-
公开(公告)号:US09671971B2
公开(公告)日:2017-06-06
申请号:US14672020
申请日:2015-03-27
Applicant: INTEL CORPORATION
Inventor: Sanjeev N. Trika , Benjamin W. Boyer , Ravi L. Sahita , Xiaoning Li , Faraz A. Siddiqi
CPC classification number: G06F3/0638 , G06F3/0604 , G06F3/0619 , G06F3/0632 , G06F3/064 , G06F3/0673 , G06F12/1466
Abstract: Provided are a method, system, and computer readable storage medium for managing access to a storage device. A logical-to-physical mapping indicates for each logical address a physical address in the storage device having current data for the logical address and version information indicating whether there is a prior version of data for the logical address. In response to the logical-to-physical mapping indicating that there is no prior version of the data for a target logical address of a write, including information on the target physical address and the physical address indicated in the logical-to-physical mapping in checkpoint information. The version information for the target logical address is updated to indicate that there is a prior version of data. Data for the write is written to a target physical address. The logical-to-physical mapping for the target logical address is updated to indicate the target physical address.
-
公开(公告)号:US20160173288A1
公开(公告)日:2016-06-16
申请号:US14929476
申请日:2015-11-02
Applicant: Intel Corporation
Inventor: Xiaoning Li , Karanvir S. Grewal , Geoffrey H. Cooper , John R. Guzik
CPC classification number: H04L9/3273 , G06F11/30 , G06F21/00 , H04L63/0227 , H04L63/0281 , H04L63/0428 , H04L63/0464 , H04L63/166 , H04L2209/24
Abstract: Technologies are provided in example embodiments for analyzing an encrypted network flow. The technologies include monitoring the encrypted network flow between a first node and a second node, the network flow initiated from the first node; duplicating the encrypted network flow to form a copy of the encrypted network flow; decrypting the copy of the encrypted network flow using a shared secret, the shared secret associated with the first node and the second node; and scanning the network flow copy for targeted data.
Abstract translation: 在用于分析加密网络流的示例实施例中提供了技术。 所述技术包括监视第一节点和第二节点之间的加密网络流,所述网络流从所述第一节点发起; 复制加密网络流以形成加密网络流的副本; 使用共享密钥解密加密网络流的副本,与第一节点和第二节点相关联的共享秘密; 并扫描目标数据的网络流拷贝。
-
公开(公告)号:US20160170902A1
公开(公告)日:2016-06-16
申请号:US15051213
申请日:2016-02-23
Applicant: Intel Corporation
Inventor: Ravi L. Sahita , Xiaoning Li , Manohar R. Castelino
CPC classification number: G06F12/109 , G06F9/45533 , G06F9/45558 , G06F12/0292 , G06F12/1009 , G06F12/145 , G06F2009/45583 , G06F2212/151 , G06F2212/657
Abstract: Methods and apparatus relating to low overhead paged memory runtime protection are described. In an embodiment, permission information for guest physical mapping are received prior to utilization of paged memory by an Operating System (OS) based on the guest physical mapping. The permission information is provided through an Extended Page Table (EPT). Other embodiments are also described.
Abstract translation: 描述了与低开销分页存储器运行时保护有关的方法和装置。 在一个实施例中,客户物理映射的许可信息在基于客户物理映射的操作系统(OS)利用分页存储器之前被接收。 许可信息通过扩展页表(EPT)提供。 还描述了其它实施例。
-
公开(公告)号:US20160110542A1
公开(公告)日:2016-04-21
申请号:US14518507
申请日:2014-10-20
Applicant: Intel Corporation
Inventor: Vedvyas Shanbhogue , Ravi L. Sahita , Yuriy Bulygin , Xiaoning Li , Jason W. Brandt
CPC classification number: G06F21/52
Abstract: In one embodiment, a processor comprises: a first register to store a first bound value for a stack to be stored in a memory; a second register to store a second bound value for the stack; a checker logic to determine, prior to an exit point at a conclusion of a function to be executed on the processor, whether a value of a stack pointer is within a range between the first bound value and the second bound value; and a logic to prevent a return to a caller of the function if the stack pointer value is not within the range. Other embodiments are described and claimed.
Abstract translation: 在一个实施例中,处理器包括:第一寄存器,用于存储要存储在存储器中的堆栈的第一绑定值; 第二寄存器,用于存储堆栈的第二绑定值; 检查器逻辑,用于在处理器执行的函数的结论处的退出点之前确定堆栈指针的值是否在所述第一绑定值和所述第二绑定值之间的范围内; 并且如果堆栈指针值不在该范围内,则阻止返回到函数的调用者的逻辑。 描述和要求保护其他实施例。
-
公开(公告)号:US09183379B2
公开(公告)日:2015-11-10
申请号:US13991291
申请日:2013-03-12
Applicant: Intel Corporation
Inventor: Xiaoning Li , William Wager , Nathan Bixler
CPC classification number: G06F21/56 , G06F21/52 , G06F21/55 , G06F21/84 , G06F2221/034 , G06T1/20 , G06T1/60 , G06T2200/28
Abstract: Systems and techniques for preventing malicious instruction execution are described herein. A first instance of an instruction for a graphics processing unit (GPU) may be received. The instruction may be placed in a target list. A notification that the instruction caused a problem with the GPU may be received. The instruction may be moved from the target list to a black list in response to the notification. A second instance of the instruction may be received. The second instance of the instruction may be prevented from executing on the GPU in response to the instruction being on the black list.
