| 12373356 |
Fast key ID switching via extended paging for cryptographic intra-process isolation |
Michael LeMay, David M. Durham, Andrew V. Anderson, Hans Goran Liljestrand |
2025-07-29 |
| 12321467 |
Cryptographic computing isolation for multi-tenancy and secure software components |
David M. Durham, Michael LeMay, Karanvir S. Grewal, Sergej Deutsch |
2025-06-03 |
| 12306998 |
Stateless and low-overhead domain isolation using cryptographic computing |
Michael LeMay, David M. Durham, Karanvir S. Grewal, Sergej Deutsch |
2025-05-20 |
| 12277234 |
Cryptographic computing in multitenant environments |
David M. Durham, Michael LeMay, Karanvir S. Grewal, Michael E. Kounavis, Sergej Deutsch +4 more |
2025-04-15 |
| 11711201 |
Encoded stack pointers |
Andrew James Weiler, David M. Durham, Michael LeMay, Sergej Deutsch, Michael E. Kounavis +1 more |
2023-07-25 |
| 11698964 |
Malware detection in memory |
Danyu Bi, Yuanyuan Li, Yong Jiang, Pramod Pesara, Selvakumar Panneer +1 more |
2023-07-11 |
| 11669625 |
Data type based cryptographic computing |
David M. Durham, Karanvir S. Grewal, Michael LeMay |
2023-06-06 |
| 11580035 |
Fine-grained stack protection using cryptographic computing |
David M. Durham, Karanvir S. Grewal, Michael LeMay, Andrew James Weiler |
2023-02-14 |
| 11455392 |
Methods and apparatus of anomalous memory access pattern detection for translational lookaside buffers |
Abhishek Basak, Li Chen, Anna Trikalinou, Erdem Aktas, Saeedeh Komijani |
2022-09-27 |
| 11416603 |
Methods, systems, articles of manufacture and apparatus to detect process hijacking |
Zheng Zhang, Jason Martin, Justin E. Gottschlich, Abhilasha Bhargav-Spantzel, Li-Yuan Chen +3 more |
2022-08-16 |
| 11194902 |
Side-channel attack detection using hardware performance counters |
Li Chen, Kai Cong |
2021-12-07 |
| 11188643 |
Methods and apparatus for detecting a side channel attack using hardware performance counters |
Li Chen, Abhishek Basak, Justin E. Gottschlich |
2021-11-30 |
| 11016773 |
Processor trace extensions to facilitate real-time security monitoring |
Beeman C. Strong, Ravi L. Sahita |
2021-05-25 |
| 11004003 |
Machine learning based exploit detection |
— |
2021-05-11 |
| 10915631 |
Deep learning on execution trace data for exploit detection |
Li Chen |
2021-02-09 |
| 10515217 |
Technologies for mitigating call-oriented programming using an inter-module control flow policy |
Mingwei Zhang, Ravi L. Sahita |
2019-12-24 |
| 10372902 |
Control flow integrity |
Ravi L. Sahita |
2019-08-06 |
| 10248424 |
Control flow integrity |
Stanislav Bratanov, David M. Durham, Beeman C. Strong |
2019-04-02 |
| 10061918 |
System, apparatus and method for filtering memory access logging in a processor |
David M. Durham, Michael LeMay, Karanvir S. Grewal, Ravi L. Sahita |
2018-08-28 |