CRYPTOGRAPHIC OPERATIONS FOR SECURE PAGE MAPPING IN A VIRTUAL MACHINE ENVIRONMENT

    公开(公告)号:US20170091487A1

    公开(公告)日:2017-03-30

    申请号:US14866211

    申请日:2015-09-25

    Inventor: MICHAEL LEMAY

    Abstract: Generally, this disclosure provides systems, devices, methods and computer readable media for secure memory page mapping in a virtual machine (VM) environment. The system may include a processor configured to execute a virtual machine monitor (VMM). The VMM may be configured to maintain a table of cryptographic keys and associate a token with one of the memory pages to be mapped from a guest linear address (GLA) to a guest physical address (GPA). The token may include a key identifier (key ID) associated with one of the cryptographic keys, and an authentication code based on the GLA, the GPA, and one of the cryptographic keys. The system may also include a page walk processor configured to validate the token to indicate that the memory page associated with the token is authorized to be mapped from the GLA to the GPA.

    PROTECTING CONFIDENTIAL DATA WITH TRANSACTIONAL PROCESSING IN EXECUTE-ONLY MEMORY
    12.
    发明申请
    PROTECTING CONFIDENTIAL DATA WITH TRANSACTIONAL PROCESSING IN EXECUTE-ONLY MEMORY 有权
    通过实时处理保护机密数据

    公开(公告)号:US20160378490A1

    公开(公告)日:2016-12-29

    申请号:US14752079

    申请日:2015-06-26

    Abstract: Generally, this disclosure provides systems, devices, methods and computer readable media for protecting confidential data with transactional processing in execute-only memory. The system may include a memory module configured to store an execute-only code page. The system may also include a transaction processor configured to enforce a transaction region associated with at least a portion of the code page. The system may further include a processor configured to execute a load instruction fetched from the code page, the load instruction configured to load at least a portion of the confidential data from an immediate operand of the load instruction if a transaction mode of the transaction region is enabled.

    Abstract translation: 通常,本公开提供了用于在仅执行存储器中用事务处理保护机密数据的系统,设备,方法和计算机可读介质。 该系统可以包括被配置为存储仅执行代码页的存储器模块。 系统还可以包括配置成强制与代码页的至少一部分相关联的事务区域的事务处理器。 该系统还可以包括:处理器,其被配置为执行从代码页取出的加载指令,所述加载指令被配置为如果交易区域的交易模式是来自加载指令的即时操作数,则加载秘密数据的至少一部分 启用

    MEMORY MANAGEMENT APPARATUS AND METHOD FOR COMPARTMENTALIZATION USING LINEAR ADDRESS METADATA

    公开(公告)号:US20210200673A1

    公开(公告)日:2021-07-01

    申请号:US16728800

    申请日:2019-12-27

    Abstract: An apparatus and method for memory management using compartmentalization. For example, one embodiment of a processor comprises: execution circuitry to execute instructions and process data, at least one instruction to generate a system memory access request using a first linear address; and address translation circuitry to perform a first walk operation through a set of one or more address translation tables to translate the first linear address to a first physical address, the address translation circuitry to concurrently perform a second walk operation through a set of one or more linear address metadata tables to identify metadata associated with the linear address, and to use one or more portions of the metadata to validate access by the at least one instruction to the first physical address.

    CRYPTO-ENFORCED CAPABILITIES FOR ISOLATION
    14.
    发明申请

    公开(公告)号:US20190102567A1

    公开(公告)日:2019-04-04

    申请号:US15721082

    申请日:2017-09-29

    Abstract: Apparatuses for computing are disclosed herein. In embodiments, an apparatus may include one or more processors, a memory, and a compiler to be operated by the one or more processors to compile a computer program. The compiler may include one or more analyzers to parse and analyze source code of the computer program that generates pointers or de-references pointers. The compiler may also include a code generator coupled to the one or more analyzers to generate executable instructions for the source code of the computer program including insertion of additional encryption or decryption executable instructions into the computer program, based at least in part on a result of the analysis, to authenticate memory access operations of the source code.

    METHODS AND ARRANGEMENTS TO DETERMINE PHYSICAL RESOURCE ASSIGNMENTS

    公开(公告)号:US20190095796A1

    公开(公告)日:2019-03-28

    申请号:US15713573

    申请日:2017-09-22

    Abstract: Logic may determine a physical resource assignment via a neural network logic trained to determine an optimal policy for assignment of the physical resources in source code. Logic may generate training data to train a neural network by generating multiple instances of machine code for one or more source codes in accordance with different policies. Logic may generate different policies by adjusting, combining, mutating, and/or randomly changing a previous policy. Logic may execute and measure and/or statically determine measurements for each instance of a machine code associated with a source code to determine a reward associated with each state in the source code. Logic may apply weights and biases to the training data to approximate a value function. Logic may determine a gradient descent of the approximated value function and may backpropagate the output from the gradient descent to adjust the weights and biases to determine an optimal policy.

Patent Agency Ranking