-
公开(公告)号:US20170187696A1
公开(公告)日:2017-06-29
申请号:US14757598
申请日:2015-12-23
申请人: Ratinder Ahuja , Dmitri Rubakha , Philip B. Tricca , Samir Shah
发明人: Ratinder Ahuja , Dmitri Rubakha , Philip B. Tricca , Samir Shah
CPC分类号: H04L63/06 , H04L67/16 , H04L67/2804 , H04L67/2809 , H04W4/38
摘要: Data aggregation includes receiving, from an electronic device, a plurality of sensor data packets, wherein the plurality of sensor data packets are received from at least one sensor of the electronic device, and wherein each of the plurality of sensor data packets comprise a tag identifying a classification of the sensor data in the sensor data packet, applying a user-specific policy to the plurality of sensor data packets, aggregating the plurality of sensor data packets based on the user-specific policy to obtain aggregated sensor data, and transmitting the aggregated sensor data to a service broker.
-
公开(公告)号:US20160188873A1
公开(公告)日:2016-06-30
申请号:US14583620
申请日:2014-12-27
申请人: Ned M. Smith , Dmitri Rubakha , Samir Shah , Jason Martin , Micah J. Sheller , Somnath Chakrabarti , Bin Xing
发明人: Ned M. Smith , Dmitri Rubakha , Samir Shah , Jason Martin , Micah J. Sheller , Somnath Chakrabarti , Bin Xing
CPC分类号: G06F21/53 , G06F21/34 , G06F2221/033 , H04L9/321 , H04L9/3247 , H04L9/3263
摘要: In an example, a computing device includes a trusted execution environment (TEE), including an enclave. The enclave may include both a binary translation engine (BTE) and an input verification engine (IVE). In one embodiment, the IVE receives a trusted binary as an input, and analyzes the trusted binary to identify functions, classes, and variables that perform input/output operations. To ensure the security of these interfaces, those operations may be performed within the enclave. The IVE tags the trusted binary and provides the binary to the BTE. The BTE then translates the trusted binary into a second format, including designating the tagged portion for execution within the enclave. The BTE may also sign the new binary in the second format and export it out of the enclave.
摘要翻译: 在一个示例中,计算设备包括可信执行环境(TEE),包括飞地。 飞地可以包括二进制翻译引擎(BTE)和输入验证引擎(IVE)。 在一个实施例中,IVE接收可信二进制作为输入,并且分析可信二进制以识别执行输入/输出操作的功能,类和变量。 为了确保这些接口的安全性,可以在飞地内执行这些操作。 IVE标记可信任的二进制文件,并向BTE提供二进制文件。 BTE然后将可信二进制文件转换为第二格式,包括指定用于在飞地内执行的标记部分。 BTE也可能以第二种格式签署新的二进制文件,并将其从飞地出口。
-
3.
公开(公告)号:US20170116419A1
公开(公告)日:2017-04-27
申请号:US14924493
申请日:2015-10-27
申请人: Carl D. Woodward , Jennifer Mankin , Dmitri Rubakha , Palanivel Rajan Shanmugavelayutham , Vadim Sukhomlinov
发明人: Carl D. Woodward , Jennifer Mankin , Dmitri Rubakha , Palanivel Rajan Shanmugavelayutham , Vadim Sukhomlinov
CPC分类号: G06F21/54 , G06F9/542 , G06F12/10 , G06F21/52 , G06F21/554 , G06F21/566 , G06F2212/657 , G06F2221/034
摘要: Providing synchronous processing of the designated computing events using hardware-assisted virtualization technology by performing at least the following: detecting a designated computing event using a high priority, low capability routine, creating a copy code in an alternate memory space of a first code located in a first memory space, modifying the copy code to call for analysis of at least a portion of the copy code that corresponds to the first code, switching execution of the first code with the modified copy code using an address translation data structure that translates a guest memory address to a host memory address after a return of the high priority, low capability routine; and analyzing synchronously the at least a portion of the code within the copy code that corresponds to the first code based on the replacement of the first code with the modified copy code.
-
4.
公开(公告)号:US09904782B2
公开(公告)日:2018-02-27
申请号:US14924493
申请日:2015-10-27
申请人: Carl D. Woodward , Jennifer Mankin , Dmitri Rubakha , Palanivel Rajan Shanmugavelayutham , Vadim Sukhomlinov
发明人: Carl D. Woodward , Jennifer Mankin , Dmitri Rubakha , Palanivel Rajan Shanmugavelayutham , Vadim Sukhomlinov
CPC分类号: G06F21/54 , G06F9/542 , G06F12/10 , G06F21/52 , G06F21/554 , G06F21/566 , G06F2212/657 , G06F2221/034
摘要: Providing synchronous processing of the designated computing events using hardware-assisted virtualization technology by performing at least the following: detecting a designated computing event using a high priority, low capability routine, creating a copy code in an alternate memory space of a first code located in a first memory space, modifying the copy code to call for analysis of at least a portion of the copy code that corresponds to the first code, switching execution of the first code with the modified copy code using an address translation data structure that translates a guest memory address to a host memory address after a return of the high priority, low capability routine; and analyzing synchronously the at least a portion of the code within the copy code that corresponds to the first code based on the replacement of the first code with the modified copy code.
-
公开(公告)号:US20220075874A1
公开(公告)日:2022-03-10
申请号:US17479721
申请日:2021-09-20
摘要: A system for securing electronic devices includes a processor, a storage medium communicatively coupled to the processor, and a monitoring application comprising computer-executable instructions on the medium. The instructions are readable by the processor. The monitoring application is configured to receive an indication that a client has been affected by malware, cause the client to boot from a trusted operating system image, cause a launch of a secured security application on the client from a trusted application image, and analyze a malware status of the client through the secured security application.
-
公开(公告)号:US20180115585A1
公开(公告)日:2018-04-26
申请号:US15791840
申请日:2017-10-24
申请人: Dmitri Rubakha
发明人: Dmitri Rubakha
摘要: There is disclosed a computing apparatus, including: a hardware platform; a service mapping requirements table including a plurality of components and having associated therewith a plurality of service requirements; an isolation platform; and a security policy engine configured to: receive a new appliance image for the isolation platform; scan the new appliance image and build a bill of materials (BoM) for the new container image, the BoM including a plurality of components; search the service mapping requirements table for the plurality of components and identify service requirements for the components; and generate a security policy for the new appliance image.
-
-
-
-
-