Detecting and mitigating memory attacks

    公开(公告)号:US12189764B2

    公开(公告)日:2025-01-07

    申请号:US17828903

    申请日:2022-05-31

    Abstract: The present disclosure relates to systems and methods implemented on a memory controller for detecting and mitigating memory attacks (e.g., row hammer attacks). For example, a memory controller may track activations of row addresses within a memory hardware (e.g., a DRAM device) and determine whether a pattern of activations is indicative of a row hammer attack. This is determined using a counting mode for corresponding memory sub-banks. Where a likely row hammer attack is detected, the memory controller may activate a sampling mode (rather than the counting mode) for a particular sub-bank to identify which of the row addresses should be refreshed on the memory hardware. The implementations described herein provide a low computational cost alternative to heavy-handed detection mechanisms that require access to significant computing resources to accurately detect and mitigate row hammer attacks.

    Automated recovery of far edge computing infrastructure in a 5G network

    公开(公告)号:US11900127B2

    公开(公告)日:2024-02-13

    申请号:US17545767

    申请日:2021-12-08

    CPC classification number: G06F9/4406 G06F21/606 H04W24/04

    Abstract: Cryptographically-secured deferral tickets provided by a minting process that runs in a secure enclave on a computing device reset an authenticated watchdog timer that reboots the device from a hardware-protected recovery operating system to re-image the device into a known good state if the timer expires. The deferral tickets are written to a secure channel using a symmetric key that is provisioned by repurposing an existing Intel SGX (Software Guard Extension) Versioning Support protocol that enables migration of secrets between enclaves that have the same author. In an illustrative embodiment, the deferral ticket minting process and authenticated watchdog timer execute locally to enable automated recovery of the computing device when utilized in far edge infrastructure of a fifth generation (5G) network such as a distributed unit (DU) of a radio access network (RAN).

    Secure hardware for cross-device trusted applications

    公开(公告)号:US10404466B2

    公开(公告)日:2019-09-03

    申请号:US15459593

    申请日:2017-03-15

    Abstract: Various technologies described herein pertain to a computing device that includes secure hardware (e.g., a TPM, a secure processor of a processing platform, protected memory that includes a software-based TPM, etc.). The secure hardware includes a shared secret, which is shared by the secure hardware and a server computing system. The shared secret is provisioned by the server computing system or a provisioning computing system of a party affiliated with the server computing system. The secure hardware further includes a cryptographic engine that can execute a cryptographic algorithm using the shared secret or a key generated from the shared secret. The cryptographic engine can execute the cryptographic algorithm to perform encryption, decryption, authentication, and/or attestation.

    Attestation protocol for securely booting a guest operating system
    49.
    发明授权
    Attestation protocol for securely booting a guest operating system 有权
    用于安全引导客户机操作系统的认证协议

    公开(公告)号:US09477486B2

    公开(公告)日:2016-10-25

    申请号:US14462113

    申请日:2014-08-18

    Abstract: In a cloud computing environment, a production server virtualization stack is minimized to present fewer security vulnerabilities to malicious software running within a guest virtual machine. The minimal virtualization stack includes support for those virtual devices necessary for the operation of a guest operating system, with the code base of those virtual devices further reduced. Further, a dedicated, isolated boot server provides functionality to securely boot a guest operating system. The boot server is isolated through use of an attestation protocol, by which the boot server presents a secret to a network switch to attest that the boot server is operating in a clean mode. The attestation protocol may further employ a secure co-processor to seal the secret, so that it is only accessible when the boot server is operating in the clean mode.

    Abstract translation: 在云计算环境中,最小化生产服务器虚拟化堆栈,以减少在虚拟机中运行的恶意软件的安全漏洞。 最小的虚拟化堆栈包括对客户操作系统的操作所需的那些虚拟设备的支持,这些虚拟设备的代码基础进一步减少。 此外,专用的隔离引导服务器提供安全引导客户机操作系统的功能。 引导服务器通过使用认证协议进行隔离,引导服务器向网络交换机提供秘密,以证明引导服务器以干净的模式运行。 认证协议可以进一步采用安全协处理器来密封秘密,使得仅当引导服务器以干净模式操作时才可访问。

    PREDICTIVE SERVER-SIDE RENDERING OF SCENES
    50.
    发明申请
    PREDICTIVE SERVER-SIDE RENDERING OF SCENES 有权
    预测服务器端渲染场景

    公开(公告)号:US20160219325A1

    公开(公告)日:2016-07-28

    申请号:US14603213

    申请日:2015-01-22

    CPC classification number: H04N21/42653 A63F13/35 G06T15/20 H04L67/36

    Abstract: A server device and method are provided for use in predictive server-side rendering of scenes based on client-side user input. The server device may include a processor and a storage device holding instructions for an application program executable by the processor to receive, at the application program, a current navigation input in a stream of navigation inputs from a client device over a network, calculate a predicted future navigation input based on the current navigation input and a current application state of the application program, render a future scene based on the predicted future navigation input to a rendering surface, and send the rendering surface to the client device over the network.

    Abstract translation: 提供了一种服务器设备和方法,用于基于客户端用户输入来预测服务器端呈现场景。 服务器设备可以包括处理器和存储设备,其存储用于可由处理器执行的应用程序的指令,以在应用程序处接收来自客户端设备的通过网络的导航输入流中的当前导航输入,计算预测 基于当前导航输入的未来导航输入和应用程序的当前应用状态,基于预测的未来导航输入到渲染表面来呈现未来场景,并通过网络将渲染表面发送到客户端设备。

Patent Agency Ranking