Search Results - technology+classifications+%3e+computers+electronics+%26+software+%3e+cybersecurity

6 Results Sort By:
Reinforcement Learning for Fault-tolerant Energy-efficient NoC Design
Researchers at GW have developed a novel, cost-effective, energy-efficient computer architecture design based on reinforcement learning (RL) for use in various computing applications. The disclosed design has better fault-tolerance, reliability, network latency than existing solutions. The disclosed computer architecture design can include an Error...
Published: 7/30/2024   |   Inventor(s): Ahmed Louri, Ke Wang
Keywords(s):  
Category(s): Technology Classifications > Computers Electronics & Software > Computing Architecture, Technology Classifications > Computers Electronics & Software > Cybersecurity, Technology Classifications > Computers Electronics & Software > Processing Chips
A Hardware-based Cyber-deception Framework to Combat Malware
Researchers at GW have developed a hardware-based cyber-deception framework that can effectively combat malware directed to attacking computer systems. In particular, the framework works deceptively and transparently, to modify the underlying malware during program runtime and strategically deflects the malware from accessing sensitive information associated...
Published: 7/30/2024   |   Inventor(s): Guru Venkataramani, Preet Derasari, Kailash Gogineni
Keywords(s):  
Category(s): Technology Classifications > Computers Electronics & Software > Artificial Intelligence, Technology Classifications > Computers Electronics & Software > Computing Architecture, Technology Classifications > Computers Electronics & Software > Cybersecurity
Reuse-trap: Re-purposing Cache Reuse Distance to Defend against Side Channel Leakage
Researchers at GW have developed a novel solution that serves to capture the activity of an adversary in a cache timing channel. The novel solution can detect advanced attack variants of cache timing channel which can evade the detection of the existing technology by mimicking activities of benign applications and obfuscating mutual eviction patterns....
Published: 7/30/2024   |   Inventor(s): Guru Venkataramani, Milos Doroslovacki, Hongyu Fang
Keywords(s):  
Category(s): Technology Classifications > Computers Electronics & Software > Cloud Computing, Technology Classifications > Computers Electronics & Software > Cybersecurity, Technology Classifications > Computers Electronics & Software > Computing Architecture
Method and System for Detecting Lateral Movement in Enterprise Computer Networks
Researchers at GW have developed a novel solution that can detect lateral movement in enterprise level computer networks. The novel solution can be fully unsupervised, does not require any labeled training data, thus making it highly generalizable to different environments. This solution is particularly useful in detecting advanced adversaries, also...
Published: 7/30/2024   |   Inventor(s): Benjamin Bowman, Craig Laprade, Hao (Howie) Huang
Keywords(s):  
Category(s): Technology Classifications > Computers Electronics & Software > Computing Architecture, Technology Classifications > Computers Electronics & Software > Cybersecurity
Accurate Detection of Binary Code Similarity for Computer Vulnerability Analysis
Researchers at GW have developed a system that can accurately detect binary code similarity in the context of computer vulnerability analysis. The system utilizes a graph neural network model to generate representative embeddings for provenance identification amongst various binary codes extant in the art, to improve the accuracy associated with the...
Published: 7/30/2024   |   Inventor(s): Yuede Ji, Hao (Howie) Huang
Keywords(s):  
Category(s): Technology Classifications > Computers Electronics & Software > Computing Architecture, Technology Classifications > Computers Electronics & Software > Cybersecurity
CC-Hunter: Microarchitecture-Level Framework and Method for Covert Timing Channel Detection
Researchers at The George Washington University have created a microarchitecture-level framework, which implements novel methods and algorithms developed for the detection of hacking covert timing channels that are used by Trojan/spy processes in order to leak confidential information from computing environments relying on shared hardware. Information...
Published: 7/30/2024   |   Inventor(s): Guru Venkataramani, Jie Chen
Keywords(s):  
Category(s): Technology Classifications > Computers Electronics & Software > Cybersecurity, Technology Classifications > Computers Electronics & Software > Computing Architecture