Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs; Arrangements for executing specific programs; Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines; Hypervisors; Virtual machine monitors; Hypervisor-specific management and integration aspects Isolation or security of virtual machine instances
KILL CHAIN IDENTIFICATIONS
#2TECHNIQUES FOR INSPECTING RUNNING VIRTUALIZATIONS FOR CYBERSECURITY RISKS
#3INVOKING A HOST PROCESS FROM WITHIN A CONTAINER TO OUTLIVE THE CONTAINER LIFESPAN
#4ADDRESS-SPACE-IDENTIFIER-BASED SECURITY OF DATA TRANSFER REQUESTS
#5OUT OF BAND THREAT PREVENTION
#6DATA PROTECTION FOR SHORT-TERM AND LONG-TERM DATA
#7INTELLIGENT QUARANTINE ON SWITCH FABRIC FOR PHYSICAL AND VIRTUALIZED INFRASTRUCTURE
#8SECURE PROCESSING IN A DATA TRANSFORM ACCELERATOR USING A VIRTUAL MACHINE
#9ARCHITECTURE OF A MULTI-CLOUD INSPECTOR FOR ANY COMPUTE TYPE
#10UTILIZING VIDEO AND INPUT PIPELINES TO PROTECT VIRTUAL DESKTOP INFRASTRUCTURE SESSIONS
#11UTILIZING VIDEO AND INPUT PIPELINES TO PROTECT VIRTUAL DESKTOP INFRASTRUCTURE SESSIONS
#12METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR USING OPTIMIZED TOKEN BUCKET ALGORITHM FOR INGRESS MESSAGE RATE LIMITING ACROSS DISTRIBUTED PRODUCER NETWORK FUNCTION (NF) APPLICATIONS
#13Zero trust lensing of cloud-based traffic
#14SYSTEM, DEVICES AND/OR PROCESSES FOR ASSIGNMENT, CONFIGURATION AND/OR MANAGEMENT OF ONE OR MORE HARDWARE COMPONENTS OF A COMPUTING DEVICE
#15TECHNIQUES FOR SECURING VIRTUAL MACHINES
#16INTELLIGENT QUARANTINE ON SWITCH FABRIC FOR PHYSICAL AND VIRTUALIZED INFRASTRUCTURE
#17METHOD AND SYSTEM FOR IDENTIFYING PRODUCT FEATURES BASED ON METADATA
#18CONTINUOUS DATA PROTECTION AGAINST RANSOMWARE FOR VIRTUAL VOLUMES
#19METHOD AND SYSTEM FOR IDENTIFYING A HOLISTIC PROFILE OF A USER BASED ON METADATA
#20SERVICE GATEWAY FOR SCALING OF VIRTUAL DESKTOP DEPLOYMENTS
#21INITIATING EXECUTABLE CONTAINERS IN TRUSTED EXECUTION ENVIRONMENTS
#22COMPUTING SYSTEM WITH DYNAMIC FIREWALL MECHANISM AND ASSOCIATED METHOD
#23PROVIDING DEVICE ABSTRACTIONS TO APPLICATIONS INSIDE A VIRTUAL MACHINE
#24REGISTRATION AND DEPLOYMENT OF AN AGENT PLATFORM APPLIANCE IN A HYBRID ENVIRONMENT
#25SYSTEMS AND METHODS FOR VULNERABILITY PROOFING WHEN CONFIGURING AN IHS
#26PER SERVICE VERSION ROLL BACK IN DISTRIBUTED COMPUTING SYSTEMS
#27Multi-Layer Kernel with Varied Privilege
#28Techniques For Automatically Configuring Minimal Cloud Service Access Rights For Container Applications
#29SECURE DIRECT MEMORY ACCESS
#30CYBER SECURITY SYSTEM WITH ENHANCED CLOUD-BASED METRICS
#31CYBER SECURITY SYSTEM FOR CLOUD ENVIRONMENT ANALYTICS
#32LIFE CYCLE MANAGEMENT FOR DEVICE INPUT/OUTPUT INTERFACES IN VIRTUALIZED ENVIRONMENTS
#33INTERRUPT CONTROL USING A GUEST OWNED BACKING PAGE
#34SECURE MEMORY-MAPPED INPUT/OUTPUT
#35EVENT INTERCEPTION CONTROL BY A TRUSTED LAYER OF A VIRTUAL MACHINE
#36INTELLIGENT QUARANTINE ON SWITCH FABRIC FOR PHYSICAL AND VIRTUALIZED INFRASTRUCTURE
#37APPLICATION MONITORING PRIORITIZATION
#38Implementation Method and Apparatus for Increasing Number of Certificates Supported by PIV Application
