Detection of side-channel attacks between virtual machines
A side-channel attack and virtual machine technology, applied to computer security devices, instruments, computing, etc., can solve problems such as spying and fear
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0019] In the following detailed description, reference is made to the accompanying drawings, which form a part of the detailed description. In the drawings, similar symbols typically identify similar components, unless context dictates otherwise. The illustrative embodiments described in the detailed description, drawings, and claims are not meant to be limiting. Other embodiments may be utilized, and other changes may be made, without departing from the spirit or scope of the subject matter presented herein. As generally described herein and illustrated in the drawings, the aspects of the present disclosure may be arranged, substituted, combined, divided and designed in a wide variety of different configurations, all of which are expressly contemplated herein .
[0020] The present disclosure is directed, inter alia, to a method, apparatus, system, apparatus and / or computer program product generally described in relation to the operation of a detector that identifies side-...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com