Cryptographic certification of secure hosted execution environments
AA Baumann, GC Hunt, M Peinado - US Patent 9,425,965, 2016 - Google Patents
Implementations for providing a persistent secure execution environment with a hosted
computer are described. A host operating system of a computing system provides an …
computer are described. A host operating system of a computing system provides an …
System and method for validating program execution at run-time
K Ghose - US Patent 9,767,271, 2017 - Google Patents
(57) ABSTRACT A pipelined processor comprising a cache memory system, fetching
instructions for execution from a portion of said cache memory system, an instruction …
instructions for execution from a portion of said cache memory system, an instruction …
Hosted application sandboxing
I Krasin, A Mistry - US Patent 9,626,507, 2017 - Google Patents
This specification describes technologies relating to soft ware execution. A sandboxing
computer system accesses at least one application file and instantiates a sandbox envi …
computer system accesses at least one application file and instantiates a sandbox envi …
Configurable internet isolation and security for laptops and similar devices
G Coleman, P Martz, K Moritz - US Patent 11,120,125, 2021 - Google Patents
Methods and systems are disclosed for internet isolation and security schemes for a host
computer system having an internet isolation system. The internet isolation system may be …
computer system having an internet isolation system. The internet isolation system may be …
System and method for security and privacy aware virtual machine checkpointing
(57) ABSTRACT A checkpointing method for creating a file representing a restorable state of
a virtual machine in a computing system, comprising identifying processes executing within …
a virtual machine in a computing system, comprising identifying processes executing within …
Protecting application secrets from operating system attacks
DB Probert, J Engel, A Ahmad, AU Kishan… - US Patent …, 2017 - Google Patents
BACKGROUND Many applications contain secrets that must be protected from unauthorized
access. Further, many computing archi tectures require exposing these secrets to system …
access. Further, many computing archi tectures require exposing these secrets to system …
Cryptographic certification of secure hosted execution environments
AA Baumann, GC Hunt, M Peinado - US Patent 9,413,538, 2016 - Google Patents
Implementations for providing a secure execution environment with a hosted computer are
described. A security-enabled processor establishes a hardware-protected memory area …
described. A security-enabled processor establishes a hardware-protected memory area …
Container provisioning based on communications patterns between software components
Embodiments relate to container migration and provisioning. An aspect includes receiving a
request to migrate a composite application to a container-based environment. Another …
request to migrate a composite application to a container-based environment. Another …
Instruction set emulation for guest operating systems
BC Bond, RR Olinsky, GC Hunt - US Patent 9,495,183, 2016 - Google Patents
US PATENT DOCUMENTS 2002fOO 19972 A1 2/2002 Grier 2002fOO691. 92 A1 6/2002
Aegerter 6,668,376 B1 12/2003 Wang et al. 2003/0208595 A1 11/2003 Gouge et al …
Aegerter 6,668,376 B1 12/2003 Wang et al. 2003/0208595 A1 11/2003 Gouge et al …
Application-level sandboxing
Rapid deployments of application-level deceptions (ie, booby traps) implant cyber
deceptions into running legacy applications both on production and decoy systems. Once a …
deceptions into running legacy applications both on production and decoy systems. Once a …