Patents by Inventor Roman Dementiev
Roman Dementiev has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11307854Abstract: A processor of an aspect includes a decode unit to decode an instruction. The instruction is to indicate a destination memory address information. An execution unit is coupled with the decode unit. The execution unit, in response to the decode of the instruction, is to store memory addresses, for at least all initial writes to corresponding data items, which are to occur after the instruction in original program order, to a memory address log. A start of the memory address log is to correspond to the destination memory address information. Other processors, methods, systems, and instructions are also disclosed.Type: GrantFiled: February 7, 2018Date of Patent: April 19, 2022Assignee: Intel CorporationInventors: Kshitij Doshi, Roman Dementiev, Vadim Sukhomlinov
-
Patent number: 10540524Abstract: Technologies for detecting unauthorized memory accesses include a computing device with a processor having transactional memory support. The computing device executes a security assistance thread that starts a transaction using the transactional memory support. Within the transaction, the security assistance thread writes arbitrary data to one or more monitored memory locations. The security assistance thread waits without committing the transaction. The security assistance thread may loop endlessly. The transactional memory support of the computing device detects a transactional abort caused by an external read of the monitored memory location. The computing device analyzes the transactional abort and determines whether a security event has occurred. The computing device performs a security response if a security event has occurred.Type: GrantFiled: March 27, 2015Date of Patent: January 21, 2020Assignee: McAfee, LLCInventors: Roman Dementiev, Igor Muttik, Alex Nayshtut
-
Publication number: 20190243768Abstract: A processor of an aspect includes a decode unit to decode an instruction. The instruction is to indicate a destination memory address information. An execution unit is coupled with the decode unit. The execution unit, in response to the decode of the instruction, is to store memory addresses, for at least all initial writes to corresponding data items, which are to occur after the instruction in original program order, to a memory address log. A start of the memory address log is to correspond to the destination memory address information. Other processors, methods, systems, and instructions are also disclosed.Type: ApplicationFiled: February 7, 2018Publication date: August 8, 2019Inventors: KSHITIJ DOSHI, ROMAN DEMENTIEV, VADIM SUKHOMLINOV
-
Patent number: 10268502Abstract: A method to perform atomic transactions in non-volatile memory (NVM) under hardware transactional memory is disclosed. The method includes tracking an order among transaction log entries that includes arranging transaction logs in an order that is based on when corresponding transactions were executed.Type: GrantFiled: June 29, 2017Date of Patent: April 23, 2019Assignee: Intel CorporationInventors: Kshitij A. Doshi, Vadim Sukhomlinov, Roman Dementiev
-
Publication number: 20190004851Abstract: A method to perform atomic transactions in non-volatile memory (NVM) under hardware transactional memory is disclosed. The method includes tracking an order among transaction log entries that includes arranging transaction logs in an order that is based on when corresponding transactions were executed.Type: ApplicationFiled: June 29, 2017Publication date: January 3, 2019Inventors: KSHITIJ A. DOSHI, VADIM SUKHOMLINOV, ROMAN DEMENTIEV
-
Patent number: 10146538Abstract: Suspendable load address tracking inside transactions is disclosed. An example processing device of implementations of the disclosure includes a transactional memory (TM) read set tracking component circuitry to identify a suspend read tracking instruction within a transaction executed by the processing device, mark load instructions occurring in the transaction subsequent to the identified suspend read tracking instruction with a suspend attribute, wherein the addresses corresponding to the marked load instructions are excluded from a read set maintained for the transaction, identify a resume read tracking instruction within the transaction, and stop marking the load instructions occurring subsequent to the identified resume read tracking instruction with the suspend attribute.Type: GrantFiled: September 30, 2016Date of Patent: December 4, 2018Assignee: Intel CorporationInventors: Raanan Sade, Roman Dementiev, Ravi Rajwar, Ady Tal, Alex Gerber
-
Publication number: 20180095759Abstract: Suspendable load address tracking inside transactions is disclosed. An example processing device of implementations of the disclosure includes a transactional memory (TM) read set tracking component circuitry to identify a suspend read tracking instruction within a transaction executed by the processing device, mark load instructions occurring in the transaction subsequent to the identified suspend read tracking instruction with a suspend attribute, wherein the addresses corresponding to the marked load instructions are excluded from a read set maintained for the transaction, identify a resume read tracking instruction within the transaction, and stop marking the load instructions occurring subsequent to the identified resume read tracking instruction with the suspend attribute.Type: ApplicationFiled: September 30, 2016Publication date: April 5, 2018Inventors: Raanan Sade, Roman Dementiev, Ravi Rajwar, Ady Tal, Alex Gerber
-