#39COMPUTER DEVICE AND METHOD FOR SELECTIVE CONTENT ISOLATION
#40READ-ONLY MODE FOR VIRTUAL TRUSTED PLATFORM MODULE (TPM) DEVICES
#41NETWORKING OVERHEAD REDUCTION FOR ENCRYPTED VIRTUAL MACHINES
#42METHOD AND SYSTEM OF FILTERING OUT ALERTS THAT TRIGGER ON LEGITIMATE ACTIVITY
#43INTELLIGENT QUARANTINE ON SWITCH FABRIC FOR PHYSICAL AND VIRTUALIZED INFRASTRUCTURE
#44SYSTEM AND METHOD OF ASSIGNING REPUTATION SCORES TO HOSTS
#45Using Ownership Identifiers in Metadata in a Memory for Protecting Encrypted Data Stored in the Memory
#46SYSTEMS AND METHODS FOR MONITORING ASSETS IN A CLOUD COMPUTING ENVIRONMENT
#47SYSTEMS AND METHODS OF PROTECTING SECRETS IN USE WITH CONTAINERIZED APPLICATIONS
#48RANSOMWARE RECOVERY SYSTEM
#49System and Methods Involving Features of Hardware Virtualization, Hypervisors, APIs of Interest and/or Other Features
#50Methods and Systems for Protecting and Restoring Virtual Machines
#51INTELLIGENT QUARANTINE ON SWITCH FABRIC FOR PHYSICAL AND VIRTUALIZED INFRASTRUCTURE
#52PROCESSORS, METHODS, SYSTEMS, AND INSTRUCTIONS TO SUPPORT LIVE MIGRATION OF PROTECTED CONTAINERS
#53SYSTEMS AND METHODS FOR TRAINING SYSTEMS TO DETECT OFFENSIVE CYBER OPERATIONS
#54VIRTUAL BASEBOARD MANAGEMENT CONTROLLER CAPABILITY VIA GUEST FIRMWARE LAYER
#55REGISTER PROTECTION FOR CONFIDENTIAL COMPUTING ENVIRONMENT
#56METHOD AND APPARATUS FOR TRUST DOMAIN CREATION AND DESTRUCTION
#57AUTOMATIC DEPLOYMENT OF APPLICATION SECURITY POLICY USING APPLICATION MANIFEST AND DYNAMIC PROCESS ANALYSIS IN A CONTAINERIZATION ENVIRONMENT
#58Methods and Systems for Checking Container Applications on a Host System for Manipulation
#59DETECTING SECURITY EXCEPTIONS ACROSS MULTIPLE COMPUTE ENVIRONMENTS
#60SECURE LIVE MIGRATION OF TRUSTED EXECUTION ENVIRONMENT VIRTUAL MACHINES USING SMART CONTRACTS
#61ROUND TRIP TIME (RTT) MEASUREMENT BASED UPON SEQUENCE NUMBER
#62SYSTEMS AND METHODS FOR IDENTIFYING AND MONITORING SOLUTION STACKS
#63SECURE DRIVE FOR COMPUTER SYSTEMS
#64LOG DATA EXTRACTION FROM DATA CHUNKS OF AN ISOLATED EXECUTION ENVIRONMENT
#65MICRO-SEGMENTATION RECOMMENDATIONS FOR MULTI-DATACENTER NETWORK
#66MULTI-TENANT NETWORK MANAGEMENT SERVICE
#67SYSTEMS AND METHODS FOR VULNERABILITY PROOFING WHEN CONFIGURING AN IHS
#68PROTECTED REGIONS MANAGEMENT OF MEMORY
#69Multi-Layer Kernel with Varied Privilege
#70INSTRUCTIONS TO PROCESS FILES IN VIRTUAL MACHINES
#71AUTHORIZATION FRAMEWORK IN A MULTI-CLOUD INFRASTRUCTURE
#72TRANSPARENTLY PROVIDING VIRTUALIZATION FEATURES TO UNENLIGHTENED GUEST OPERATING SYSTEMS
#73Cloud Computing Platform That Executes Code in A Distributed Cloud Computing Network
#74ONE OR MORE DEVICES PROVIDING IMPROVED SECURITY FOR ANY DATABASE INCLUDING DISTRIBUTED APPLICATIONS AND SMART CONTRACTS
#75METHODS AND APPARATUS FOR CONTAINER DEPLOYMENT IN A NETWORK-CONSTRAINED ENVIRONMENT
#76SYSTEMS AND METHODS FOR EXECUTING SEQUENTIAL SUBOPERATIONS AT AN AGGREGATED VIRTUAL CONTAINER PROVIDER SYSTEM
#77DOMAIN NAME SYSTEM OPERATIONS IMPLEMENTED USING SCALABLE VIRTUAL TRAFFIC HUB
#78SECURITY FOR SIMULTANEOUS MULTITHREADING PROCESSORS
