-
公开(公告)号:US20140289392A1
公开(公告)日:2014-09-25
申请号:US13983654
申请日:2013-03-22
Applicant: EMPIRE TECHNOLOGY DEVELOPMENT, LLC
Inventor: Shmuel Ur , DAVID Hirshberg , Vlad Grigore Dabija , Shimon Gruper , Gad S. Sheaffer
IPC: H04L12/26
CPC classification number: G06F11/3003 , G06F11/1479 , G06F11/3093 , G06F21/54 , G06F21/554 , G06F2201/86 , G06F2201/865
Abstract: Methods to facilitate monitoring the execution of a first instance and a second instance, such as multiple instantiations of a program, are generally described. The methods may include generating a first instance and a second instance, appending first monitoring instructions to the first instance to produce a first modified instance and appending second monitoring instructions to the second instance to produce a second modified instance. The first and second monitoring instructions may relate to monitoring an execution of the first instance and the second instance. The processor may further send the first modified instance to a first computing device and send the second modified instance to a second computing device different from the first computing device. The computing devices may provide different computational functionality and/or may split a load in processing the program.
Abstract translation: 通常描述便于监视第一实例和第二实例(诸如程序的多个实例化)的执行的方法。 所述方法可以包括生成第一实例和第二实例,将第一监视指令附加到第一实例以产生第一修改实例,并将第二监视指令附加到第二实例以产生第二修改实例。 第一和第二监视指令可以涉及监视第一实例和第二实例的执行。 处理器还可以将第一修改实例发送到第一计算设备,并将第二修改实例发送到与第一计算设备不同的第二计算设备。 计算设备可以提供不同的计算功能和/或可以在处理程序时拆分负载。
-
公开(公告)号:US09965626B2
公开(公告)日:2018-05-08
申请号:US14370399
申请日:2013-07-18
Applicant: EMPIRE TECHNOLOGY DEVELOPMENT LLC
Inventor: Mordehai Margalit , Shmuel Ur , David Hirshberg , Shimon Gruper
CPC classification number: G06F21/554 , G06F12/1425 , G06F21/74 , G06F21/79
Abstract: Technologies are generally described for systems, devices and methods effective to detect a potential attack on a memory of a memory device. In some examples, a processor may send a request to the memory device. The request may include a request for information that relates to memory writes to the memory of the memory device. The processor may receive a response from the memory device. The response may include the information that relates to the memory writes. The processor may determine, based on the response, an amount of memory of the memory device written to during an interval of time. The processor may detect the potential attack based on the amount of memory written to and based on the interval of time. The processor may then generate an alert based on the detection of the potential attack.
-
公开(公告)号:US09846661B2
公开(公告)日:2017-12-19
申请号:US14333943
申请日:2014-07-17
Applicant: EMPIRE TECHNOLOGY DEVELOPMENT LLC
Inventor: Mordehai Margalit , Shmuel Ur , David Hirshberg , Shimon Gruper , Menahem Kaplan
CPC classification number: G06F13/28 , G06F13/4022
Abstract: Technologies are generally described for systems, devices and methods effective to utilize a solid state memory device. A memory device may include one or more input/output ports effective to receive data at, and facilitate transfer from, the memory device. The memory device may further include a memory controller. The memory controller may be effective to control access to data stored in the memory device. The memory device may further include two or more flash chips effective to store data in the memory device. The memory device may further include a crossbar switch. The crossbar switch may be coupled between the one or more input/output ports and the two or more flash chips. The crossbar switch may be effective to enable the one or more input/output ports to access the two or more flash chips through the memory controller.
-
公开(公告)号:US09430350B2
公开(公告)日:2016-08-30
申请号:US13983654
申请日:2013-03-22
Applicant: EMPIRE TECHNOLOGY DEVELOPMENT, LLC
Inventor: Shmuel Ur , David Hirshberg , Vlad Grigore Dabija , Shimon Gruper , Gad S. Sheaffer , Mordehai Margalit
IPC: G06F15/173 , G06F11/30 , G06F11/14 , G06F21/54 , G06F21/55
CPC classification number: G06F11/3003 , G06F11/1479 , G06F11/3093 , G06F21/54 , G06F21/554 , G06F2201/86 , G06F2201/865
Abstract: Methods to facilitate monitoring the execution of a first instance and a second instance, such as multiple instantiations of a program, are generally described. The methods may include generating a first instance and a second instance, appending first monitoring instructions to the first instance to produce a first modified instance and appending second monitoring instructions to the second instance to produce a second modified instance. The first and second monitoring instructions may relate to monitoring an execution of the first instance and the second instance. The processor may further send the first modified instance to a first computing device and send the second modified instance to a second computing device different from the first computing device. The computing devices may provide different computational functionality and/or may split a load in processing the program.
