Unlock instant, AI-driven research and patent intelligence for your innovation.

Detection and mitigation of side-channel attacks

A side-channel attack and configuration information technology, applied in the detection and mitigation of side-channel attacks, can solve problems such as high cost and insufficient detection and response of side-channel attacks

Inactive Publication Date: 2015-06-10
EMPIRE TECH DEV LLC
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Existing computer and network security architectures are not well designed to detect and respond to side channel attacks effectively, especially without introducing prohibitive costs and inefficiencies into the very systems they are designed to protect

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Detection and mitigation of side-channel attacks
  • Detection and mitigation of side-channel attacks
  • Detection and mitigation of side-channel attacks

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0058] Example 1: Detecting side channel attacks and analyzing virtual machines suspected of being compromised by side channel attacks

[0059] The server computing device will have duplicate physical hardware resources including processors, storage, memory and networking devices. The server computing device will execute the virtual machine as part of the e-commerce software platform. The virtual machines will be configured to perform functions for the e-commerce software platform, such as processing product data and customer transactions. Each virtual machine will have the following attributes that provide information about the virtual machine's execution on the server computing device: input / output (I / O) usage, memory access, and power required. The e-commerce software platform will use the configuration information to initialize a virtual machine with an operating system, applications, data sources, and virtual hardware resources.

[0060] The virtual machine will use the...

example 2

[0064] Example 2: Detecting and mitigating Denial of Service (DoS) side-channel attacks in a cloud computing environment

[0065] Multiple server computing devices will operate in a cloud computing environment (hereinafter referred to as "the cloud"). A cloud computing environment executes virtual machines as part of an Internet-based data storage platform. The virtual machine will be configured to perform functions for the data storage platform, such as handling data storage, retrieval and display requests. Each virtual machine will have the following attributes that provide information about the virtual machine's execution on the server computing device: input / output (I / O) usage, memory access, power required, and number of processor cycles. The data storage platform will use configuration information to initialize virtual machines with operating systems, applications, data sources, and virtual hardware resources.

[0066] The virtual machine will be accessed via Microsoft...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Methods, systems, and computer readable storage media for preventing side-channel attacks are disclosed. A computing resource, such as a virtual machine, operating on a computing device or within a computing environment may be duplicated. Properties associated with the computing resource and the duplicate computing resource may be monitored for discrepancies. The discrepancies may be indicative of a security event, such as a virus or side-channel attack. Detected security events may be handled by replacing a computing resource with a duplicate computing resource.

Description

Background technique [0001] Encryption is an important security component for every computing device and network system. The successful implementation of secure and efficient encryption protocols has created confidence among the general public that business computing networks and applications, such as shared computing resources and personal information applications, are secure. This confidence has driven dramatic growth in both industries. Illustrative shared computing resources include distributed computing systems (ie, cloud computing environments), while illustrative personal information applications include online banking and electronic commerce ("e-commerce") applications. [0002] Still, no security system is infallible. While conventional encryption systems are effective at thwarting direct attacks designed to, for example, obtain keys or to encrypt data, they remain vulnerable to certain indirect attacks such as side-channel attacks. Typically, side-channel attacks ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F11/00
CPCG06F21/561
Inventor M·玛格里特
Owner EMPIRE TECH DEV LLC
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More