Patents by Inventor Alastair Wolman
Alastair Wolman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230385206Abstract: The present disclosure relates to systems and methods implemented on a memory controller for detecting and mitigating memory attacks (e.g., row hammer attacks). For example, a memory controller may track activations of row addresses within a memory hardware (e.g., a DRAM device) and determine whether a pattern of activations is indicative of a row hammer attack. This is determined using a counting mode for corresponding memory sub-banks. Where a likely row hammer attack is detected, the memory controller may activate a sampling mode (rather than the counting mode) for a particular sub-bank to identify which of the row addresses should be refreshed on the memory hardware. The implementations described herein provide a low computational cost alternative to heavy-handed detection mechanisms that require access to significant computing resources to accurately detect and mitigate row hammer attacks.Type: ApplicationFiled: May 31, 2022Publication date: November 30, 2023Inventors: Ishwar AGARWAL, Stefan SAROIU, Alastair WOLMAN, Daniel Sebastian BERGER
-
Publication number: 20230176876Abstract: Cryptographically-secured deferral tickets provided by a minting process that runs in a secure enclave on a computing device reset an authenticated watchdog timer that reboots the device from a hardware-protected recovery operating system to re-image the device into a known good state if the timer expires. The deferral tickets are written to a secure channel using a symmetric key that is provisioned by repurposing an existing Intel SGX (Software Guard Extension) Versioning Support protocol that enables migration of secrets between enclaves that have the same author. In an illustrative embodiment, the deferral ticket minting process and authenticated watchdog timer execute locally to enable automated recovery of the computing device when utilized in far edge infrastructure of a fifth generation (5G) network such as a distributed unit (DU) of a radio access network (RAN).Type: ApplicationFiled: December 8, 2021Publication date: June 8, 2023Inventors: Stefan SAROIU, Varun GANDHI, Alastair WOLMAN, Landon Prentice COX
-
Publication number: 20230177148Abstract: A health ticket minting process operates in a secure enclave on a computing device to ensure liveness of the enclave should a maliciously-compromised operating system deny service to starve the enclave. Cryptographically-secured health tickets provided by the minting process reset an authenticated watchdog timer (AWDT) that reboots the device from a hardware-protected recovery operating system if the timer expires. The health tickets are written to a secure channel using a symmetric key that is provisioned by repurposing an existing Intel SGX (Software Guard Extension) Versioning Support protocol that enables migration of secrets between enclaves that have the same author. In the event that the enclave fails to make forward progress and health tickets are not minted, then the AWDT expires and forces the reboot and re-imaging to a known good state to evict the malware from the computing device.Type: ApplicationFiled: December 8, 2021Publication date: June 8, 2023Inventors: Stefan SAROIU, Varun GANDHI, Alastair WOLMAN, Landon Prentice COX
-
Publication number: 20230129255Abstract: Aspects of the present disclosure relate to techniques for minimizing the effects of RowHammer and induced charge leakage. In examples, systems and methods for preventing access pattern attacks in random-access memory (RAM) are provided. In aspects, a data request associated with a page table may be determined to be a potential security risk and such potential security risk may be mitigated by randomly selecting a memory region from a subset of memory regions, copying data stored in a memory region associated with a page table entry in the page table to the second memory region, disassociating the second memory region from the subset of memory regions and associating the memory region associated with the page table to the second memory region, and updating the page table entry in the page table to refer to the second memory region.Type: ApplicationFiled: December 28, 2022Publication date: April 27, 2023Applicant: Microsoft Technology Licensing, LLCInventors: Stefan SAROIU, Alastair WOLMAN, Lucian COJOCAR, Kevin Robert LOUGHLIN
-
Publication number: 20230110752Abstract: A method for improving efficiency of routing edge compute traffic from a user equipment (UE) to an edge compute server at a far edge of a cellular network includes provisioning a near edge control unit (CU) and a near edge user plane function (UPF) at a near edge of the cellular network. The method also includes provisioning a far edge CU, a far edge UPF, and an edge compute workload at the far edge. The method also includes receiving UE traffic at one or more distributed units located at the far edge. The UE traffic includes the edge compute traffic and non-edge compute traffic. The method also includes identifying the edge compute traffic among the UE traffic, routing the edge compute traffic to the edge compute workload at the far edge, and routing the non-edge compute traffic to the near edge UPF at the near edge.Type: ApplicationFiled: October 13, 2021Publication date: April 13, 2023Inventors: Alastair WOLMAN, Paramvir BAHL, Landon Prentice COX
