US 12,107,870 B2
Protecting accelerators from malicious network functions
Dushyant K. Behl, Bangalore (IN); Palanivel Andiappan Kodeswaran, Bangalore (IN); and Sayandeep Sen, Bangalore (IN)
Assigned to International Business Machines Corporation, Armonk, NY (US)
Filed by INTERNATIONAL BUSINESS MACHINES CORPORATION, Armonk, NY (US)
Filed on Jun. 24, 2021, as Appl. No. 17/304,695.
Prior Publication US 2022/0417257 A1, Dec. 29, 2022
Int. Cl. H04L 29/06 (2006.01); H04L 9/40 (2022.01)
CPC H04L 63/1416 (2013.01) [H04L 63/1441 (2013.01)] 18 Claims
OG exemplary drawing
 
1. A method to protect accelerators from malicious network functions, comprising:
analyzing an application runtime to automatically generate a plurality of phase-specific security restrictions by:
initializing the application runtime in an offline environment;
measuring a resource utilization by the application runtime at different time steps;
recording system calls made by the application runtime at the different time steps; and
using the measured resource utilization and the recorded system calls to identify a plurality of distinct operational phases for the application runtime; and
enforcing one of the plurality of phase-specific security restrictions at one of the plurality of distinct operational phases.