Inteum Company
Links
seedsprint
Visible Legacy
RSS
News & Resources
Inteum Company News
Inteum Library
Subscribe
Search Results - guru+venkataramani
4
Results
Sort By:
Published Date
Updated Date
Title
ID
Descending
Ascending
A Hardware-based Cyber-deception Framework to Combat Malware
Researchers at GW have developed a hardware-based cyber-deception framework that can effectively combat malware directed to attacking computer systems. In particular, the framework works deceptively and transparently, to modify the underlying malware during program runtime and strategically deflects the malware from accessing sensitive information associated...
Published: 7/30/2024
|
Inventor(s):
Guru Venkataramani
,
Preet Derasari
,
Kailash Gogineni
Keywords(s):
Category(s):
Technology Classifications > Computers Electronics & Software > Artificial Intelligence
,
Technology Classifications > Computers Electronics & Software > Computing Architecture
,
Technology Classifications > Computers Electronics & Software > Cybersecurity
Reuse-trap: Re-purposing Cache Reuse Distance to Defend against Side Channel Leakage
Researchers at GW have developed a novel solution that serves to capture the activity of an adversary in a cache timing channel. The novel solution can detect advanced attack variants of cache timing channel which can evade the detection of the existing technology by mimicking activities of benign applications and obfuscating mutual eviction patterns....
Published: 7/30/2024
|
Inventor(s):
Guru Venkataramani
,
Milos Doroslovacki
,
Hongyu Fang
Keywords(s):
Category(s):
Technology Classifications > Computers Electronics & Software > Cloud Computing
,
Technology Classifications > Computers Electronics & Software > Cybersecurity
,
Technology Classifications > Computers Electronics & Software > Computing Architecture
CC-Hunter: Microarchitecture-Level Framework and Method for Covert Timing Channel Detection
Researchers at The George Washington University have created a microarchitecture-level framework, which implements novel methods and algorithms developed for the detection of hacking covert timing channels that are used by Trojan/spy processes in order to leak confidential information from computing environments relying on shared hardware. Information...
Published: 7/30/2024
|
Inventor(s):
Guru Venkataramani
,
Jie Chen
Keywords(s):
Category(s):
Technology Classifications > Computers Electronics & Software > Cybersecurity
,
Technology Classifications > Computers Electronics & Software > Computing Architecture
Neuronal calcium sensor proteins as potential therapeutic targets in circadian rhythm and sleep disorders
Sleep health and sleep disorders are major problems. In the US, an estimated 1/3rd of adults and 2/3rds of highschool aged young adults do not get the recommended amount of sleep. Lack of sleep and poor sleep hygiene is associated with a number of health problems. These include obesity, depression, and cardiovascular disease. Additionally, specific...
Published: 12/9/2024
|
Inventor(s):
Venkat Venkataraman
Keywords(s):
Circadium
,
Genetics
,
Sleep
,
Therapeutic
Category(s):
Human Health Care > Therapeutics