-
Patent number: 11567880Abstract: Aspects of the present disclosure relate to techniques for minimizing the effects of RowHammer and induced charge leakage. In examples, systems and methods for preventing access pattern attacks in random-access memory (RAM) are provided. In aspects, a data request associated with a page table may be determined to be a potential security risk and such potential security risk may be mitigated by randomly selecting a memory region from a subset of memory regions, copying data stored in a memory region associated with a page table entry in the page table to the second memory region, disassociating the second memory region from the subset of memory regions and associating the memory region associated with the page table to the second memory region, and updating the page table entry in the page table to refer to the second memory region.Type: GrantFiled: August 28, 2020Date of Patent: January 31, 2023Assignee: Microsoft Technology Licensing, LLCInventors: Stefan Saroiu, Alastair Wolman, Lucian Cojocar, Kevin Robert Loughlin
-
Publication number: 20220374262Abstract: Systems and methods are provided for offloading a task from a central processor in a radio access network (RAN) server to one or more heterogeneous accelerators. For example, a task associated with one or more operational partitions (or a service application) associated with processing data traffic in the RAN is dynamically allocated for offloading from the central processor based on workload status information. One or more accelerators are dynamically allocated for executing the task, where the accelerators may be heterogeneous and may not comprise pre-programming for executing the task. The disclosed technology further enables generating specific application programs for execution on the respective heterogeneous accelerators based on a single set of program instructions.Type: ApplicationFiled: May 18, 2021Publication date: November 24, 2022Applicant: Microsoft Technology Licensing, LLCInventors: Paramvir BAHL, Daehyeok KIM, Anuj KALIA, Alastair WOLMAN
-
Publication number: 20220050793Abstract: Aspects of the present disclosure relate to techniques for minimizing the effects of RowHammer and induced charge leakage. In examples, systems and methods for preventing access pattern attacks in random-access memory (RAM) are provided. In aspects, a data request associated with a page table may be determined to be a potential security risk and such potential security risk may be mitigated by randomly selecting a memory region from a subset of memory regions, copying data stored in a memory region associated with a page table entry in the page table to the second memory region, disassociating the second memory region from the subset of memory regions and associating the memory region associated with the page table to the second memory region, and updating the page table entry in the page table to refer to the second memory region.Type: ApplicationFiled: August 28, 2020Publication date: February 17, 2022Applicant: Microsoft Technology Licensing, LLCInventors: Stefan SAROIU, Alastair Wolman, Lucian COJOCAR, Kevin Robert LOUGHLIN
-
Patent number: 11233804Abstract: A compromise detection system protects data centers (DCs) or other providers in the cloud. The compromise detection system can detect compromised virtual machines (VMs) through changes in network traffic characteristics while avoiding expensive data collection and preserving privacy. The compromise detection system obtains and uses periodically-obtained flow pattern summaries to detect compromised VMs. Agent-based detection on predetermined and compromised VMs can expose (using supervised learning) the network behavior of compromised VMs and then apply the learned model to all VMs in the DC. The compromise detection system can run continuously, protect the privacy of cloud customers, comply with Europe's General Data Protection Regulation (GDPR), and avoid various techniques that both erode privacy and degrade VM performance.Type: GrantFiled: January 28, 2019Date of Patent: January 25, 2022Assignee: Microsoft Technology Licensing, LLCInventors: Behnaz Arzani, Selim Ciraci, Stefan Saroiu, Alastair Wolman, Jack Wilson Stokes, III, Geoff Outhred
-
Patent number: 11032345Abstract: Methods and devices for encoding and decoding data streams are disclosed. In some aspects, the data streams are multimedia data streams. One method disclosed includes obtaining, by a client device, a first multimedia data stream and a second multimedia data stream, the second multimedia data stream being a lower fidelity version of the first multimedia data stream, generating, by the client device, a third multimedia data stream based on differences between the first and second multimedia data streams, compressing, by the client device, the second multimedia data stream to generate a first compressed multimedia data stream, compressing, by the client device, the third multimedia data stream to generate a second compressed multimedia data stream; and transmitting, by the client device, the first and second compressed multimedia data steams to the server.Type: GrantFiled: May 10, 2018Date of Patent: June 8, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Eduardo A Cuervo Laffaye, Alastair Wolman, Stefan Saroiu, Sharad Agarwal, Paramvir Bahl, Landon Cox
