ENABLING SECURE COMMUNICATION VIA ATTESTATION OF MULTI-TENANT CONFIGURATION ON ACCELERATOR DEVICES

    公开(公告)号:US20210110065A1

    公开(公告)日:2021-04-15

    申请号:US17130506

    申请日:2020-12-22

    Abstract: An apparatus to facilitate enabling secure communication via attestation of multi-tenant configuration on accelerator devices is disclosed. The apparatus includes a processor to: verify a base bitstream of an accelerator device, the base bitstream published by a cloud service provider (CSP); verify partial reconfiguration (PR) boundary setups and PR isolation of an accelerator device, the PR boundary setups and PR isolation published by the CSP; generate PR bitstream to fit within at least one PR region of the PR boundary setups of the accelerator device; inspect accelerator device attestation received from a secure device manager (SDM) of the accelerator device; and responsive to successful inspection of the accelerator device attestation, provide the PR bitstream to the CSP for PR reconfiguration of the accelerator device.

    LIGHTWEIGHT TRUSTED TASKS
    33.
    发明申请

    公开(公告)号:US20180173644A1

    公开(公告)日:2018-06-21

    申请号:US15384267

    申请日:2016-12-19

    Abstract: Methods and apparatus relating to lightweight trusted tasks are disclosed. In one embodiment, a processor includes a memory interface to a memory to store code, data, and stack segments for a lightweight-trusted task (LTT) mode task and for another task, a LTT control and status register including a lock bit, a processor core to enable LTT-mode, configure the LTT-mode task, and lock down the configuration by writing the lock bit, and a memory protection circuit to: receive a memory access request from the memory interface, the memory access request being associated with the other task, determine whether the memory access request is attempting to access a protected memory region of the LTT-mode task, and protect against the memory access request accessing the protected memory region of the LTT-mode task, regardless of a privilege level of the other task, and regardless of whether the other task is also a LTT-mode task.

    EXECUTION-AWARE MEMORY PROTECTION
    34.
    发明申请
    EXECUTION-AWARE MEMORY PROTECTION 有权
    执行 - 注意保护

    公开(公告)号:US20160306752A1

    公开(公告)日:2016-10-20

    申请号:US15192049

    申请日:2016-06-24

    CPC classification number: G06F12/1441 G06F9/3005 G06F9/3802 G06F9/3824

    Abstract: Execution-Aware Memory protection technologies are described. A processor includes a processor core and a memory protection unit (MPU). The MPU includes a memory protection table and memory protection logic. The memory protection table defines a first protection region in main memory, the first protection region including a first instruction region and a first data region. The memory protection logic determines a protection violation by a first instruction when 1) an instruction address, resulting from an instruction fetch operation corresponding to the first instruction, is not within the first instruction region or 2) a data address, resulting from an execute operation corresponding to the first instruction, is not within the first data region.

    Abstract translation: 执行意识描述内存保护技术。 处理器包括处理器核和存储器保护单元(MPU)。 MPU包括存储器保护表和存储器保护逻辑。 存储器保护表定义主存储器中的第一保护区域,第一保护区域包括第一指令区域和第一数据区域。 存储器保护逻辑在1)由与第一指令相对应的指令获取操作产生的指令地址不在第一指令区域内时由第一指令确定保护违规,或2)由执行操作产生的数据地址 对应于第一指令,不在第一数据区域内。

    SCALABLE RUNTIME VALIDATION FOR ON-DEVICE DESIGN RULE CHECKS

    公开(公告)号:US20230089869A1

    公开(公告)日:2023-03-23

    申请号:US18070655

    申请日:2022-11-29

    Abstract: An apparatus to facilitate scalable runtime validation for on-device design rule checks is disclosed. The apparatus includes a memory to store a contention set, multiplexers, and a validator. In one implementation, the validator is to: receive design rule information for the multiplexers, the design rule information referencing the contention set, wherein the contention set identifies a determined harmful bitstream configuration for each multiplexer instance of the multiplexers, and wherein the contention set comprises a mapping of contents of a user bitstream to configuration bits of the multiplexers; receive, at the validator of the apparatus, the user bitstream for programming the multiplexers of the apparatus; analyze, at the validator using the design rule information, the user bitstream against the contention set at a programming time of the apparatus; and provide an error indication responsive to identifying a match between the user bitstream and the contention set.

    ENABLING LATE-BINDING OF SECURITY FEATURES VIA CONFIGURATION SECURITY CONTROLLER FOR ACCELERATOR DEVICES

    公开(公告)号:US20210150033A1

    公开(公告)日:2021-05-20

    申请号:US17129243

    申请日:2020-12-21

    Abstract: An apparatus to facilitate enabling late-binding of security features via configuration security controller for accelerator devices is disclosed. The apparatus includes a security controller to initialize as part of a secure boot and attestation chain of trust; receive configuration data for portions of the security controller, the portions comprising components of the security controller capable of re-programming; verify and validate the configuration data to as originating from a secure and trusted source; and responsive to successful verification and validation of the configuration data, re-program the portions of the security controller based on the configuration data.

Patent Agency Ranking