| 12399979 |
Provisioning a security component from a cloud host to a guest virtual resource unit |
Michael Bishop Ebersol, David Kimler Altobelli, Jingbo Wu, Qiang Wang |
2025-08-26 |
| 12353903 |
Software isolation of virtual machine resources |
David Alan Hepkin, Michael Bishop Ebersol, Stephanie Sumyi LUCK, Jonathan E. Lange, Bruce J. Sherwin, Jr. +4 more |
2025-07-08 |
| 12327120 |
Verified stack trace generation and accelerated stack-based analysis with shadow stacks |
Jason Lin, Niraj Majmudar, Mehmet Iyigun |
2025-06-10 |
| 12265606 |
Direct assignment of physical devices to confidential virtual machines |
Jason S. Wohlgemuth, Michael Bishop Ebersol, Aditya Bhandari, Steven Adrian West, Emily Cara Clemens +10 more |
2025-04-01 |
| 11989280 |
Pointer authentication failure detection |
Jason Lin, Matthew John Woolman, Mehmet Iyigun |
2024-05-21 |
| 11861364 |
Circular shadow stack in audit mode |
Mehmet Iyigun, Jason Lin, Matthew John Woolman |
2024-01-02 |
| 11709931 |
Shadow stack violation enforcement at module granularity |
Jason Lin, Gregory J. Colombo, Niraj Majmudar, Mehmet Iyigun, Shayne Daniel Hiet-Block +1 more |
2023-07-25 |
| 11500981 |
Shadow stack enforcement range for dynamic code |
Jason Lin, Niraj Majmudar, Mehmet Iyigun |
2022-11-15 |
| 11379579 |
Shadow stack violation enforcement at module granularity |
Jason Lin, Gregory J. Colombo, Niraj Majmudar, Mehmet Iyigun, Shayne Daniel Hiet-Block +1 more |
2022-07-05 |