-
Patent number: 10978171Abstract: Aspects of the present disclosure relate to techniques for identifying susceptibility to induced charge leakage. In examples, a susceptibility test sequence comprising a cache line flush instruction is used to repeatedly activate a row of a memory unit. The susceptibility test sequence causes induced charge leakage within rows that are physically adjacent to the activated row, such that a physical adjacency map can be generated. In other examples, a physical adjacency map is used to identify a set of adjacent rows to a target row. A susceptibility test sequence is used to repeatedly activate the set of adjacent rows, after which the content of the target row is analyzed to determine whether the any bits of the target row flipped as a result of induced charge leakage. If flipped bits are not identified, an indication is generated that the memory unit is not susceptible to induced charge leakage.Type: GrantFiled: July 31, 2019Date of Patent: April 13, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Stefan Saroiu, Lucian Cojocar, Alastair Wolman
-
Publication number: 20210035654Abstract: Aspects of the present disclosure relate to techniques for identifying susceptibility to induced charge leakage. In examples, a susceptibility test sequence comprising a cache line flush instruction is used to repeatedly activate a row of a memory unit. The susceptibility test sequence causes induced charge leakage within rows that are physically adjacent to the activated row, such that a physical adjacency map can be generated. In other examples, a physical adjacency map is used to identify a set of adjacent rows to a target row. A susceptibility test sequence is used to repeatedly activate the set of adjacent rows, after which the content of the target row is analyzed to determine whether the any bits of the target row flipped as a result of induced charge leakage. If flipped bits are not identified, an indication is generated that the memory unit is not susceptible to induced charge leakage.Type: ApplicationFiled: July 31, 2019Publication date: February 4, 2021Applicant: Microsoft Technology Licensing, LLCInventors: Stefan SAROIU, Lucian COJOCAR, Alastair WOLMAN
-
Patent number: 10805662Abstract: A server device and method are provided for use in predictive server-side rendering of scenes based on client-side user input. The server device may include a processor and a storage device holding instructions for an application program executable by the processor to receive, at the application program, a current navigation input in a stream of navigation inputs from a client device over a network, calculate a predicted future navigation input based on the current navigation input and a current application state of the application program, render a future scene based on the predicted future navigation input to a rendering surface, and send the rendering surface to the client device over the network.Type: GrantFiled: November 25, 2019Date of Patent: October 13, 2020Assignee: Microsoft Technology Licensing, LLCInventors: David Chiyuan Chu, Eduardo Alberto Cuervo Laffaye, Johannes Peter Kopf, Alastair Wolman, Yury Degtyarev, Kyungmin Lee, Sergey Grizan
-
Patent number: 10750139Abstract: A head mounted display device including a processor configured to compute a rendered rendering surface of a predicted scene having a predicted user viewpoint, the predicted user viewpoint being a prediction of a viewpoint that a user will have at a point in time that was predicted for the user of the head mounted display device prior to the point in time, receive, from the user input device, a subsequent user navigation input near the point in time in the stream of user input, determine an actual user viewpoint based on the subsequent user navigation input, determine a user viewpoint misprediction based on the predicted user viewpoint and the actual user viewpoint, and reconstruct a viewport for the actual user viewpoint from the rendered rendering surface.Type: GrantFiled: May 23, 2017Date of Patent: August 18, 2020Assignee: Microsoft Technology Licensing, LLCInventors: David Chiyuan Chu, Eduardo Alberto Cuervo Laffaye, Johannes Peter Kopf, Alastair Wolman, Yury Degtyarev, Kyungmin Lee, Sergey Grizan
-
Publication number: 20200244674Abstract: A compromise detection system protects data centers (DCs) or other providers in the cloud. The compromise detection system can detect compromised virtual machines (VMs) through changes in network traffic characteristics while avoiding expensive data collection and preserving privacy. The compromise detection system obtains and uses periodically-obtained flow pattern summaries to detect compromised VMs. Agent-based detection on predetermined and compromised VMs can expose (using supervised learning) the network behavior of compromised VMs and then apply the learned model to all VMs in the DC. The compromise detection system can run continuously, protect the privacy of cloud customers, comply with Europe's General Data Protection Regulation (GDPR), and avoid various techniques that both erode privacy and degrade VM performance.Type: ApplicationFiled: January 28, 2019Publication date: July 30, 2020Applicant: Microsoft Technology Licensing, LLCInventors: Behnaz ARZANI, Selim CIRACI, Stefan SAROIU, Alastair WOLMAN, Jack Wilson STOKES, III, Geoff OUTHRED
