| 12008372 |
Techniques for reducing CPU privilege boundary crossings |
Frederick Joseph Jacobs, Sam Scalise |
2024-06-11 |
| 11507415 |
Supporting invocations of the RDTSC (read time-stamp counter) instruction by guest code within a secure hardware enclave |
Vivek Mohan Thampi, Alok Nemchand Kataria, Deep Shah |
2022-11-22 |
| 11327782 |
Supporting migration of virtual machines containing enclaves |
Alok Nemchand Kataria, Deep Shah |
2022-05-10 |
| 11170077 |
Validating the integrity of application data using secure hardware enclaves |
Alok Nemchand Kataria, Achindra Bhatnagar, Sachin Shinde, Deep Shah |
2021-11-09 |
| 10922402 |
Securing secret data embedded in code against compromised interrupt and exception handlers |
Wei Xu, Alok Nemchand Kataria, Rakesh Agarwal |
2021-02-16 |
| 9250942 |
Hardware emulation using on-the-fly virtualization |
Bernhard Jansen, HariGovind V. Ramasamy, Matthias Schunter, Axel Tanner, Diego M. Zamboni |
2016-02-02 |
| 9003402 |
Method and system for injecting function calls into a virtual machine |
Matthew Conover, Bruce Montague |
2015-04-07 |
| 8584254 |
Data access reporting platform for secure active monitoring |
Weidong Cui, Marcus Peinado |
2013-11-12 |