Search Results - Technology+Classifications+%3e+Computers+Electronics+%26+Software+%3e+Cybersecurity

2 Results Sort By:
CC-Hunter: Microarchitecture-Level Framework and Method for Covert Timing Channel Detection
­Researchers at The George Washington University have created a microarchitecture-level framework, which implements novel methods and algorithms developed for the detection of hacking covert timing channels that are used by Trojan/spy processes in order to leak confidential information from computing environments relying on shared hardware. Information...
Published: 1/7/2022   |   Updated: 11/4/2021   |   Inventor(s): Guru Venkataramani, Jie Chen
Keywords(s):  
Category(s): Technology Classifications > Computers Electronics & Software > Cybersecurity, Technology Classifications > Computers Electronics & Software > Computing Architecture
COTSKNIGHT: Practical Defense against Cache Timing Channel Attacks using Cache Monitoring and Partitioning Techniques
Researchers at GW are developing COTSKnight, a novel framework that offers a holistic infrastructure for both detecting and defending against cache-based timing channels. Cache timing channels endangered shared computer system by stealing information without leaving physical traces in shared cache. COTSKnight repurposes the performance monitoring tool...
Published: 1/7/2022   |   Updated: 10/6/2021   |   Inventor(s): Guru Venkataramani, Milos Doroslovacki, Fan Yao, Hongyu Fang
Keywords(s):  
Category(s): Technology Classifications > Computers Electronics & Software > Cloud Computing, Technology Classifications > Computers Electronics & Software > Cybersecurity