-
Patent number: 10693887Abstract: Technologies pertaining to limiting access to secret data through utilization of sensor-based constraints are described herein. A sensor-based constraint is a constraint that can only be satisfied by predefined readings that may be output by at least one sensor on a mobile computing device. If the sensor on the mobile computing device outputs a reading that satisfies the sensor-based constraint, secret data is provided to a requesting application. Otherwise, the requesting application is prevented from accessing the secret data.Type: GrantFiled: July 12, 2016Date of Patent: June 23, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Stefan Saroiu, Alastair Wolman, Himanshu Raj, He Liu
-
Publication number: 20200092599Abstract: A server device and method are provided for use in predictive server-side rendering of scenes based on client-side user input. The server device may include a processor and a storage device holding instructions for an application program executable by the processor to receive, at the application program, a current navigation input in a stream of navigation inputs from a client device over a network, calculate a predicted future navigation input based on the current navigation input and a current application state of the application program, render a future scene based on the predicted future navigation input to a rendering surface, and send the rendering surface to the client device over the network.Type: ApplicationFiled: November 25, 2019Publication date: March 19, 2020Applicant: Microsoft Technology Licensing, LLCInventors: David Chiyuan Chu, Eduardo Alberto Cuervo Laffaye, Johannes Peter Kopf, Alastair Wolman, Yury Degtyarev, Kyungmin Lee, Sergey Grizan
-
Patent number: 10579910Abstract: A classification system classifies different aspects of content of an input image stream, such as faces, landmarks, events, and so forth. The classification system includes a general classifier and at least one specialized classifier template. The general classifier is trained to classify a large number of different aspects of content, and a specialized classifier can be trained based on a specialized classifier template during operation of the classification system to classify a particular subset of the multiple different aspects of content. The classification system determines when to use the general classifier and when to use a specialized classifier based on class skew, which refers to the temporal locality of a subset of aspects of content in the image stream.Type: GrantFiled: April 20, 2018Date of Patent: March 3, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Matthai Philipose, Haichen Shen, Alastair Wolman, Sharad Agarwal
-
Patent number: 10496824Abstract: Disclosed is a trusted language runtime (TLR) architecture that provides abstractions for developing a runtime for executing trusted applications or portions thereof securely on a mobile device (e.g., a smartphone). TLR offers at least two abstractions to mobile developers: a trustbox and a trustlet. The trustbox is a runtime environment that offers code and data integrity, and confidentiality. Code and data running inside a trustbox cannot be read or modified by any code running outside the trustbox. A trustlet is the code portion of an application that runs inside a trustbox. With TLR, programmers can write applications in .NET and specify which parts of the application handle sensitive data, and thus, run inside the trustbox. With the TLR, the developer places these parts in a trustlet class, and the TLR provides all support needed to run the parts in the trustbox.Type: GrantFiled: June 24, 2011Date of Patent: December 3, 2019Assignee: Microsoft Licensing Technology, LLCInventors: Himanshu Raj, Nuno Santos, Paul England, Stefan Saroiu, Alastair Wolman
-
Patent number: 10491941Abstract: A server device and method are provided for use in predictive server-side rendering of scenes based on client-side user input. The server device may include a processor and a storage device holding instructions for an application program executable by the processor to receive, at the application program, a current navigation input in a stream of navigation inputs from a client device over a network, calculate a predicted future navigation input based on the current navigation input and a current application state of the application program, render a future scene based on the predicted future navigation input to a rendering surface, and send the rendering surface to the client device over the network.Type: GrantFiled: August 30, 2017Date of Patent: November 26, 2019Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: David Chiyuan Chu, Eduardo Alberto Cuervo Laffaye, Johannes Peter Kopf, Alastair Wolman, Yury Degtyarev, Kyungmin Lee, Sergey Grizan