Abstract translation: 这里描述了用于防止恶意指令执行的系统和技术。 可以接收用于图形处理单元(GPU)的指令的第一实例。 该指令可以放在目标列表中。 可以接收到指令引起GPU的问题的通知。 响应于该通知,指令可以从目标列表移动到黑名单。 可以接收该指令的第二个实例。 可以防止指令的第二实例响应于黑名单上的指令而在GPU上执行。
-
公开(公告)号:US10540498B2
公开(公告)日:2020-01-21
申请号:US15235806
申请日:2016-08-12
Applicant: Intel Corporation
Inventor: Xiaoning Li , Ravi L. Sahita , David M. Durham
Abstract: Technologies for hardware assisted native malware detection include a computing device. The computing device includes one or more processors with hook logic to monitor for execution of branch instructions of an application, compare the monitored branch instructions to filter criteria, and determine whether a monitored branch instruction satisfies the filter criteria. Additionally, the computing device includes a malware detector to provide the filter criteria to the hook logic, provide an address of a callback function to the hook logic to be executed in response to a determination that a monitored branch instruction satisfies the filter criteria, and analyze, in response to execution of the callback function, the monitored branch instruction to determine whether the monitored branch instruction is indicative of malware. Other embodiments are also described and claimed.
-
公开(公告)号:US09880947B2
公开(公告)日:2018-01-30
申请号:US14667125
申请日:2015-03-24
Applicant: Intel Corporation
Inventor: Rodrigo Rubira Branco , Xiaoning Li
CPC classification number: G06F12/1458 , G06F21/52 , G06F2212/1052
Abstract: Systems, apparatuses and methods may provide for identifying a stack pointer associated with a sequence of code being executed on a computing system and counting a number of exchange updates to the stack pointer. Additionally, a hardware interrupt may be generated if the number of exchange updates reaches a threshold. In one example, the hardware interrupt is a performance monitoring interrupt.
-
公开(公告)号:US09858202B2
公开(公告)日:2018-01-02
申请号:US15051213
申请日:2016-02-23
Applicant: Intel Corporation
Inventor: Ravi L. Sahita , Xiaoning Li , Manohar R. Castelino
IPC: G06F12/10 , G06F12/109 , G06F12/1009 , G06F9/455 , G06F12/14 , G06F12/02
CPC classification number: G06F12/109 , G06F9/45533 , G06F9/45558 , G06F12/0292 , G06F12/1009 , G06F12/145 , G06F2009/45583 , G06F2212/151 , G06F2212/657
Abstract: Methods and apparatus relating to low overhead paged memory runtime protection are described. In an embodiment, permission information for guest physical mapping are received prior to utilization of paged memory by an Operating System (OS) based on the guest physical mapping. The permission information is provided through an Extended Page Table (EPT). Other embodiments are also described.
-
公开(公告)号:US11568051B2
公开(公告)日:2023-01-31
申请号:US16780218
申请日:2020-02-03
Applicant: Intel Corporation
Inventor: Mingwei Zhang , Xiaoning Li , Ravi L. Sahita , Aravind Subramanian , Abhay S. Kanhere , Chih-Yuan Yang , Yi Gai
Abstract: A malicious object detection system for use in managed runtime environments includes a check circuit to receive call information generated by an application, such as an Android application. A machine learning circuit coupled to the check circuit applies a machine learning model to assess the information and/or data included in the call and detect the presence of a malicious object, such as malware or a virus, in the application generating the call. The machine learning model may include a global machine learning model distributed across a number of devices, a local machine learning model based on use patterns of a particular device, or combinations thereof. A graphical user interface management circuit halts execution of applications containing malicious objects and generates a user perceptible output.
-
公开(公告)号:US11099847B2
公开(公告)日:2021-08-24
申请号:US16741498
申请日:2020-01-13
Applicant: Intel Corporation
Inventor: Vedvyas Shanbhogue , Jason W. Brandt , Ravi L. Sahita , Xiaoning Li
Abstract: A processor includes an execution unit and a processing logic operatively coupled to the execution unit, the processing logic to: enter a first execution state and transition to a second execution state responsive to executing a control transfer instruction. Responsive to executing a target instruction of the control transfer instruction, the processing logic further transitions to the first execution state responsive to the target instruction being a control transfer termination instruction of a mode identical to a mode of the processing logic following the execution of the control transfer instruction; and raises an execution exception responsive to the target instruction being a control transfer termination instruction of a mode different than the mode of the processing logic following the execution of the control transfer instruction.
-
-
-
-
-
-
-
-
-