Patents by Inventor Vinod Ganapathy
Vinod Ganapathy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20210144170Abstract: A method for preventing a side channel attack by executing an enclave on a remote computing device. The method comprises configuring the enclave based on configuration parameters defined by a computing device. A page created in first enclave cache memory in the remote computing device and adding virtual page address information and page security attributes corresponding to the page in a second enclave cache memory, and an encrypted log entry is created in a protected memory of the remote computing device. The enclave is initiated by comparing the log entry and a second hash key generated by the remote computing device. A new page of pre-defined size is dynamically added to the first enclave cache memory after initiation of the enclave. The enclave is executed based on a successful validation of a size of the page created in first enclave cache memory to be equal to the pre-defined page size.Type: ApplicationFiled: November 9, 2020Publication date: May 13, 2021Inventors: Vinod Ganapathy, Arkaprava Basu, Sujay Yadalam Sudarshan
-
Patent number: 10210014Abstract: In a cloud app market, a cloud infrastructure customer can purchase apps for performing services such as rootkit detection and network security for a customer virtual machine run by the cloud infrastructure customer. A cloud infrastructure provider executes a provider virtual machine monitor or hypervisor on cloud infrastructure. The cloud app is provided with a customer virtual machine monitor nested on the provider virtual machine monitor. The customer virtual machine, together with a nested management domain of the customer, execute on the customer virtual machine monitor.Type: GrantFiled: November 21, 2016Date of Patent: February 19, 2019Assignees: AT&T INTELLECTUAL PROPERTY I, L.P., RUTGERS, THE STATE UNIVERSITY OF NEW JERSEYInventors: Abhinav Srivastava, Vinod Ganapathy
-
Publication number: 20170069004Abstract: In a cloud app market, a cloud infrastructure customer can purchase apps for performing services such as rootkit detection and network security for a customer virtual machine run by the cloud infrastructure customer. A cloud infrastructure provider executes a provider virtual machine monitor or hypervisor on cloud infrastructure. The cloud app is provided with a customer virtual machine monitor nested on the provider virtual machine monitor. The customer virtual machine, together with a nested management domain of the customer, execute on the customer virtual machine monitor.Type: ApplicationFiled: November 21, 2016Publication date: March 9, 2017Inventors: Abhinav Srivastava, Vinod Ganapathy
-
Patent number: 9542216Abstract: In a cloud app market, a cloud infrastructure customer can purchase apps for performing services such as rootkit detection and network security for a customer virtual machine run by the cloud infrastructure customer. A cloud infrastructure provider executes a provider virtual machine monitor or hypervisor on cloud infrastructure. The cloud app is provided with a customer virtual machine monitor nested on the provider virtual machine monitor. The customer virtual machine, together with a nested management domain of the customer, execute on the customer virtual machine monitor.Type: GrantFiled: October 15, 2013Date of Patent: January 10, 2017Assignees: AT&T INTELLECTUAL PROPERTY I, L.P., RUTGERS, THE STATE UNIVERSITY OF NEW JERSEYInventors: Abhinav Srivastava, Vinod Ganapathy
-
Publication number: 20150106803Abstract: In a cloud app market, a cloud infrastructure customer can purchase apps for performing services such as rootkit detection and network security for a customer virtual machine run by the cloud infrastructure customer. A cloud infrastructure provider executes a provider virtual machine monitor or hypervisor on cloud infrastructure. The cloud app is provided with a customer virtual machine monitor nested on the provider virtual machine monitor. The customer virtual machine, together with a nested management domain of the customer, execute on the customer virtual machine monitor.Type: ApplicationFiled: October 15, 2013Publication date: April 16, 2015Applicants: Rutgers, The State University of New Jersey, AT&T Intellectual Property I, LPInventors: Abhinav Srivastava, Vinod Ganapathy
-
Patent number: 8566935Abstract: The subject disclosure presents a novel technique for balancing the tradeoff between security monitoring and energy consumption on mobile devices. Security/energy tradeoffs for host-based detectors focusing on rootkits are analyzed along two axes: a scanning frequency, and a surface of attack. Experimental results are applied to a hypervisor-based framework, and a sweet spot is identified to minimize both energy consumption and a window of vulnerability for critical operating system objects such as code pages and kernel data.Type: GrantFiled: May 12, 2011Date of Patent: October 22, 2013Assignee: AT&T Intellectual Property I, L.P.Inventors: Horacio Andres Lagar-Cavilla, Jeffrey Bickford, Vinod Ganapathy, Liviu Iftode, Alexander Varshavsky
-
Publication number: 20120291126Abstract: The subject disclosure presents a novel technique for balancing the tradeoff between security monitoring and energy consumption on mobile devices. Security/energy tradeoffs for host-based detectors focusing on rootkits are analyzed along two axes: a scanning frequency, and a surface of attack. Experimental results are applied to a hypervisor-based framework, and a sweet spot is identified to minimize both energy consumption and a window of vulnerability for critical operating system objects such as code pages and kernel data.Type: ApplicationFiled: May 12, 2011Publication date: November 15, 2012Applicants: RUTGERS, THE STATE UNIVERSITY OF NEW JERSEY, AT&T INTELLECTUAL PROPERTY I, L.P.Inventors: Horacio Andres Lagar-Cavilla, Jeffrey Bickford, Vinod Ganapathy, Liviu Iftode, Alexander Varshavsky
-
Patent number: 7770153Abstract: A dynamic analysis tool uses anomaly detection to find heap-based bugs. In spite of the evolving nature of the heap, programs generally exhibit several of properties of their heap usage that remain stable. Periodically, during the execution of the program, the analysis tool computes a suite of metrics which are sensitive to the state of the heap. These metrics track heap behavior, and the stability of the heap reflects quantitatively in the values of these metrics. The ranges of stable metrics, obtained by running a program on a multiple input training set, are then treated as indicators of correct behavior, and are used in conjunction with an anomaly detector to find heap-based bugs.Type: GrantFiled: May 20, 2005Date of Patent: August 3, 2010Assignee: Microsoft CorporationInventors: Trishul Chilimbi, Vinod Ganapathy
-
Publication number: 20100071063Abstract: An automatic system for spyware detection and signature generation compares packets of output from a computer in response to standard user inputs, to packets of a standard output set derived from a known clean machine. Differences between these two packet sets are analyzed with respect to whether they relate to unknown web servers and whether they incorporate user-derived information. This analysis is used to provide an automatic detection of and signature generation for spyware infecting the machine.Type: ApplicationFiled: November 28, 2007Publication date: March 18, 2010Applicant: WISCONSIN ALUMNI RESEARCH FOUNDATIONInventors: Hao Wang, Somesh Jha, Vinod Ganapathy
-
Publication number: 20060265694Abstract: A dynamic analysis tool uses anomaly detection to find heap-based bugs. In spite of the evolving nature of the heap, programs generally exhibit several of properties of their heap usage that remain stable. Periodically, during the execution of the program, the analysis tool computes a suite of metrics which are sensitive to the state of the heap. These metrics track heap behavior, and the stability of the heap reflects quantitatively in the values of these metrics. The ranges of stable metrics, obtained by running a program on a multiple input training set, are then treated as indicators of correct behavior, and are used in conjunction with an anomaly detector to find heap-based bugs.Type: ApplicationFiled: May 20, 2005Publication date: November 23, 2006Applicant: Microsoft CorporationInventors: Trishul Chilimbi, Vinod Ganapathy