Invention Grant
US08959632B2 Safely executing an untrusted native code module on a computing device
有权
在计算设备上安全执行不受信任的本地代码模块
- Patent Title: Safely executing an untrusted native code module on a computing device
- Patent Title (中): 在计算设备上安全执行不受信任的本地代码模块
-
Application No.: US13787616Application Date: 2013-03-06
-
Publication No.: US08959632B2Publication Date: 2015-02-17
- Inventor: J. Bradley Chen , Matthew T. Harren , Matthew Papakipos , David C. Sehr , Bennet S. Yee , Gregory Dardyk
- Applicant: Google Inc.
- Applicant Address: US CA Mountain View
- Assignee: Google Inc.
- Current Assignee: Google Inc.
- Current Assignee Address: US CA Mountain View
- Agency: Fish & Richardson P.C.
- Main IPC: G06F21/00
- IPC: G06F21/00 ; G06F9/445 ; H04L29/06 ; G06F9/30 ; G06F21/53 ; G06F21/57

Abstract:
A system that safely executes a native code module on a computing device. During operation, the system receives the native code module, which is comprised of untrusted native program code expressed using native instructions in the instruction set architecture associated with the computing device. The system then loads the native code module into a secure runtime environment, and proceeds to execute a set of instructions from the native code module in the secure runtime environment. The secure runtime environment enforces code integrity, control flow integrity, and data integrity for the native code module. Furthermore, the secure runtime environment moderates which resources can be accessed by the native code module on the computing device and/or how these resources can be accessed. By executing the native code module in the secure runtime environment, the system facilitates achieving native code performance for untrusted program code without a significant risk of unwanted side effects.
Public/Granted literature
- US20130185787A1 Safely Executing an Untrusted Native Code Module on a Computing Device Public/Granted day:2013-07-18
Information query