Cryptographic certification of secure hosted execution environments

AA Baumann, GC Hunt, M Peinado - US Patent 9,425,965, 2016 - Google Patents
Implementations for providing a persistent secure execution environment with a hosted
computer are described. A host operating system of a computing system provides an …

System and method for validating program execution at run-time

K Ghose - US Patent 9,767,271, 2017 - Google Patents
(57) ABSTRACT A pipelined processor comprising a cache memory system, fetching
instructions for execution from a portion of said cache memory system, an instruction …

Hosted application sandboxing

I Krasin, A Mistry - US Patent 9,626,507, 2017 - Google Patents
This specification describes technologies relating to soft ware execution. A sandboxing
computer system accesses at least one application file and instantiates a sandbox envi …

Configurable internet isolation and security for laptops and similar devices

G Coleman, P Martz, K Moritz - US Patent 11,120,125, 2021 - Google Patents
Methods and systems are disclosed for internet isolation and security schemes for a host
computer system having an internet isolation system. The internet isolation system may be …

System and method for security and privacy aware virtual machine checkpointing

P Yang, K Gopalan - US Patent 9,069,782, 2015 - Google Patents
(57) ABSTRACT A checkpointing method for creating a file representing a restorable state of
a virtual machine in a computing system, comprising identifying processes executing within …

Protecting application secrets from operating system attacks

DB Probert, J Engel, A Ahmad, AU Kishan… - US Patent …, 2017 - Google Patents
BACKGROUND Many applications contain secrets that must be protected from unauthorized
access. Further, many computing archi tectures require exposing these secrets to system …

Cryptographic certification of secure hosted execution environments

AA Baumann, GC Hunt, M Peinado - US Patent 9,413,538, 2016 - Google Patents
Implementations for providing a secure execution environment with a hosted computer are
described. A security-enabled processor establishes a hardware-protected memory area …

Container provisioning based on communications patterns between software components

R Jain, M Li, RR Routray, Y Song, CH Tan - US Patent 9,986,031, 2018 - Google Patents
Embodiments relate to container migration and provisioning. An aspect includes receiving a
request to migrate a composite application to a container-based environment. Another …

Instruction set emulation for guest operating systems

BC Bond, RR Olinsky, GC Hunt - US Patent 9,495,183, 2016 - Google Patents
US PATENT DOCUMENTS 2002fOO 19972 A1 2/2002 Grier 2002fOO691. 92 A1 6/2002
Aegerter 6,668,376 B1 12/2003 Wang et al. 2003/0208595 A1 11/2003 Gouge et al …

Application-level sandboxing

F Araujo, DL Schales, MP Stoecklin… - US Patent 10,887,346, 2021 - Google Patents
Rapid deployments of application-level deceptions (ie, booby traps) implant cyber
deceptions into running legacy applications both on production and decoy systems. Once a …