Detecting hidden shared dependencies through covert channels

According to one method for detecting a hidden shared dependency through covert channels, a pattern of bursts is transmitted to a first application hosted by a first server. The pattern of bursts may be designed to stress a potential hidden dependency shared by the first application and a second app...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Joshi, Kaustubh R
Format: Patent
Sprache:eng
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Joshi, Kaustubh R
description According to one method for detecting a hidden shared dependency through covert channels, a pattern of bursts is transmitted to a first application hosted by a first server. The pattern of bursts may be designed to stress a potential hidden dependency shared by the first application and a second application hosted by a second server. Each of the bursts may include one or more concurrent requests. Probe requests are transmitted to the second application. Responses corresponding to the probe requests are received from the second application. Response times are determined by computing a difference between times that the probe requests are transmitted and times that the corresponding responses are received. A determination is made whether the potential hidden dependency exists based on the response times.
format Patent
fullrecord <record><control><sourceid>uspatents_EFH</sourceid><recordid>TN_cdi_uspatents_grants_08145750</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>08145750</sourcerecordid><originalsourceid>FETCH-uspatents_grants_081457503</originalsourceid><addsrcrecordid>eNrjZLBxSS1JTS7JzEtXyMhMSUnNUyjOSCxKTVFISS1IzQPykzNTixVKMoryS9MzFJLzy1KLShSSMxLz8lJzinkYWNMSc4pTeaE0N4OCm2uIs4duaXFBYklqXklxfHpRIogysDA0MTU3NTAmQgkA2KcxDg</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Detecting hidden shared dependencies through covert channels</title><source>USPTO Issued Patents</source><creator>Joshi, Kaustubh R</creator><creatorcontrib>Joshi, Kaustubh R ; AT&amp;T Intellectual Property I, LP</creatorcontrib><description>According to one method for detecting a hidden shared dependency through covert channels, a pattern of bursts is transmitted to a first application hosted by a first server. The pattern of bursts may be designed to stress a potential hidden dependency shared by the first application and a second application hosted by a second server. Each of the bursts may include one or more concurrent requests. Probe requests are transmitted to the second application. Responses corresponding to the probe requests are received from the second application. Response times are determined by computing a difference between times that the probe requests are transmitted and times that the corresponding responses are received. A determination is made whether the potential hidden dependency exists based on the response times.</description><language>eng</language><creationdate>2012</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://image-ppubs.uspto.gov/dirsearch-public/print/downloadPdf/8145750$$EPDF$$P50$$Guspatents$$Hfree_for_read</linktopdf><link.rule.ids>230,308,776,798,881,64015</link.rule.ids><linktorsrc>$$Uhttps://image-ppubs.uspto.gov/dirsearch-public/print/downloadPdf/8145750$$EView_record_in_USPTO$$FView_record_in_$$GUSPTO$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Joshi, Kaustubh R</creatorcontrib><creatorcontrib>AT&amp;T Intellectual Property I, LP</creatorcontrib><title>Detecting hidden shared dependencies through covert channels</title><description>According to one method for detecting a hidden shared dependency through covert channels, a pattern of bursts is transmitted to a first application hosted by a first server. The pattern of bursts may be designed to stress a potential hidden dependency shared by the first application and a second application hosted by a second server. Each of the bursts may include one or more concurrent requests. Probe requests are transmitted to the second application. Responses corresponding to the probe requests are received from the second application. Response times are determined by computing a difference between times that the probe requests are transmitted and times that the corresponding responses are received. A determination is made whether the potential hidden dependency exists based on the response times.</description><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2012</creationdate><recordtype>patent</recordtype><sourceid>EFH</sourceid><recordid>eNrjZLBxSS1JTS7JzEtXyMhMSUnNUyjOSCxKTVFISS1IzQPykzNTixVKMoryS9MzFJLzy1KLShSSMxLz8lJzinkYWNMSc4pTeaE0N4OCm2uIs4duaXFBYklqXklxfHpRIogysDA0MTU3NTAmQgkA2KcxDg</recordid><startdate>20120327</startdate><enddate>20120327</enddate><creator>Joshi, Kaustubh R</creator><scope>EFH</scope></search><sort><creationdate>20120327</creationdate><title>Detecting hidden shared dependencies through covert channels</title><author>Joshi, Kaustubh R</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-uspatents_grants_081457503</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2012</creationdate><toplevel>online_resources</toplevel><creatorcontrib>Joshi, Kaustubh R</creatorcontrib><creatorcontrib>AT&amp;T Intellectual Property I, LP</creatorcontrib><collection>USPTO Issued Patents</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Joshi, Kaustubh R</au><aucorp>AT&amp;T Intellectual Property I, LP</aucorp><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Detecting hidden shared dependencies through covert channels</title><date>2012-03-27</date><risdate>2012</risdate><abstract>According to one method for detecting a hidden shared dependency through covert channels, a pattern of bursts is transmitted to a first application hosted by a first server. The pattern of bursts may be designed to stress a potential hidden dependency shared by the first application and a second application hosted by a second server. Each of the bursts may include one or more concurrent requests. Probe requests are transmitted to the second application. Responses corresponding to the probe requests are received from the second application. Response times are determined by computing a difference between times that the probe requests are transmitted and times that the corresponding responses are received. A determination is made whether the potential hidden dependency exists based on the response times.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_uspatents_grants_08145750
source USPTO Issued Patents
title Detecting hidden shared dependencies through covert channels
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-24T13%3A02%3A48IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-uspatents_EFH&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Joshi,%20Kaustubh%20R&rft.aucorp=AT&T%20Intellectual%20Property%20I,%20LP&rft.date=2012-03-27&rft_id=info:doi/&rft_dat=%3Cuspatents_EFH%3E08145750%3C/uspatents_EFH%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true