Princeton Docket # 15-3171-1Researchers at Princeton University, Department of Electrical Engineering, have developed a distributed architecture to monitor and attest the security health of cloud customers' virtual machines (VMs) in a cloud computing system.Cloud providers want to monitor VMs to provide a secure and efficient computing environment to...
Published: 1/29/2018
|
Inventor(s): Ruby Lee, Tianwei Zhang
Keywords(s): computers/software, cyber security, data security
Category(s): Computers and Software
|
Princeton Docket # 15-3105-1Researchers at Princeton University, Department of Electrical Engineering, have developed a new cache fill strategy and cache architecture to secure the existing processor cache to prevent information leakage through cache side-channel attacks.Correctly functioning caches have been shown to leak critical secrets like encryption...
Published: 3/15/2018
|
Inventor(s): Ruby Lee, Fangfei Liu
Keywords(s):
Category(s): Computers and Software
|
Princeton Docket #14-2960
Computer applications are downloaded frequently from unknown sources. One has to trust that the applications do not do anything harmful. In cloud computing, third-party applications are frequently used, like analytics or management programs, to process proprietary or high value data. If these applications are allowed to process...
Published: 3/15/2018
|
Inventor(s): Ruby Lee, Pramod Jamkhedkar, YU-Yuan Chen
Keywords(s): computers/software, data security
Category(s): Computers and Software
|
Princeton Docket #12-2821-1
Researchers at Princeton University have developed a novel method for the protection of data stored in computer data centers, such as used by Google, Facebook, Amazon and other cloud computing providers. Physical attacks compromising the security of information technology infrastructures have been identified as one of the...
Published: 3/15/2018
|
Inventor(s): Ruby Lee, Jakub Szefer, Pramod Jamkhedkar, YU-Yuan Chen
Keywords(s): computers/software, data security
Category(s): Computers and Software
|
Princeton Docket #09-2533-1
A system and method for processor-based security is provided, for on-chip security and trusted computing services for software applications. Secure execution environments (compartments or enclaves) are provided for executing trusted software by a secure processor and a trusted hypervisor. Secure memory and secure storage...
Published: 3/15/2018
|
Inventor(s): Ruby Lee, David Champagne
Keywords(s): computers/software
Category(s): Computers and Software
|
Princeton Docket #09-2534-1This invention proposes a new functional unit to store constants and tables, and new instructions that can read multiple constants in parallel, to speed up the software processing of various algorithms, including the AES encryption and decryption algorithms. AES is the NIST’s Advanced Encryption Standard (AES) which...
Published: 3/15/2018
|
Inventor(s): Ruby Lee, YU-Yuan Chen
Keywords(s): computers/software, cyber security, data security, microprocessor
Category(s): Computers and Software
|
Princeton Docket #09-2526-1The invention is a new method of designing cache memories used in computers. It achieves best-in-class performance for various performance metrics, previously achievable only by different conventional cache architectures. In particular, it combines benefits of Fully-Associative caches and Direct-Mapped caches, in a novel way...
Published: 3/15/2018
|
Inventor(s): Ruby Lee, Zhenghong Wang
Keywords(s): computers/software, data security, microprocessor
Category(s): Computers and Software
|
Princeton Docket #09-2495-1
Researchers at Princeton have developed a new device to improve the security of computers, communication devices and entertainment devices. The invention consists of a set of hardware registers and mechanisms that define a small set of fundamental hardware trust anchors, and cryptographic and tagging mechanisms that can...
Published: 3/15/2018
|
Inventor(s): Ruby Lee, Jeffrey Dwoskin
Keywords(s): computers/hardware, data security, microprocessor, system on chip (SOC)
Category(s): Computers and Software
|
Princeton Docket #07-2385-1Researchers at Princeton University have developed a new design for shifters that utilizes Inverse Butterfly or Butterfly Routing Circuits. Princeton is currently seeking industrial collaborators to commercialize this technology.The design excels in its ability to perform permutations, so it can efficiently perform both existing...
Published: 3/15/2018
|
Inventor(s): Ruby Lee, Yedidya Hilewitz
Keywords(s): baseband processor, communications, computers/hardware, cryptography, multimedia, steganography
Category(s): Computers and Software
|
Princeton Docket #00-1712-1
The method and system provides a set of permutation primitives for current and future 2-D multimedia programs which are based on decomposing images and objects into atomic units, then finding the permutations desired for the atomic units. The subword permutation instructions for these 2-D building blocks are also defined...
Published: 3/15/2018
|
Inventor(s): Ruby Lee
Keywords(s): computers/software
Category(s): Computers and Software
|