Patents by Inventor ASHISH VENKAT

ASHISH VENKAT has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9135435
    Abstract: This disclosure is directed to binary translator driven program state relocation. In general, a device may protect vulnerable program functions by setting them as non-executable. If an attempt is made to execute a protected program function, the program may trap to a binary translator in the device that may be configured to relocate program state from what has already been established (e.g., on a stack register). Program state may include resources (e.g., memory locations) used by the program during the course of execution. The binary translator may then translate the program into an executable form based on the relocated program state, and may be executed accordingly. Intruding code that attempts to overcome normal program execution and implement hostile operations (e.g., based the program state that is reflected in the stack register) will not function as intended since the relocated program state will cause unexpected results.
    Type: Grant
    Filed: February 13, 2013
    Date of Patent: September 15, 2015
    Assignee: Intel Corporation
    Inventors: Ashish Venkat, Arvind Krishnaswamy, Koichi Yamada, Palanivelrajan Rajan Shanmugavelayutham
  • Publication number: 20140229717
    Abstract: This disclosure is directed to binary translator driven program state relocation. In general, a device may protect vulnerable program functions by setting them as non-executable. If an attempt is made to execute a protected program function, the program may trap to a binary translator in the device that may be configured to relocate program state from what has already been established (e.g., on a stack register). Program state may include resources (e.g., memory locations) used by the program during the course of execution. The binary translator may then translate the program into an executable form based on the relocated program state, and may be executed accordingly. Intruding code that attempts to overcome normal program execution and implement hostile operations (e.g., based the program state that is reflected in the stack register) will not function as intended since the relocated program state will cause unexpected results.
    Type: Application
    Filed: February 13, 2013
    Publication date: August 14, 2014
    Inventors: ASHISH VENKAT, Arvind Krishnaswamy, KOICHI YAMADA, PALANIVELRAJAN RAJAN SHANMUGAVELAYUTHAM