#79PROVIDING HOST MEDIA PROCESSING FUNCTIONALITY TO A GUEST OPERATING SYSTEM
#80MEMORY DEDUPLICATION FOR ENCRYPTED VIRTUAL MACHINES
#81SECURE VIRTUAL MACHINE AND PERIPHERAL DEVICE COMMUNICATION
#82Zero-Trust Cloud Development
#83COMPUTER SYSTEM FOR MALWARE DETECTION AND RECOVERY
#84Novel Apparatus and Application Device for Protection of Security
#85USING THREAD PATTERNS TO IDENTIFY ANOMALOUS BEHAVIOR
#86MONITORING SYSTEM, MONITORING METHOD, AND MONITORING DEVICE
#87TIMEOUT HANDLING FOR VIRTUAL DEVICES
#88Protecting User Data During Virtual Machine Initialization
#89Process Credential Protection
#90APPLYING HYPERVISOR-BASED CONTAINERS TO A CLUSTER OF A CONTAINER ORCHESTRATION SYSTEM
#91Virtual Browser Application Systems and Methods
#92POINTER BASED DATA ENCRYPTION
#93SECURING CONTENT FROM GUEST VIRTUAL MACHINES FROM UNAUTHORIZED ACCESS BY HOST OPERATING SYSTEMS
#94TECHNIQUES FOR SCALABLE DISTRIBUTED SYSTEM BACKUPS
#95SCALABLE VIRTUAL MACHINE OPERATION INSIDE TRUST DOMAINS WITHIN THE TRUST DOMAIN ARCHITECTURE
#96SECURED PERIPHERAL DEVICE COMMUNICATION IN VIRTUALIZED COMPUTER SYSTEM
#97OFFLOADING STATEFUL SERVICES FROM GUEST MACHINES TO HOST RESOURCES
#98Optimizing Data Reduction For Data In Encrypted Volumes
#99Method and Apparatus for Starting Secure Container
#100GENERATION, ACTUATION, AND ENFORCEMENT OF POLICIES FOR RESOURCES WITHIN A DISTRIBUTED COMPUTING SYSTEM
#101HITLESS VIRTUAL MACHINE MIGRATION WITH MIDDLEBOX SERVICE RULES APPLIED
#102REDUCING CPU EXECUTION CONTEXT TRANSITIONS ACROSS PRIVILEGE LEVELS FOR USER LEVEL HYPERVISORS
#103SYSTEM TO TERMINATE MALICIOUS PROCESS IN A DATA CENTER
#104Control Channel Architecture
#105System on Chip Isolation with Address Virtualization Control
#106CONTAINER VISIBILITY AND OBSERVABILITY
#107Distributed network security system providing isolation of customer data
#108METHOD OF APPLYING SECURITY POLICIES TO VIRTUAL COMPUTING INSTANCES
#109Method for verifying security technology deployment efficacy across a computer network
#110METHOD FOR VERIFYING SECURITY TECHNOLOGY DEPLOYMENT EFFICACY ACROSS A COMPUTER NETWORK
#111POLICY UTILIZATION ANALYSIS
#112PROTECTING CONTAINER IMAGES AND RUNTIME DATA
#113OPTIMIZED CREATION OF IDENTITY INFORMATION FOR PROVISIONED VIRTUAL MACHINES
#114SOFTWARE DEFINED ACCESS FABRIC WITHOUT SUBNET RESTRICTION TO A VIRTUAL NETWORK
#115TECHNIQUES TO ENABLE CO-EXISTENCE AND INTER-OPERATION OF LEGACY DEVICES AND TEE-IO CAPABLE DEVICES FROM CONFIDENTIAL VIRTUAL MACHINES
#116SYSTEM AND METHOD FOR EXCHANGING MESSAGES BETWEEN CLOUD SERVICES AND SOFTWARE-DEFINED DATA CENTERS
#117VIRTUALIZATION MANAGEMENT SYSTEM AND/OR OPERATING SYSTEM ATTESTATION FROM WITHIN A VIRTUALIZED COMPUTING INSTANCE
#118AUTOTUNING A VIRTUAL FIREWALL
#119SYSTEMS AND METHODS FOR PROCESSING PRIVILEGED INSTRUCTIONS USING USER SPACE MEMORY
#120CLOUD NATIVE VIRTUAL MACHINE RUNTIME PROTECTION
#121Automated assistant architecture for preserving privacy of application content
#122TEST CONTROLLER SECURELY CONTROLLING A TEST PLATFORM TO RUN TEST APPLICATIONS
#123Direct Mode for Virtualization
#124INFORMATION PROCESSING APPARATUS AND INFORMATION PROCESSING METHOD
