| 11784786 |
Mitigating security vulnerabilities with memory allocation markers in cryptographic computing systems |
Sergej Deutsch, David M. Durham, Karanvir S. Grewal, Michael LeMay |
2023-10-10 |
| 11775332 |
Technologies for memory replay prevention using compressive encryption |
David M. Durham, Siddhartha Chhabra |
2023-10-03 |
| 11711201 |
Encoded stack pointers |
Andrew James Weiler, David M. Durham, Michael LeMay, Sergej Deutsch, Salmin Sultana +1 more |
2023-07-25 |
| 11704297 |
Collision-free hashing for accessing cryptographic computing metadata and for cache expansion |
Santosh Ghosh, Sergej Deutsch, Michael LeMay, David M. Durham |
2023-07-18 |
| 11693754 |
Aggregate GHASH-based message authentication code (MAC) over multiple cachelines with incremental updates |
David M. Durham, Karanvir S. Grewal, Sergej Deutsch |
2023-07-04 |
| 11657162 |
Adversarial training of neural networks using information about activation path differentials |
Antonios Papadimitriou, Anindya Paul, Micah J. Sheller, Li Chen, Cory Cornelius +1 more |
2023-05-23 |
| 11580234 |
Implicit integrity for cryptographic computing |
Santosh Ghosh, Sergej Deutsch, David M. Durham |
2023-02-14 |
| 11575504 |
Cryptographic computing engine for memory load and store units of a microarchitecture pipeline |
David M. Durham, Michael LeMay, Santosh Ghosh, Sergej Deutsch, Anant Vithal Nori +3 more |
2023-02-07 |
| 11574175 |
Security optimizing compute distribution in a hybrid deep learning environment |
Oleg Pogorelik, Alex Nayshtut, Raizy Kellermann, David M. Durham |
2023-02-07 |
| 11568211 |
Defending neural networks by randomizing model weights |
David M. Durham, Oleg Pogorelik, Alex Nayshtut, Omer Ben-Shalom, Antonios Papadimitriou |
2023-01-31 |
| 11562063 |
Encoded inline capabilities |
Michael LeMay, David M. Durham, Barry E. Huntley, Vedvyas Shanbhogue, Jason W. Brandt +12 more |
2023-01-24 |