CRYPTOGRAPHIC MULTI-SHADOWING WITH INTEGRITY VERIFICATION

    公开(公告)号:US20170344496A1

    公开(公告)日:2017-11-30

    申请号:US15682056

    申请日:2017-08-21

    Applicant: VMware, Inc.

    CPC classification number: G06F12/1408 G06F12/1491 G06F21/6218 G06F2212/151

    Abstract: A virtual-machine-based system that may protect the privacy and integrity of application data, even in the event of a total operating system compromise. An application is presented with a normal view of its resources, but the operating system is presented with an encrypted view. This allows the operating system to carry out the complex task of managing an application's resources, without allowing it to read or modify them. Different views of “physical” memory are presented, depending on a context performing the access. An additional dimension of protection beyond the hierarchical protection domains implemented by traditional operating systems and processors is provided.

    ISOLATING DATA WITHIN A COMPUTER SYSTEM USING PRIVATE SHADOW MAPPINGS
    12.
    发明申请
    ISOLATING DATA WITHIN A COMPUTER SYSTEM USING PRIVATE SHADOW MAPPINGS 审中-公开
    在使用私人阴影映射的计算机系统中分离数据

    公开(公告)号:US20160179564A1

    公开(公告)日:2016-06-23

    申请号:US15055468

    申请日:2016-02-26

    Applicant: VMware, Inc.

    Abstract: Virtualization software establishes multiple execution environments within a virtual machine, wherein software modules executing in one environment cannot access private memory of another environment. A separate set of shadow memory address mappings is maintained for each execution environment. For example, a separate shadow page table may be maintained for each execution environment. The virtualization software ensures that the shadow address mappings for one execution environment do not map to the physical memory pages that contain the private code or data of another execution environment. When execution switches from one execution environment to another, the virtualization software activates the shadow address mappings for the new execution environment. A similar approach, using separate mappings, may also be used to prevent software modules in one execution environment from accessing the private disk space or other secondary storage of another execution environment.

    Abstract translation: 虚拟化软件在虚拟机内建立多个执行环境,其中在一个环境中执行的软件模块不能访问另一环境的专用内存。 为每个执行环境维护一组单独的影子内存地址映射。 例如,可以为每个执行环境维护单独的影子页表。 虚拟化软件确保一个执行环境的影子地址映射不映射到包含其他执行环境的私有代码或数据的物理内存页面。 当执行从一个执行环境切换到另一个执行环境时,虚拟化软件会激活新执行环境的影子地址映射。 使用单独映射的类似方法也可用于防止一个执行环境中的软件模块访问另一个执行环境的专用磁盘空间或其他辅助存储。

    COHERENCE-BASED CACHE-LINE COPY-ON-WRITE

    公开(公告)号:US20230023256A1

    公开(公告)日:2023-01-26

    申请号:US17488028

    申请日:2021-09-28

    Applicant: VMware, Inc.

    Abstract: A method of performing a copy-on-write on a shared memory page is carried out by a device communicating with a processor via a coherence interconnect. The method includes: adding a page table entry so that a request to read a first cache line of the shared memory page includes a cache-line address of the shared memory page and a request to write to a second cache line of the shared memory page includes a cache-line address of a new memory page; in response to the request to write to the second cache line, storing new data of the second cache line in a second memory and associating the second cache-line address with the new data stored in the second memory; and in response to a request to read the second cache line, reading the new data of the second cache line from the second memory.

    COHERENCE-BASED ATTACK DETECTION
    15.
    发明申请

    公开(公告)号:US20230022096A1

    公开(公告)日:2023-01-26

    申请号:US17383342

    申请日:2021-07-22

    Applicant: VMware, Inc.

    Abstract: While an application or a virtual machine (VM) is running, a device tracks accesses to cache lines to detect access patterns that indicate security attacks, such as cache-based side channel attacks or row hammer attacks. To enable the device to detect accesses to cache lines, the device is connected to processors via a coherence interconnect, and the application/VM data is stored in a local memory of the device. The device collects the cache lines of the application/VM data that are accessed while the application/VM is running into a buffer and the buffer is analyzed for access patterns that indicate security attacks.

    SMART PREFETCHING FOR REMOTE MEMORY

    公开(公告)号:US20230004496A1

    公开(公告)日:2023-01-05

    申请号:US17367048

    申请日:2021-07-02

    Applicant: VMware, Inc.

    Abstract: Memory pages of a local application program are prefetched from a memory of a remote host. A method of prefetching the memory pages from the remote memory includes detecting that a cache-line access made by a processor executing the local application program is an access to a cache line containing page table data of the local application program, identifying data pages that are referenced by the page table data, and fetching the identified data pages from the remote memory and storing the fetched data pages in a local memory.

    METHOD AND SYSTEM FOR TRACKING STATE OF CACHE LINES

    公开(公告)号:US20220414017A1

    公开(公告)日:2022-12-29

    申请号:US17355941

    申请日:2021-06-23

    Applicant: VMware, Inc.

    Abstract: The state of cache lines transferred into an out of caches of processing hardware is tracked by monitoring hardware. The method of tracking includes monitoring the processing hardware for cache coherence events on a coherence interconnect between the processing hardware and monitoring hardware, determining that the state of a cache line has changed, and updating a hierarchical data structure to indicate the change in the state of said cache line. The hierarchical data structure includes a first level data structure including first bits, and a second level data structure including second bits, each of the first bits associated with a group of second bits. The step of updating includes setting one of the first bits and one of the second bits in the group corresponding to the first bit that is being set, according to an address of said cache line.

    PROGRAMMING INTERFACES FOR ACCURATE DIRTY DATA TRACKING

    公开(公告)号:US20200242035A1

    公开(公告)日:2020-07-30

    申请号:US16256562

    申请日:2019-01-24

    Applicant: VMware, Inc.

    Abstract: Described herein is a method for tracking changes to memory locations made by an application. In one embodiment, the application decides to start tracking and sends a list of virtual memory pages to be tracked to an operating system via an interface. The operating system converts the list of virtual memory pages to a list of physical addresses and sends the list of physical addresses to a hardware unit which performs the tracking by detecting write backs on a coherence interconnect coupled to the hardware unit. After the application ends tracking, the application requests a list of dirty cache lines. In response to the request, the operating system obtains the list of dirty cache lines from the hardware unit and adds the list to a buffer that the application can read. In other embodiments, the operating system can perform the tracking without the application making the request.

    CRYPTOGRAPHIC MULTI-SHADOWING WITH INTEGRITY VERIFICATION

    公开(公告)号:US20170185531A9

    公开(公告)日:2017-06-29

    申请号:US14048515

    申请日:2013-10-08

    Applicant: VMware, Inc.

    CPC classification number: G06F12/1408 G06F12/1491 G06F21/6218 G06F2212/151

    Abstract: A virtual-machine-based system that may protect the privacy and integrity of application data, even in the event of a total operating system compromise. An application is presented with a normal view of its resources, but the operating system is presented with an encrypted view. This allows the operating system to carry out the complex task of managing an application's resources, without allowing it to read or modify them. Different views of “physical” memory are presented, depending on a context performing the access. An additional dimension of protection beyond the hierarchical protection domains implemented by traditional operating systems and processors is provided.

Patent Agency Ranking