#125MANAGEMENT OF VIRTUAL MACHINE SHUTDOWNS IN A COMPUTING ENVIRONMENT BASED ON RESOURCE LOCKS
#126INTRUSION DETECTION WITH ADAPTIVE PATTERN SELECTION
#127METHOD AND SYSTEM FOR RESOURCE MODIFICATION OF VIRTUAL DEVICES
#128INHERITANCE CONTAINER SERVICE
#129Virtualization-Based Controller for Industrial Control System Resiliency
#130SECURITY RISK ASSESSMENT SYSTEM FOR A DATA MANAGEMENT PLATFORM
#131EFFICIENT VIRTUAL MACHINE SCANNING
#132DATA RESYCHRONIZATION METHODS AND SYSTEMS IN CONTINUOUS DATA PROTECTION
#133Authentication and enforcement of differentiated policies for a bridge mode virtual machine behind a wireless host in a MAC-based authentication network
#134LANGUAGE AGNOSTIC SMART CONTRACT EXECUTION ON A BLOCKCHAIN
#135Delegation based access to secure systems
#136TRUST DOMAINS FOR PERIPHERAL DEVICES
#137CLOUD SAFETY COMPUTING METHOD, DEVICE AND STORAGE MEDIUM BASED ON CLOUD FAULT-TOLERANT TECHNOLOGY
#138SMART NETWORK INTERFACE CONTROLLER CERTIFICATE MANAGEMENT
#139COMPLIANCE ACROSS MULTIPLE CLOUD ENVIRONMENTS
#140MANAGING VIRTUAL INFRASTRUCTURE WITH SELF-INITIALIZED UPGRADES
#141SCALABLE ASYNCHRONOUS COMMUNICATION FOR ENCRYPTED VIRTUAL MACHINES
#142ENCRYPTED MEMORY GUEST/HOST COMMUNICATION
#143Techniques for automatically configuring minimal cloud service access rights for container applications
#144POLICY-BASED REMOTE ACCESS SYSTEM WITH SENSOR INPUT EMULATION
#145Distributed data storage techniques for edge devices
#146DYNAMIC INFORMATION VIRTUALIZATION
#147Virtualized file server user views
#148PROVIDING ISOLATION IN VIRTUALIZED SYSTEMS USING TRUST DOMAINS
#149MICROPROCESSOR THAT PREVENTS STORE-TO-LOAD FORWARDING BETWEEN DIFFERENT TRANSLATION CONTEXTS
#150CIRCUITRY AND METHODS FOR IMPLEMENTING MICRO-CONTEXT BASED TRUST DOMAINS
#151Systems and Methods for Java Virtual Machine Management
#152METHOD FOR VERIFYING SECURITY TECHNOLOGY DEPLOYMENT EFFICACY ACROSS A COMPUTER NETWORK
#153Remote secured console over a secured connection for inoperable virtual machine
#154UNIQUE ID GENERATION FOR SENSORS
#155CONFIDENTIAL COMPUTING USING PARALLEL PROCESSORS WITH CODE AND DATA PROTECTION
#156COPY-ON-WRITE FOR VIRTUAL MACHINES WITH ENCRYPTED STORAGE
#157DEVICE VIRTUALIZATION IN A CONFIDENTIAL COMPUTING ENVIRONMENT
#158CONFIDENTIAL COMPUTING USING MULTI-INSTANCING OF PARALLEL PROCESSORS
#159Monitoring and Preventing Remote User Automated Cyber Attacks
#160EXTRACTION OF SIDE CHANNEL INFORMATION FROM MULTITHREADED PROCESSORS BASED ON PROCESSOR RESOURCE CONTENTION
#161Cost-Efficient High-Availability Multi-Single-Tenant Services
#162Zero Trust Endpoint Device
#163Virtualized file server distribution across clusters
#164SYSTEMS AND METHODS FOR SECURE DATA ACCESS CONTROL
#165In-memory workflow management in edge devices
#166Server that supports security access of terminal device of the user and controlling method thereof
#167SELF-HEALING VIRTUALIZED FILE SERVER
#168SYSTEM AND METHOD OF DETERMINING EXISTENCE OF A NETWORK ATTACK
#169CONFIDENTIAL OFFLOADING OF PERSISTENT STORAGE OPERATIONS IN CONFIDENTIAL COMPUTING ENVIRONMENTS
