ENCRYPTED DATA INSPECTION IN A NETWORK ENVIRONMENT
    12.
    发明申请
    ENCRYPTED DATA INSPECTION IN A NETWORK ENVIRONMENT 有权
    网络环境中的加密数据检查

    公开(公告)号:US20160173288A1

    公开(公告)日:2016-06-16

    申请号:US14929476

    申请日:2015-11-02

    Abstract: Technologies are provided in example embodiments for analyzing an encrypted network flow. The technologies include monitoring the encrypted network flow between a first node and a second node, the network flow initiated from the first node; duplicating the encrypted network flow to form a copy of the encrypted network flow; decrypting the copy of the encrypted network flow using a shared secret, the shared secret associated with the first node and the second node; and scanning the network flow copy for targeted data.

    Abstract translation: 在用于分析加密网络流的示例实施例中提供了技术。 所述技术包括监视第一节点和第二节点之间的加密网络流,所述网络流从所述第一节点发起; 复制加密网络流以形成加密网络流的副本; 使用共享密钥解密加密网络流的副本,与第一节点和第二节点相关联的共享秘密; 并扫描目标数据的网络流拷贝。

    Attack Protection For Valid Gadget Control Transfers
    14.
    发明申请
    Attack Protection For Valid Gadget Control Transfers 有权
    有效的小工具控制传输的攻击保护

    公开(公告)号:US20160110542A1

    公开(公告)日:2016-04-21

    申请号:US14518507

    申请日:2014-10-20

    CPC classification number: G06F21/52

    Abstract: In one embodiment, a processor comprises: a first register to store a first bound value for a stack to be stored in a memory; a second register to store a second bound value for the stack; a checker logic to determine, prior to an exit point at a conclusion of a function to be executed on the processor, whether a value of a stack pointer is within a range between the first bound value and the second bound value; and a logic to prevent a return to a caller of the function if the stack pointer value is not within the range. Other embodiments are described and claimed.

    Abstract translation: 在一个实施例中,处理器包括:第一寄存器,用于存储要存储在存储器中的堆栈的第一绑定值; 第二寄存器,用于存储堆栈的第二绑定值; 检查器逻辑,用于在处理器执行的函数的结论处的退出点之前确定堆栈指针的值是否在所述第一绑定值和所述第二绑定值之间的范围内; 并且如果堆栈指针值不在该范围内,则阻止返回到函数的调用者的逻辑。 描述和要求保护其他实施例。

    Preventing malicious instruction execution
    15.
    发明授权
    Preventing malicious instruction execution 有权
    防止恶意指令执行

    公开(公告)号:US09183379B2

    公开(公告)日:2015-11-10

    申请号:US13991291

    申请日:2013-03-12

    Abstract: Systems and techniques for preventing malicious instruction execution are described herein. A first instance of an instruction for a graphics processing unit (GPU) may be received. The instruction may be placed in a target list. A notification that the instruction caused a problem with the GPU may be received. The instruction may be moved from the target list to a black list in response to the notification. A second instance of the instruction may be received. The second instance of the instruction may be prevented from executing on the GPU in response to the instruction being on the black list.

    Abstract translation: 这里描述了用于防止恶意指令执行的系统和技术。 可以接收用于图形处理单元(GPU)的指令的第一实例。 该指令可以放在目标列表中。 可以接收到指令引起GPU的问题的通知。 响应于该通知,指令可以从目标列表移动到黑名单。 可以接收该指令的第二个实例。 可以防止指令的第二实例响应于黑名单上的指令而在GPU上执行。

    Technologies for hardware assisted native malware detection

    公开(公告)号:US10540498B2

    公开(公告)日:2020-01-21

    申请号:US15235806

    申请日:2016-08-12

    Abstract: Technologies for hardware assisted native malware detection include a computing device. The computing device includes one or more processors with hook logic to monitor for execution of branch instructions of an application, compare the monitored branch instructions to filter criteria, and determine whether a monitored branch instruction satisfies the filter criteria. Additionally, the computing device includes a malware detector to provide the filter criteria to the hook logic, provide an address of a callback function to the hook logic to be executed in response to a determination that a monitored branch instruction satisfies the filter criteria, and analyze, in response to execution of the callback function, the monitored branch instruction to determine whether the monitored branch instruction is indicative of malware. Other embodiments are also described and claimed.

    Malicious object detection in a runtime environment

    公开(公告)号:US11568051B2

    公开(公告)日:2023-01-31

    申请号:US16780218

    申请日:2020-02-03

    Abstract: A malicious object detection system for use in managed runtime environments includes a check circuit to receive call information generated by an application, such as an Android application. A machine learning circuit coupled to the check circuit applies a machine learning model to assess the information and/or data included in the call and detect the presence of a malicious object, such as malware or a virus, in the application generating the call. The machine learning model may include a global machine learning model distributed across a number of devices, a local machine learning model based on use patterns of a particular device, or combinations thereof. A graphical user interface management circuit halts execution of applications containing malicious objects and generates a user perceptible output.

    Mode-specific endbranch for control flow termination

    公开(公告)号:US11099847B2

    公开(公告)日:2021-08-24

    申请号:US16741498

    申请日:2020-01-13

    Abstract: A processor includes an execution unit and a processing logic operatively coupled to the execution unit, the processing logic to: enter a first execution state and transition to a second execution state responsive to executing a control transfer instruction. Responsive to executing a target instruction of the control transfer instruction, the processing logic further transitions to the first execution state responsive to the target instruction being a control transfer termination instruction of a mode identical to a mode of the processing logic following the execution of the control transfer instruction; and raises an execution exception responsive to the target instruction being a control transfer termination instruction of a mode different than the mode of the processing logic following the execution of the control transfer instruction.

Patent Agency Ranking