DATA TAINTING TO MITIGATE SPECULATION VULNERABILITIES

    公开(公告)号:EP4020277A1

    公开(公告)日:2022-06-29

    申请号:EP21197876.2

    申请日:2021-09-21

    申请人: INTEL Corporation

    IPC分类号: G06F21/55

    摘要: Embodiments for dynamically mitigating speculation vulnerabilities are disclosed. In an embodiment, an apparatus includes speculation vulnerability detection hardware and execution hardware. The speculation vulnerability detection hardware is to detect (191) vulnerability to a speculative execution attack and, in connection with a detection of vulnerability to a speculative execution attack, to provide (192) an indication that data from a first operation is tainted. The execution hardware is to perform a second operation using the data if the second operation is to be performed non-speculatively and to prevent (194) performance of the second operation if the second operation is to be performed speculatively and the data is tainted.

    Enabling multiple instruction stream/multiple data stream extensions on microprocessors
    5.
    发明公开
    Enabling multiple instruction stream/multiple data stream extensions on microprocessors 审中-公开
    多指令多数据流的激活,和在微处理器上的扩展

    公开(公告)号:EP1909177A3

    公开(公告)日:2008-10-01

    申请号:EP07253782.2

    申请日:2007-09-25

    申请人: Intel Corporation

    IPC分类号: G06F9/455 G06F9/46

    CPC分类号: G06F9/455 G06F9/461

    摘要: Embodiments described herein disclose a system for enabling emulation of a MIMD ISA extension which supports user-level sequencer management and control, and a set of privileged code executed by both operating system managed sequencers and application managed sequencers, including different sets of persistent per-CPU and per-thread data. In one embodiment, a lightweight code layer executes beneath the operating system. This code layer is invoked in response to particular monitored events, such as the need for communication between an operating system managed sequencer and an application managed sequencer. Control is transferred to this code layer, for execution of special operations, after which control returns back to originally executing code. The code layer is normally dormant and can be invoked at any time when either a user application or the operating system is executing.

    DYNAMIC DETECTION OF SPECULATION VULNERABILITIES

    公开(公告)号:EP4020280A1

    公开(公告)日:2022-06-29

    申请号:EP21198442.2

    申请日:2021-09-23

    申请人: INTEL Corporation

    IPC分类号: G06F21/55

    摘要: Embodiments for dynamically mitigating speculation vulnerabilities are disclosed. In an embodiment, an apparatus includes speculation vulnerability mitigation hardware and speculation vulnerability detection hardware. The speculation vulnerability mitigation hardware is to implement one or more of a plurality of speculation vulnerability mitigation mechanisms. The speculation vulnerability detection hardware to detect vulnerability to a speculative execution attack and to provide to software an indication of speculative execution attack vulnerability.

    Enabling multiple instruction stream/multiple data stream extensions on microprocessors
    9.
    发明公开
    Enabling multiple instruction stream/multiple data stream extensions on microprocessors 审中-公开
    Aktivierung mehrerer仪器和仪器Datenstromerweiterungen auf Mikroprozessoren

    公开(公告)号:EP1909177A2

    公开(公告)日:2008-04-09

    申请号:EP07253782.2

    申请日:2007-09-25

    申请人: Intel Corporation

    IPC分类号: G06F9/455

    CPC分类号: G06F9/455 G06F9/461

    摘要: Embodiments described herein disclose a system for enabling emulation of a MIMD ISA extension which supports user-level sequencer management and control, and a set of privileged code executed by both operating system managed sequencers and application managed sequencers, including different sets of persistent per-CPU and per-thread data. In one embodiment, a lightweight code layer executes beneath the operating system. This code layer is invoked in response to particular monitored events, such as the need for communication between an operating system managed sequencer and an application managed sequencer. Control is transferred to this code layer, for execution of special operations, after which control returns back to originally executing code. The code layer is normally dormant and can be invoked at any time when either a user application or the operating system is executing.

    摘要翻译: 本文描述的实施例公开了一种用于实现支持用户级定序器管理和控制的MIMD ISA扩展的仿真的系统,以及由操作系统管理的定序器和应用管理的顺控程序执行的一组特权代码,包括不同的持续性每个CPU 和每线程数据。 在一个实施例中,在操作系统之下执行轻量级代码层。 响应于特定的监视事件(例如操作系统管理定序器和应用程序管理的定序器之间的通信的需要)来调用该代码层。 控制转移到该代码层,用于执行特殊操作,之后控制返回到原始执行的代码。 代码层通常处于休眠状态,可以在用户应用程序或操作系统正在执行时随时调用。