#170Methods and Systems for Providing Wake-On-Demand Access to Session Servers
#171Software defined access fabric without subnet restriction to a virtual network
#172UNIVERSAL ZERO-KNOWLEDGE SUCCINCT NON-INTERACTIVE ARGUMENT OF KNOWLEDGE PROOF SYSTEM FOR STACK-BASED VIRTUAL MACHINE PROGRAM
#173DATA PROCESSING METHOD BASED ON CONTAINER ENGINE AND RELATED DEVICE
#174CYBERSECURITY GUARD FOR CORE NETWORK ELEMENTS
#175BEHAVIORAL THREAT DETECTION VIRTUAL MACHINE
#176TENANT SECURITY CONTROL OF DATA FOR APPLICATION SERVICES
#177THREAT RESISTANT MULTI-COMPUTING ENVIRONMENT
#178Secure reliable application environments
#179SECURELY PROCESSING SHAREABLE DATA UTILIZING A VAULT PROXY
#180PHYSICALLY-TAGGED DATA CACHE MEMORY THAT USES TRANSLATION CONTEXT TO REDUCE LIKELIHOOD THAT ENTRIES ALLOCATED DURING EXECUTION UNDER ONE TRANSLATION CONTEXT ARE ACCESSIBLE DURING EXECUTION UNDER ANOTHER TRANSLATION CONTEXT
#181SAFE, SECURE, VIRTUALIZED, DOMAIN SPECIFIC HARDWARE ACCELERATOR
#182USAGE OF CLOUD-LINK ADAPTOR FOR CONSUMPTION OF CLOUD SERVICES
#183Storage Device For Performing Access Authority Control And Operating Method Thereof
#184SYSTEMS AND METHODS FOR TRANSPARENTLY DETECTING UNENCRYPTED VIRTUAL MACHINE I/O
#185SAFE ENTROPY SOURCE FOR ENCRYPTED VIRTUAL MACHINES
#186Register Caching for Efficient Virtual Machine Introspection
#187Distributed authentication and authorization for rapid scaling of containerized services
#188Dynamic traffic prioritization across data centers
#189HIERARCHICAL HARDWARE-SOFTWARE PARTITIONING AND CONFIGURATION
#190RAPID LAUNCH OF SECURE EXECUTABLES IN A VIRTUALIZED ENVIRONMENT
#191Trust domains for peripheral devices
#192COMMUNICATION BETWEEN CONTROL PLANES IN A VIRTUALIZED COMPUTING SYSTEM HAVING AN AUTONOMOUS CLUSTER
#193PLUG-IN MANAGEMENT IN VIRTUALIZED COMPUTING ENVIRONMENT
#194TRANSMISSION APPARATUS, RECEPTION APPARATUS, CONTAINER TRANSMISSION SYSTEM, METHOD, AND PROGRAM
#195HYPERVISOR ASSISTED VIRTUAL MACHINE CLONE AUTO-REGISTRATION WITH CLOUD
#196TECHNIQUES FOR PROVIDING THIRD PARTY TRUST TO A CLOUD COMPUTING ENVIRONMENT
#197Creation and execution of customised code for a data processing platform
#198Controlling Container Commands Issued In A Distributed Computing Environment
#199Remediating Vulnerabilities For Application Deployments
#200Managing communications among virtual machine nodes of a network service provider
#201Intelligent quarantine on switch fabric for physical and virtualized infrastructure
#202APPARATUS AND METHOD FOR FORENSIC PASSWORD RESET
#203COMPUTER DEVICE, EXCEPTION PROCESSING METHOD, AND INTERRUPT PROCESSING METHOD
#204Secure incident investigation workspace generation and investigation control
#205RECOVERY OF STATE, CONFIGURATION, AND CONTENT FOR VIRTUALIZED INSTANCES
#206CIRCUITRY AND METHODS FOR IMPLEMENTING INPUT/OUTPUT EXTENSIONS FOR TRUST DOMAINS
#207Risk based virtual workspace delivery
#208SERVICE TO SERVICE AUTHENTICATION IN COMPUTING SYSTEMS
#209MULTI-TENANT CRYPTOGRAPHY IMPLEMENTATION COMPLIANCE
#210ARCHITECTURE SWAPPING FOR WORKSPACES