Patent number: 9864629Abstract: A technique allows for memory bounds checking for dynamically generated code by using transactional memory support in a processor. The memory bounds checking includes creating output code, identifying read-only memory regions in the output code and creating a map that is provided to a security monitoring thread. The security monitoring thread executes as a transaction and determines if a transactional conflict occurs to the read-only memory region during parallel execution of a monitored thread in the output code.Type: GrantFiled: October 28, 2016Date of Patent: January 9, 2018Assignee: McAfee, Inc.Inventors: Igor Muttik, Alex Nayshtut, Yuriy Bulygin, Andrew A. Furtak, Roman Dementiev
-
Publication number: 20180004511Abstract: An apparatus and method are described for reentering a transactional sequence for hardware transactional memory. For example, one embodiment of a processor comprises: one or more cores to execute instructions and process data; execution circuitry within at least one of the cores to execute a transactional sequence of instructions; a mask value to identify a specified set of architectural state to be saved upon reaching a particular instruction within the transactional sequence of instructions; and a scratchpad memory within the execution circuitry to store the specified set of architectural state upon reaching the particular instruction within the sequence of instructions.Type: ApplicationFiled: July 1, 2016Publication date: January 4, 2018Inventors: ROMAN DEMENTIEV, KSHITIJ A. DOSHI
-
PROCESSORS, METHODS, AND SYSTEMS TO IDENTIFY STORES THAT CAUSE REMOTE TRANSACTIONAL EXECUTION ABORTS
Publication number: 20180004521Abstract: A method of analyzing aborts of transactional execution transactions. Starting a transactional execution transaction with a first logical processor. Performing, with a second logical processor, store to memory instructions, while the first logical processor is performing the transactional execution transaction. Capturing memory addresses of, and instruction pointer values associated with, at least a sample of the store to memory instructions. Performing, with the second logical processor, a first store to memory instruction to a first memory address, which is to cause the transactional execution transaction to abort. Capturing the first memory address. Determining an instruction pointer value associated with the first store to memory instruction by correlating at least the captured first memory address with the captured memory addresses of said at least the sample of the store to memory instructions.Type: ApplicationFiled: July 1, 2016Publication date: January 4, 2018Applicant: Intel CorporationInventors: Andreas Kleen, Raanan Sade, Ahmad Yasin, Ravi Rajwar, Robert S. Chappell, Roman Dementiev -
Publication number: 20170046196Abstract: A technique allows for memory bounds checking for dynamically generated code by using transactional memory support in a processor. The memory bounds checking includes creating output code, identifying read-only memory regions in the output code and creating a map that is provided to a security monitoring thread. The security monitoring thread executes as a transaction and determines if a transactional conflict occurs to the read-only memory region during parallel execution of a monitored thread in the output code.Type: ApplicationFiled: October 28, 2016Publication date: February 16, 2017Inventors: Igor Muttik, Alex Nayshtut, Yuriy Bulygin, Andrew A. Furtak, Roman Dementiev
-
Patent number: 9507938Abstract: A technique allows for memory bounds checking for dynamically generated code by using transactional memory support in a processor. The memory bounds checking includes creating output code, identifying read-only memory regions in the output code and creating a map that is provided to a security monitoring thread. The security monitoring thread executes as a transaction and determines if a transactional conflict occurs to the read-only memory region during parallel execution of a monitored thread in the output code.Type: GrantFiled: December 23, 2014Date of Patent: November 29, 2016Assignee: McAfee, Inc.Inventors: Igor Muttik, Alex Nayshtut, Yuriy Bulygin, Andrew A. Furtak, Roman Dementiev
-
Publication number: 20160283232Abstract: A processor includes a core and a prefetcher. The prefetcher includes logic to issue a request for data including a requested prefetch. The core includes logic to receive an indication of the request, determine whether the request is for a restricted region of memory, and, based upon whether the request is for the restricted region of memory, allow or deny the request.Type: ApplicationFiled: March 27, 2015Publication date: September 29, 2016Inventors: Raanan Sade, Ryan L. Carlson, Larisa Novakovsky, Erik G. Hallnor, Ravi Rajwar, Roman Dementiev
-
Patent number: 9384148Abstract: Technologies for detecting unauthorized memory accesses include a computing device having transactional memory support. The computing device executes a code segment identified as suspicious and detects a transactional abort during execution of the code segment. The computing device may execute a security support thread concurrently with the code segment that reads one or more monitored memory locations. A transactional abort may be caused by a read of the security support thread conflicting with a write from the code segment. The computing device may set a breakpoint within the code segment, and a transactional abort may be caused by execution of the code segment reaching the breakpoint. An abort handler determines whether a security event has occurred and reports the security event. The abort handler may determine whether the security event has occurred based on the cause of the transactional abort. Other embodiments are described and claimed.Type: GrantFiled: December 17, 2013Date of Patent: July 5, 2016Assignee: Intel CorporationInventors: Igor Muttik, Roman Dementiev, Alex Nayshtut
-
