scispace - formally typeset
M

Mallik Bulusu

Researcher at Microsoft

Publications -  88
Citations -  1440

Mallik Bulusu is an academic researcher from Microsoft. The author has contributed to research in topics: Firmware & Volatile memory. The author has an hindex of 22, co-authored 88 publications receiving 1440 citations. Previous affiliations of Mallik Bulusu include Intel & Miles College.

Papers
More filters
Patent

Providing fast non-volatile storage in a secure environment

TL;DR: In this paper, a peripheral controller coupled to a processor can include a storage controller, which can enable access to the secure partition only when the processor is in a secure mode, and during unsecure operation such as third party code execution, visibility of a secure partition can be prevented.
Patent

Hardened extended firmware interface framework

TL;DR: In this article, a trusted core framework of firmware components are segregated from initially non-trustworthy extended firmware components such that the trusted core components are executed in a privileged processor mode, while the extended firmware component is executed in non-privileged processor mode.
Patent

Switching between a service virtual machine and a guest virtual machine in a virtual machine monitor environment

TL;DR: In this article, the authors present a VM switch between a Service VM and a Guest VM in a virtual machine monitor (VMM) of a computer system, where the VMM is loaded on the computer system to support a ServiceVM and a guest VM.
Patent

Method and apparatus for trusted blade device computing

TL;DR: In this paper, a method and system for performing trusted computing for blade devices, such as blade servers or other blade devices is described, where the computing domain for the blade devices are managed by a chassis management logic module, and methods for performing blade capability authorization and optional blade authentication are provided.
Patent

Method and system to support network port authentication from out-of-band firmware

TL;DR: In this article, the authors present methods and systems for performing network port authentication without requiring any operating system (OS) complicity, and demonstrate that port authentication may also be performed via an out-of-band base management controller that operates independently from an operating system running on the supplicant.