#211ISOLATING VIRTUAL DESKTOP APPLICATIONS FOR POLICY ENFORCEMENT
#212HYPERVISOR ASSISTED SECURITY OF DANGLING VOLUMES FOR CONTAINERS
#213COMMUNICATION ENCRYPTION AND DECRYPTION ON DEVICES
#214ADJUNCT PROCESSOR (AP) DOMAIN ZEROIZE
#215LIMITING USE OF ENCRYPTION KEYS IN AN INTEGRATED CIRCUIT DEVICE
#216ENROLLING A VIRTUAL DEVICE AS AN UNPRIVILEGED USER
#217SYSTEM AND METHOD FOR PROVIDING A DYNAMICALLY RECONFIGURABLE INTEGRATED VIRTUAL ENVIRONMENT
#218MALWARE PROTECTION FOR VIRTUAL MACHINES
#219SCHEDULING A SECURE CODE SEGMENT ON A PROCESSOR CORE OF A PROCESSING UNIT
#220COMPLIANCE AGGREGATION
#221Technologies for providing secure utilization of tenant keys
#222SECURE AND PRIVATE HYPER-PERSONALIZATION SYSTEM AND METHOD
#223FACILITATING ANALYSIS OF SOFTWARE VULNERABILITIES
#224MEMORY DEALLOCATION ACROSS A TRUST BOUNDARY
#225ON-DIE COMPUTER APPARATUS
#226CUSTOMIZED INITIALIZATION CODE DELIVERY OVER NETWORK FOR ZERO-TRUST VIRTUAL MACHINE
#227SYSTEM AND METHOD FOR SCHEDULING VIRTUAL MACHINES BASED ON SECURITY POLICY
#228INSIDER ATTACK RESISTANT SYSTEM AND METHOD FOR CLOUD SERVICES INTEGRITY CHECKING
#229DETECTING VULNERABILITIES IN CONFIGURATION CODE OF A CLOUD ENVIRONMENT UTILIZING INFRASTRUCTURE AS CODE
#230Data criticality-based network policy creation and consumption
#231PROCESS RUNNING METHOD AND APPARATUS
#232Secure modular devices
#233MANAGING FILE DEPENDENCY MANAGEMENT IN VIRTUAL MACHINES
#234Cloud computing platform that executes third-party code in a distributed cloud computing network
#235BINARY EXECUCTION BY A VIRTUAL DEVICE
#236Secure operations of cloud landscapes through workflow templates
#237Efficiently performing intrusion detection
#238FEATURELESS MACHINE ENHANCEMENT DISCOVERY AND VERIFICATION
#239SECURING CONTAINERIZED APPLICATIONS
#240Systems, methods, and apparatus for high availability application migration in a virtualized environment
#241EFFICIENT FUZZ TESTING OF LOW-LEVEL VIRTUAL DEVICES
#242Building and deploying an application
#243Container deployment with visual security profile
#244SYSTEMS AND METHODS FOR CONTINUOUS DATA PROTECTION COMPRISING STORAGE OF COMPLETED I/O REQUESTS INTERCEPTED FROM AN I/O STREAM USING TOUCH POINTS
#245Technologies for managing compromised sensors in virtualized environments
#246COPYING COMPUTING RESOURCES BETWEEN EXECUTION ENVIRONMENTS
#247Automotive gateway providing secure open platform for guest applications
#248Providing trusted virtual secure cryptoprocessors for guests
#249MIGRATING STATEFUL WORKLOADS BETWEEN CONTAINER CLUSTERS WITH DIFFERENT STORAGE BACKENDS
#250SECURE EXECUTION FOR MULTIPLE PROCESSOR DEVICES USING TRUSTED EXECUTING ENVIRONMENTS
#251SECURING CUSTOMER SENSITIVE INFORMATION ON PRIVATE CLOUD PLATFORMS
#252PROCESS-BASED MULTI-KEY TOTAL MEMORY ENCRYPTION
#253Authentication of virtual machine images using digital certificates
#254TRANSLATION LOOKASIDE BUFFER (TLB) FLUSH SYSTEMS AND METHODS FOR DEFEATING TLB POISONING ATTACKS
#255Artificial virtual machine for preventing malware execution by applying virtual machine characteristics in real computing environments