Publication number: 20160188243Abstract: Technologies for detecting unauthorized memory accesses include a computing device with a processor having transactional memory support. The computing device executes a security assistance thread that starts a transaction using the transactional memory support. Within the transaction, the security assistance thread writes arbitrary data to one or more monitored memory locations. The security assistance thread waits without committing the transaction. The security assistance thread may loop endlessly. The transactional memory support of the computing device detects a transactional abort caused by an external read of the monitored memory location. The computing device analyzes the transactional abort and determines whether a security event has occurred. The computing device performs a security response if a security event has occurred.Type: ApplicationFiled: March 27, 2015Publication date: June 30, 2016Inventors: Roman Dementiev, Igor Muttik, Alex Nayshtut
-
Publication number: 20160180085Abstract: A technique allows for memory bounds checking for dynamically generated code by using transactional memory support in a processor. The memory bounds checking includes creating output code, identifying read-only memory regions in the output code and creating a map that is provided to a security monitoring thread. The security monitoring thread executes as a transaction and determines if a transactional conflict occurs to the read-only memory region during parallel execution of a monitored thread in the output code.Type: ApplicationFiled: December 23, 2014Publication date: June 23, 2016Inventors: Igor Muttik, Alex Nayshtut, Yuriy Bulygin, Andrew A. Furtak, Roman Dementiev
-
Publication number: 20160026581Abstract: Technologies for detecting unauthorized memory accesses include a computing device having transactional memory support. The computing device executes a code segment identified as suspicious and detects a transactional abort during execution of the code segment. The computing device may execute a security support thread concurrently with the code segment that reads one or more monitored memory locations. A transactional abort may be caused by a read of the security support thread conflicting with a write from the code segment. The computing device may set a breakpoint within the code segment, and a transactional abort may be caused by execution of the code segment reaching the breakpoint. An abort handler determines whether a security event has occurred and reports the security event. The abort handler may determine whether the security event has occurred based on the cause of the transactional abort. Other embodiments are described and claimed.Type: ApplicationFiled: December 17, 2013Publication date: January 28, 2016Inventors: Igor MUTTIK, Roman DEMENTIEV, Alex NAYSHTUT
-
Publication number: 20150278123Abstract: Technologies for detecting unauthorized memory accesses include a computing device having transactional memory support. The computing device executes a transactional memory execution envelope within a security thread. Within the transactional envelope, the security thread reads one or more memory locations. The computing device detects a transactional abort originating from the transactional envelope, and determines whether a security event has occurred. A security event may include an unauthorized write to the monitored memory locations from outside the transactional envelope, including from non-transactional code. The computing device reports any security events that are detected. The computing device may execute several security threads that each monitor a different, non-overlapping memory location. The computing device may spawn a new security thread to monitor a memory location while a previous security thread is handling a transactional abort. Other embodiments are described and claimed.Type: ApplicationFiled: March 28, 2014Publication date: October 1, 2015Inventors: Alex Nayshtut, Igor Muttik, Roman Dementiev
-
Patent number: 6687878Abstract: A system for collaborative document annotation whereby notes (i.e. annotations) associated with a document, such as an image or text document, are stored in a notes database on a central notes server. The documents and associated annotations are treated independently from each other whereby separate data structures are created for the documents and for the associated annotations. A web server application on the server side functions to capture requests from one or more note client applications for creating, storing, editing and retrieving annotations related to specific documents stored on the notes server. On the client side, the notes client functions to display the document that the user wishes to annotate and provides the tools necessary to permit the user to create, edit, delete, retrieve and store notes. A synchronization process transmits the annotations generated by the user from the notes client to the notes server.Type: GrantFiled: March 15, 1999Date of Patent: February 3, 2004Assignee: Real Time Image Ltd.Inventors: Zvika Eintracht, Alexander Ovsiankin, Roman Dementiev, Gil Sideman
-
Patent number: 6519050Abstract: A client/server system for reading, measuring and displaying color density of documents located on a remote file system accessed over a WAN such as the Internet. The color density information displayed corresponds to specific coordinates of documents that are located on the remote image file servers. The invention provides means for reading, displaying and recording color density measurements of original digital images located on remote image file servers rather than representations of these digital images stored on the user's local computer or LAN. A web server application on the server side functions to capture measurement requests from one or more client applications for measuring, sending, recording and retrieving color density measurements related to specific positions of specific documents located on an image filer server.Type: GrantFiled: August 18, 1999Date of Patent: February 11, 2003Assignee: RTImage Ltd.Inventors: Zvika Eintracht, Roman Dementiev