Detection and mitigation of side-channel attacks
A side-channel attack and configuration information technology, applied in the detection and mitigation of side-channel attacks, can solve problems such as high cost and insufficient detection and response of side-channel attacks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
example 1
[0058] Example 1: Detecting side channel attacks and analyzing virtual machines suspected of being compromised by side channel attacks
[0059] The server computing device will have duplicate physical hardware resources including processors, storage, memory and networking devices. The server computing device will execute the virtual machine as part of the e-commerce software platform. The virtual machines will be configured to perform functions for the e-commerce software platform, such as processing product data and customer transactions. Each virtual machine will have the following attributes that provide information about the virtual machine's execution on the server computing device: input / output (I / O) usage, memory access, and power required. The e-commerce software platform will use the configuration information to initialize a virtual machine with an operating system, applications, data sources, and virtual hardware resources.
[0060] The virtual machine will use the...
example 2
[0064] Example 2: Detecting and mitigating Denial of Service (DoS) side-channel attacks in a cloud computing environment
[0065] Multiple server computing devices will operate in a cloud computing environment (hereinafter referred to as "the cloud"). A cloud computing environment executes virtual machines as part of an Internet-based data storage platform. The virtual machine will be configured to perform functions for the data storage platform, such as handling data storage, retrieval and display requests. Each virtual machine will have the following attributes that provide information about the virtual machine's execution on the server computing device: input / output (I / O) usage, memory access, power required, and number of processor cycles. The data storage platform will use configuration information to initialize virtual machines with operating systems, applications, data sources, and virtual hardware resources.
[0066] The virtual machine will be accessed via Microsoft...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com
