:2017-11-14

    申请号:US13796240

    申请日:2013-03-12

    CPC classification number: G06Q10/0633 G06Q10/06316

    Abstract: Event records, such as log files, generated by a non-workflow program may be collected and provided to an event processor. The event processor may cluster the event records into distinct event clusters. A network inferencer may then generate one or more candidate workflow networks based on the event clusters generated by the event processor. Scores may be generated for evaluating the candidate workflow networks based upon the ability of the candidate workflow networks to explain the event records and/or the ability of the event records to attest to the candidate workflow networks. A workflow inferencer may then map a candidate workflow network to a workflow description.

    UPDATING VIRTUAL MACHINE IMAGES
    20.
    发明申请

    公开(公告)号:US20170272337A1

    公开(公告)日:2017-09-21

    申请号:US15472157

    申请日:2017-03-28

    CPC classification number: G06F8/65

    Abstract: Remote computing resource service providers allow customers to execute virtual computer systems in a virtual environment on hardware provided by the computing resource service provider. The virtual computer systems may be suspended for an indeterminate amount of time and saved as images in one or more storage systems of the service provider. Periodically, updates for the virtual computer systems are required. In order to update virtual computer systems that are stored in a suspended state, an offline patch and indirection map is generated and used to update the virtual computer systems.

Patent Agency Ranking