MONITORING SIDE CHANNELS
    1.
    发明申请

    公开(公告)号:US20230044072A1

    公开(公告)日:2023-02-09

    申请号:US17758142

    申请日:2020-01-30

    Abstract: In an example, a method includes providing a computing device with an instruction to cause the computing device to execute the instruction. The method further includes monitoring a side channel of a microarchitectural component of the computing device to obtain an indication of whether or not a state of the microarchitectural component changes as a result of the computing device executing the instruction. The method further includes determining whether or not the indication corresponds to an expected state of the microarchitectural component for the instruction.

    INTRUSION RESILIENT APPLICATIONS
    3.
    发明申请

    公开(公告)号:US20210157918A1

    公开(公告)日:2021-05-27

    申请号:US17047034

    申请日:2019-07-30

    Abstract: In an example there is provided a method for receiving notification of an intrusion event in relation to an application from an intrusion detection system, accessing state data in relation to a state of the application prior to the intrusion event, the state data having been stored on the basis of a change of state of the application, accessing a policy to be applied to the state data in response to the intrusion event, modifying the state data on the basis of the policy, and restoring the application on the basis of the modified state data.

    GENERATING KEYS
    5.
    发明申请

    公开(公告)号:US20220400004A1

    公开(公告)日:2022-12-15

    申请号:US17761701

    申请日:2019-10-16

    Abstract: In an example, a method includes obtaining an initial seed, a public parameter associated with a processing apparatus and an indication of a state of the processing apparatus. The method may further include generating, by the processing apparatus, a key corresponding to the state of the processing apparatus. The state of the processing apparatus may be based on a combination of the initial seed, the public parameter and the indication of the state.

    UPDATING A SECURITY POLICY
    7.
    发明申请

    公开(公告)号:US20210334410A1

    公开(公告)日:2021-10-28

    申请号:US16604160

    申请日:2018-05-02

    Abstract: An example computing system is disclosed comprising storage to store a plurality of security policies for respective applications and storing, for each security policy, a respective security policy digest representing the security policy, a secure hardware component to store a digest of the security policy digests, and a processor to execute a software component to update the respective security policy digest of a first security policy of the plurality of security policies in response to an update to the first security policy, and to cause the secure hardware component to store an updated digest of the security policy digests.

    Mitigating actions
    8.
    发明授权

    公开(公告)号:US10896085B2

    公开(公告)日:2021-01-19

    申请号:US15974625

    申请日:2018-05-08

    Abstract: In an example there is provided a method of applying a mitigation action to a computing system. The method comprises receiving notification of an intrusion event on a computing system. The notification identifies one or more of data, and a process affected by the intrusion event. The method comprises accessing state data corresponding to a state of the computing system prior to the intrusion event, accessing a policy specifying one or more mitigation actions to be applied to the one or more of data, and a process in response to an intrusion event, restoring the one or more of data, and the process on the basis of the state data, and applying a mitigation action according to the policy.

Patent Agency Ranking