Issued Patents 2019
Showing 1–25 of 27 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 10515217 | Technologies for mitigating call-oriented programming using an inter-module control flow policy | Mingwei Zhang, Salmin Sultana | 2019-12-24 |
| 10515023 | System for address mapping and translation protection | Gilbert Neiger, Vedvyas Shanbhogue, David M. Durham, Andrew V. Anderson, David A. Koufaty +7 more | 2019-12-24 |
| 10503902 | System, apparatus and method for detecting a data-oriented programming attack | Li Chen | 2019-12-10 |
| 10503664 | Virtual machine manager for address mapping and translation protection | David M. Durham, Gilbert Neiger, Vedvyas Shanbhogue, Andrew V. Anderson, Michael LeMay +7 more | 2019-12-10 |
| 10452423 | Method and apparatus for light-weight virtualization contexts | Deepak Gupta, Barry E. Huntley | 2019-10-22 |
| 10445494 | Attack protection for valid gadget control transfers | Vedvyas Shanbhogue, Yuriy Bulygin, Xiaoning Li, Jason W. Brandt | 2019-10-15 |
| 10437990 | Detection of return oriented programming attacks in a processor | Yuriy Bulygin, Gideon Gerzon, Sameer Desai, Hisham Shafi, Andrew A. Furtak +3 more | 2019-10-08 |
| 10430580 | Processor extensions to protect stacks during ring transitions | Vedvyas Shanbhogue, Jason W. Brandt, Barry E. Huntley, Baiju V. Patel, Deepak Gupta | 2019-10-01 |
| 10394556 | Hardware apparatuses and methods to switch shadow stack pointers | Vedvyas Shanbhogue, Jason W. Brandt, Barry E. Huntley, Baiju V. Patel, Deepak Gupta | 2019-08-27 |
| 10394595 | Method to manage guest address space trusted by virtual machine monitor | Gilbert Neiger, Deepak Gupta, Barry E. Huntley, Vedvyas Shanbhogue, Joseph F. Cihula | 2019-08-27 |
| 10379888 | Adaptive integrity verification of software and authorization of memory access | Uday Savagaonkar | 2019-08-13 |
| 10374805 | Technologies for trusted I/O for multiple co-existing trusted execution environments under ISA control | Siddhartha Chhabra, Reshma Lal, Reouven Elbaz, Bin Xing | 2019-08-06 |
| 10372902 | Control flow integrity | Salmin Sultana | 2019-08-06 |
| 10366228 | Detection and mitigation of malicious invocation of sensitive code | Lu Deng, Vedvyas Shanbhogue, Lixin Lu, Alexander Shepsen, Igor Tatourian | 2019-07-30 |
| 10360374 | Techniques for control flow protection | Abhishek Basak, Vedvyas Shanbhogue | 2019-07-23 |
| 10353831 | Trusted launch of secure enclaves in virtualized environments | Scott H. Robinson, Mark W. Shanahan, Karanvir S. Grewal, Nitin V. Sarangdhar, Carlos V. Rozas +2 more | 2019-07-16 |
| 10325108 | Method and apparatus for range based checkpoints in a storage device | Xiaoning Li, Benjamin W. Boyer, Sanjeev N. Trika, Adrian R. Pearson | 2019-06-18 |
| 10324863 | Protected memory view for nested page table access by virtual machine guests | Michael LeMay, David M. Durham, Andrew V. Anderson | 2019-06-18 |
| 10311252 | Technologies for protecting dynamically generated managed code with protection domains | Xiaoning Li, Mingqiu Sun, David A. Koufaty | 2019-06-04 |
| 10303899 | Secure public cloud with protected guest-verified host control | David M. Durham, Gilbert Neiger, Barry E. Huntley, Baiju V. Patel | 2019-05-28 |
| 10296366 | Virtualization exceptions | Gilbert Neiger, Mayank Bomb, Manohar R. Castelino, Robert S. Chappell, David M. Durham +5 more | 2019-05-21 |
| 10289570 | Detecting data corruption by control flow interceptions | Xiaoning Li, Lixin Lu | 2019-05-14 |
| 10262162 | Control transfer termination instructions of an instruction set architecture (ISA) | Vedvyas Shanbhogue, Jason W. Brandt, Uday Savagaonkar | 2019-04-16 |
| 10235301 | Dynamic page table edit control | Michael LeMay, David M. Durham, Andrew V. Anderson, Gilbert Neiger | 2019-03-19 |
| 10223528 | Technologies for deterministic code flow integrity protection | Michael E. Kounavis, David M. Durham, Karanvir S. Grewal | 2019-03-05 |