Technique for implementing memory views using a layered virtualization architecture

U Steinberg, OA Ismael - US Patent 10,191,861, 2019 - Google Patents
ABSTRACT A technique implements memory views using a virtualiza tion layer of a
virtualization architecture executing on a node of a network environment. The virtualization …

Malware detection appliance architecture

OA Ismael - US Patent 9,934,376, 2018 - Google Patents
A threat-aware virtualization module may be deployed in a malware detection appliance
architecture and execute on a malware detection system (MDS) appliance to provide exploit …

Late load technique for deploying a virtualization layer underneath a running operating system

U Steinberg, NS Kulkarni - US Patent 10,108,446, 2018 - Google Patents
A late load technique deploys a virtualization layer underneath an operating system
executing on a node of a network environment to enable the virtualization layer to control the …

Injection of content processing delay in an endpoint

OA Ismael, A Aziz - US Patent 9,912,681, 2018 - Google Patents
A malware detection system (MDS) appliance is configured to inject delay associated with
delivery and/or processing of communication traffic directed to one or more endpoints in a …

Micro-virtualization architecture for threat-aware microvisor deployment in a node of a network environment

OA Ismael, A Aziz - US Patent 9,292,686, 2016 - Google Patents
(57) ABSTRACT A micro-virtualization architecture deploys a threat-aware microvisor as a
module of a virtualization system configured to facilitate real-time security analysis, including …

Micro-virtualization architecture for threat-aware module deployment in a node of a network environment

OA Ismael, A Aziz - US Patent 9,946,568, 2018 - Google Patents
A micro-virtualization architecture deploys a threat-aware microvisor as a module of a
virtualization system configured to facilitate real-time security analysis, including exploit …

Threat-aware microvisor

OA Ismael, A Aziz - US Patent 9,740,857, 2017 - Google Patents
A threat-aware microvisor is configured to facilitate real-time security analysis, including
exploit detection and threat intelligence, of operating system processes executing on a node …

Centralized aggregation technique for detecting lateral movement of stealthy cyber-attacks

A Aziz - US Patent 10,454,950, 2019 - Google Patents
A centralized aggregation technique detects lateral movement of a stealthy (ie, covert) cyber-
attack in an enterprise network. A data center security (DCS) appliance may be located at a …

{G-NET}: Effective {GPU} Sharing in {NFV} Systems

K Zhang, B He, J Hu, Z Wang, B Hua, J Meng… - … USENIX Symposium on …, 2018 - usenix.org
Network Function Virtualization (NFV) virtualizes software network functions to offer flexibility
in their design, management and deployment. Although GPUs have demonstrated their …

Rio: a system solution for sharing i/o between mobile systems

A Amiri Sani, K Boos, MH Yun, L Zhong - Proceedings of the 12th annual …, 2014 - dl.acm.org
Mobile systems are equipped with a diverse collection of I/O devices, including cameras,
microphones, sensors, and modems. There exist many novel use cases for allowing an …