#256IMPLEMENTING TRUSTED EXECUTING ENVIRONMENTS ACROSS MULTIPLE PROCESSOR DEVICES
#257Techniques for securing virtual machines by application existence analysis
#258MODEL PROTECTION SYSTEM
#259Techniques for securing virtual machines by analyzing data for cyber threats
#260Automatic application of software updates to container images based on dependencies
#261SYSTEM FOR APPLICATION PROTECTION AND NON-TRANSITORY MACHINE-READABLE MEDIUM FOR STORING PROGRAM CODE THAT PROVIDES APPLICATION PROTECTION WHEN EXECUTED
#262Techniques for securing virtual machines by application use analysis
#263DATA PROCESSING SYSTEM FOR SECURELY PROCESSING SHAREABLE DATA
#264KERNEL PROTECTION SYSTEM
#265Techniques for securing a plurality of virtual machines in a cloud computing environment
#266Transmissions management rules for virtual machine communications
#267Round trip time (RTT) measurement based upon sequence number
#268DATA CORRELATION USING FILE OBJECT CACHE
#269Techniques for scalable distributed system backups
#270SYSTEM AND METHOD FOR MONITORING DELIVERY OF MESSAGES PASSED BETWEEN PROCESSES FROM DIFFERENT OPERATING SYSTEMS
#271ELECTRONIC DEVICE FOR PROTECTING USER'S BIOMETRIC INFORMATION
#272USING A REMOTE POD IN KUBERNETES
#273Function-based service framework with trusted execution platform
#274Hash operations in memory for data sharing
#275Execution of code in system memory
#276System and Method for Secure Application Domain on Bare Metal Information Handling System
#277System and method for securing network users in an enterprise network through cybersecurity controls
#278Sharing Virtual Environment Data
#279Autotuning a virtual firewall
#280Verifiable privacy preserving computation
#281Behavior-Based VM Resource Capture for Forensics
#282ISOLATING OPERATING SYSTEM ENVIRONMENTS IN EMBEDDED DEVICES
#283HARDWARE VIRTUALIZED TPM INTO VIRTUAL MACHINES
#284Electronic apparatus adapted for container and software updating method for running container system
#285Method and apparatus for managing identification of a virtual machine and a host within a virtual domain
#286METHODS AND SYSTEMS FOR PROVIDING VIRTUAL DESKTOP INFRASTRUCTURE VIA SECURE CLASSIFIED REMOTE ACCESS AS A SERVICE
#287Secure Browsing Via A Transparent Network Proxy
#288Confidential data provided to a secure guest via metadata
#289SYSTEM AND METHOD FOR NETWORK POLICY SIMULATION
#290Method and system for performing dynamic patch management in a virtual desktop infrastructure (VDI) platform
#291DEFERRED RECLAIMING OF SECURE GUEST RESOURCES
#292Hypervisor level signature checks for encrypted trusted execution environments
#293Customization of multi-part metadata of a secure guest
#294SECURITY BROKER WITH POST-PROVISIONED STATES OF THE TEE-PROTECTED SERVICES
#295MANAGING PERIPHERALS IN A CONTAINERIZED ENVIRONMENT
#296ESTABLISHING PROCESS CONNECTIONS UTILIZING AN INTERMEDIARY BROKER
#297Support for encrypted memory in nested virtual machines
#298BINDING SECURE KEYS OF SECURE GUESTS TO A HARDWARE SECURITY MODULE
#299VIRTUALIZATION-BASED PLATFORM PROTECTION TECHNOLOGY
#300ELECTRONIC DEVICE AND OPERATING METHOD