DETECTION AND MITIGATION OF SIDE-CHANNEL ATTACKS
First Claim
Patent Images
1. A system for preventing side-channel attacks, the system comprising:
- a computing device;
a non-transitory storage medium configured to be in communication with the computing device,wherein the storage medium contains one or more programming instructions that, when executed, cause the computing device to;
retrieve information associated with one or more virtual machines operating on the computing device, the one or more virtual machines comprising one or more properties,execute one or more duplicate virtual machines comprising one or more duplicate properties, each duplicate virtual machine configured as a substantially identical instance of a counterpart virtual machine based on the information,provide each duplicate virtual machine with substantially identical operational data as the counterpart virtual machine,monitor the one or more duplicate properties of each duplicate virtual machine and the one or more properties of the counterpart virtual machine for a discrepancy, andanalyze counterpart virtual machines exhibiting a discrepancy for one or more security events.
3 Assignments
0 Petitions
Accused Products
Abstract
Methods, systems, and computer readable storage media for preventing side-channel attacks are disclosed. A computing resource, such as a virtual machine, operating on a computing device or within a computing environment may be duplicated. Properties associated with the computing resource and the duplicate computing resource may be monitored for discrepancies. The discrepancies may be indicative of a security event, such as a virus or side-channel attack. Detected security events may be handled by replacing a computing resource with a duplicate computing resource.
35 Citations
65 Claims
-
1. A system for preventing side-channel attacks, the system comprising:
-
a computing device; a non-transitory storage medium configured to be in communication with the computing device, wherein the storage medium contains one or more programming instructions that, when executed, cause the computing device to; retrieve information associated with one or more virtual machines operating on the computing device, the one or more virtual machines comprising one or more properties, execute one or more duplicate virtual machines comprising one or more duplicate properties, each duplicate virtual machine configured as a substantially identical instance of a counterpart virtual machine based on the information, provide each duplicate virtual machine with substantially identical operational data as the counterpart virtual machine, monitor the one or more duplicate properties of each duplicate virtual machine and the one or more properties of the counterpart virtual machine for a discrepancy, and analyze counterpart virtual machines exhibiting a discrepancy for one or more security events. - View Dependent Claims (2, 4, 5, 6, 7, 8, 9, 10)
-
-
3. (canceled)
-
11-35. -35. (canceled)
-
36. A method for preventing side-channel attacks in a distributed computing system, the method comprising:
-
retrieving information associated with one or more virtual machines operating on one or more computing devices arranged in a distributed computing system, the one or more virtual machines comprising one or more properties; executing, on the one or more computing devices, one or more duplicate virtual machines comprising one or more duplicate properties, each duplicate virtual machine configured as a substantially identical instance of a counterpart virtual machine based on the information; providing each duplicate virtual machine with substantially identical operational data as the counterpart virtual machine; monitoring the one or more duplicate properties of each duplicate virtual machine and the one or more properties of the counterpart virtual machine for a discrepancy; and analyzing counterpart virtual machines exhibiting a discrepancy for one or more security events. - View Dependent Claims (38, 40, 41, 42, 43, 44, 45, 46)
-
-
37. (canceled)
-
39. (canceled)
-
47-53. -53. (canceled)
-
54. A computer readable storage medium having computer readable program code configured to prevent side-channel attacks of a distributed computing system embodied therewith, the computer readable program code comprising:
-
computer readable program code configured to retrieve information associated with one or more virtual machines operating on one or more computing devices arranged in a distributed computing system, the one or more virtual machines comprising one or more properties; computer readable program code configured to execute, on the one or more computing devices, one or more duplicate virtual machines comprising one or more duplicate properties, each duplicate virtual machine configured as a substantially identical instance of a counterpart virtual machine based on the information; computer readable program code configured to provide each duplicate virtual machine with substantially identical operational data as the counterpart virtual machine; computer readable program code configured to monitor the one or more duplicate properties of each duplicate virtual machine and the one or more properties of the counterpart virtual machine for a discrepancy; and computer readable program code configured to analyze counterpart virtual machines exhibiting a discrepancy for one or more security events. - View Dependent Claims (56, 58, 62, 63, 64)
-
-
55. (canceled)
-
57. (canceled)
-
59-61. -61. (canceled)
-
65-71. -71. (canceled)
Specification