Cybersecurity Technologies Identifying Computational Operations Based on Power Measurements (2016-053 / 2017-112) This innovation enables non-invasive monitoring and “fingerprinting” of computing systems, including supercomputers and data centers, by analyzing high-resolution power consumption data. It uses highly sensitive measurement devices to infer computational … [Read more...] about Cybersecurity
Cybersecurity
Trusted Execution Environments (TEEs) for Higher Security Data Processing with Improved Performance and Usability 2019-034
APPLICATIONS OF TECHNOLOGY: Data security and privacy for data containing sensitive information, such as data containing personally-identifying information, proprietary information, and/or other regulated or sensitive data sources: personal health information, such as health records financial information Secure data storage, e.g., cloud service … [Read more...] about Trusted Execution Environments (TEEs) for Higher Security Data Processing with Improved Performance and Usability 2019-034
Identifying Computational Operations Based on Power Measurements 2016-053
APPLICATIONS OF TECHNOLOGY: Signals intelligence for computers, including supercomputers Misuse identification of computing systems Relevant to large, power-consuming data centers, i.e., Amazon, Google, IBM, etc. ADVANTAGES: Non-invasive monitoring with low risk of detection ABSTRACT: Berkeley Lab researchers Sean Peisert and Charles McParland have … [Read more...] about Identifying Computational Operations Based on Power Measurements 2016-053