Abstract translation: 通常描述便于监视第一实例和第二实例(诸如程序的多个实例化)的执行的方法。 所述方法可以包括生成第一实例和第二实例,将第一监视指令附加到第一实例以产生第一修改实例,并将第二监视指令附加到第二实例以产生第二修改实例。 第一和第二监视指令可以涉及监视第一实例和第二实例的执行。 处理器还可以将第一修改实例发送到第一计算设备,并将第二修改实例发送到与第一计算设备不同的第二计算设备。 计算设备可以提供不同的计算功能和/或可以在处理程序时拆分负载。
-
公开(公告)号:US20180330084A1
公开(公告)日:2018-11-15
申请号:US15973455
申请日:2018-05-07
Applicant: Empire Technology Development LLC
Inventor: Mordehai MARGALIT , Shmuel UR , David Hirshberg , Shimon Gruper
CPC classification number: G06F21/554 , G06F12/1425 , G06F21/74 , G06F21/79
Abstract: Technologies are generally described for systems, devices and methods effective to detect a potential attack on a memory of a memory device. In some examples, a processor may send a request to the memory device. The request may include a request for information that relates to memory writes to the memory of the memory device. The processor may receive a response from the memory device. The response may include the information that relates to the memory writes. The processor may determine, based on the response, an amount of memory of the memory device written to during an interval of time. The processor may detect the potential attack based on the amount of memory written to and based on the interval of time. The processor may then generate an alert based on the detection of the potential attack.
-
公开(公告)号:US20150161388A1
公开(公告)日:2015-06-11
申请号:US14370399
申请日:2013-07-18
Applicant: EMPIRE TECHNOLOGY DEVELOPMENT LLC
Inventor: Mordehai Margalit , Shmuel Ur , David Hirshberg , Shimon Gruper
IPC: G06F21/55
CPC classification number: G06F21/554 , G06F12/1425 , G06F21/74 , G06F21/79
Abstract: Technologies are generally described for systems, devices and methods effective to detect a potential attack on a memory of a memory device. In some examples, a processor may send a request to the memory device. The request may include a request for information that relates to memory writes to the memory of the memory device. The processor may receive a response from the memory device. The response may include the information that relates to the memory writes. The processor may determine, based on the response, an amount of memory of the memory device written to during an interval of time. The processor may detect the potential attack based on the amount of memory written to and based on the interval of time. The processor may then generate an alert based on the detection of the potential attack.
Abstract translation: 通常描述了有效地检测对存储器件的存储器的潜在攻击的系统,设备和方法的技术。 在一些示例中,处理器可以向存储器件发送请求。 请求可以包括对与存储器设备的存储器的存储器写入相关的信息的请求。 处理器可以从存储器装置接收响应。 响应可以包括与存储器写入有关的信息。 处理器可以基于响应来确定在一段时间间隔期间写入的存储器件的存储器量。 处理器可以基于写入的存储器的量并基于时间间隔来检测潜在的攻击。 然后,处理器可以基于潜在攻击的检测来生成警报。
-
7.
公开(公告)号:US20140165197A1
公开(公告)日:2014-06-12
申请号:US13976661
申请日:2012-12-06
Applicant: EMPIRE TECHNOLOGY DEVELOPMENT, LLC
Inventor: Shmuel Ur , David Hirshberg , Mordehai Margalit , Vlad Grigore Dabija , Shimon Gruper , Gad S. Sheaffer
IPC: G06F21/56
Abstract: Technologies are generally described for systems and methods configured to produce an executable code. In some examples, a developer may send machine language code to a system manager. The machine language code may include two or more machine language blocks and linking information. The system manager may include a processor configured to permute the machine language blocks to produce permuted machine language code. The processor may modify the linking information based on the permuted machine language code to produce modified linking information. The processor may link the permuted machine language code with use of the modified linking information to produce the executable code.
Abstract translation: 通常描述了用于生成可执行代码的系统和方法的技术。 在某些示例中,开发人员可能会将机器语言代码发送给系统管理员。 机器语言代码可以包括两个或更多个机器语言块和链接信息。 系统管理器可以包括配置成置换机器语言块以产生置换的机器语言代码的处理器。 处理器可以基于置换的机器语言代码修改链接信息以产生修改的链接信息。 处理器可以使用修改的链接信息来链接置换的机器语言代码以产生可执行代码。
-
-
-
-
-
-