Technologies for untrusted code execution with processor sandbox support

    公开(公告)号:US11055401B2

    公开(公告)日:2021-07-06

    申请号:US15720083

    申请日:2017-09-29

    Abstract: Technologies for untrusted code execution include a computing device having a processor with sandbox support. The computing device executes code included in a native domain in a non-privileged, native processor mode. The computing device may invoke a sandbox jump processor instruction during execution of the code in the native domain to enter a sandbox domain. The computing device executes code in the sandbox domain in a non-privileged, sandbox processor mode in response to invoking the sandbox jump instruction. While executing in the sandbox processor mode, the processor denies access to memory outside of the sandbox domain and may deny execution of one or more prohibited instructions. From the sandbox domain, the computing device may execute a sandbox exit instruction to exit the sandbox domain and resume execution in the native domain. The computing device may execute processor instructions to configure the sandbox domain. Other embodiments are described and claimed.

    Embedded system application installation and execution method and apparatus

    公开(公告)号:US10831508B2

    公开(公告)日:2020-11-10

    申请号:US16307126

    申请日:2016-07-22

    Abstract: Apparatuses, methods and storage medium associated with installing and executing an application program on an embedded system are described herein. In embodiments, an embedded system may include an application management program and an application execution program to install an application program onto the embedded system. The application management program is to verify metadata associated with the application program, in response to a first request to install the application program on the embedded system; and the application execution program is to verify the application program, in response to a second request, subsequent to the first request, to verify the application program. Other aspects and embodiments may be described and/or claimed.

    Distributed and redundant firmware evaluation

    公开(公告)号:US10601955B2

    公开(公告)日:2020-03-24

    申请号:US15428274

    申请日:2017-02-09

    Abstract: An automated method for distributed and redundant firmware evaluation involves using a first interface that is provided by system firmware of a client device to obtain, at an evaluation server, a first firmware resource table (FRT) from the client device. The evaluation server also uses a second interface that is provided by a component of the client device other than the system firmware to obtain a second FRT from the client device. The evaluation server automatically uses the first and second FRTs to identify a trustworthy FRT among the first and second FRTs. The evaluation server automatically uses the trustworthy FRT to determine whether the client device should be updated. For instance, the evaluation server may automatically use the trustworthy FRT to determine whether firmware in the client device should be updated. Other embodiments are described and claimed.

    VIRTUAL MACHINE BATCH LIVE MIGRATION
    34.
    发明申请

    公开(公告)号:US20180329737A1

    公开(公告)日:2018-11-15

    申请号:US15775982

    申请日:2015-12-18

    Abstract: A virtual machine migration controller may perform the live migration of a plurality of virtual machines from a first physical host system to a second physical host system. The virtual machine migration controller may determine a memory page dirty rate for each of a plurality of virtual machines. The virtual machine migration controller may additionally identify virtual machines that share memory pages and/or map to different memory pages having, at least in part, identical data or information. The virtual machine migration controller may group virtual machines demonstrating commonality among mapped memory pages. The virtual machine migration controller may determine a projected migration time based on the dirtying rate, the commonality of memory pages, and the available bandwidth. The virtual machine migration controller orders and transfers virtual machine groups based on the projected migration time.

    Technologies for untrusted code execution with processor sandbox support

    公开(公告)号:US11847206B2

    公开(公告)日:2023-12-19

    申请号:US17367106

    申请日:2021-07-02

    Abstract: Technologies for untrusted code execution include a computing device having a processor with sandbox support. The computing device executes code included in a native domain in a non-privileged, native processor mode. The computing device may invoke a sandbox jump processor instruction during execution of the code in the native domain to enter a sandbox domain. The computing device executes code in the sandbox domain in a non-privileged, sandbox processor mode in response to invoking the sandbox jump instruction. While executing in the sandbox processor mode, the processor denies access to memory outside of the sandbox domain and may deny execution of one or more prohibited instructions. From the sandbox domain, the computing device may execute a sandbox exit instruction to exit the sandbox domain and resume execution in the native domain. The computing device may execute processor instructions to configure the sandbox domain. Other embodiments are described and claimed.

    SYSTEMS AND METHODS FOR CODE GENERATION FOR A PLURALITY OF ARCHITECTURES

    公开(公告)号:US20230018149A1

    公开(公告)日:2023-01-19

    申请号:US17950773

    申请日:2022-09-22

    Abstract: Systems and methods for code generation for a plurality of architectures. At a host architecture, a JIT compile operation is performed for a received JavaScript or Web Assembly file. The JIT compiler references a host library that has been updated to include at least one new JIT instruction. Output from the JIT compile operation is compiled machine code for the host architecture that has new opcodes (OPX) added, responsive to the new JIT instruction. The JIT compiler executes the opcodes (OPX) in XuCode mode, meaning that the host architecture switches into a hardware protected private ISA (Instruction Set Architecture) called XuCode to implement the new JIT opcode instruction in XuCode.

    Techniques for distributed operation of secure controllers

    公开(公告)号:US11487517B2

    公开(公告)日:2022-11-01

    申请号:US16232372

    申请日:2018-12-26

    Abstract: Various embodiments are generally directed to techniques for supporting the distributed execution of a task routine among multiple secure controllers incorporated into multiple computing devices. An apparatus includes a first processor component and first secure controller of a first computing device, where the first secure controller includes: a selection component to select the first secure controller or a second secure controller of a second computing device to compile a task routine based on a comparison of required resources to compile the task routine and available resources of the first secure controller; and a compiling component to compile the task routine into a first version of compiled routine for execution within the first secure controller by the first processor component and a second version for execution within the second secure controller by a second processor component in response to selection of the first secure controller. Other embodiments are described and claimed.

    Virtual machine batch live migration

    公开(公告)号:US11074092B2

    公开(公告)日:2021-07-27

    申请号:US15775982

    申请日:2015-12-18

    Abstract: A virtual machine migration controller may perform the live migration of a plurality of virtual machines from a first physical host system to a second physical host system. The virtual machine migration controller may determine a memory page dirty rate for each of a plurality of virtual machines. The virtual machine migration controller may additionally identify virtual machines that share memory pages and/or map to different memory pages having, at least in part, identical data or information. The virtual machine migration controller may group virtual machines demonstrating commonality among mapped memory pages. The virtual machine migration controller may determine a projected migration time based on the dirtying rate, the commonality of memory pages, and the available bandwidth. The virtual machine migration controller orders and transfers virtual machine groups based on the projected migration time.

Patent Agency Ranking