LOW OVERHEAD INTEGRITY PROTECTION WITH HIGH AVAILABILITY FOR TRUST DOMAINS

    公开(公告)号:US20190042476A1

    公开(公告)日:2019-02-07

    申请号:US16023576

    申请日:2018-06-29

    Abstract: Techniques are described for providing low-overhead cryptographic memory isolation to mitigate attack vulnerabilities in a multi-user virtualized computing environment. Memory read and memory write operations for target data, each operation initiated via an instruction associated with a particular virtual machine (VM), include the generation and/or validation of a message authentication code that is based at least on a VM-specific cryptographic key and a physical memory address of the target data. Such operations may further include transmitting the generated message authentication code via a plurality of ancillary bits incorporated within a data line that includes the target data. In the event of a validation failure, one or more error codes may be generated and provided to distinct trust domain architecture entities based on an operating mode of the associated virtual machine.

    Cryptographic pointer address encoding
    36.
    发明授权
    Cryptographic pointer address encoding 有权
    加密指针地址编码

    公开(公告)号:US09436847B2

    公开(公告)日:2016-09-06

    申请号:US14498540

    申请日:2014-09-26

    Abstract: A computing device includes technologies for securing indirect addresses (e.g., pointers) that are used by a processor to perform memory access (e.g., read/write/execute) operations. The computing device encodes the indirect address using metadata and a cryptographic algorithm. The metadata may be stored in an unused portion of the indirect address.

    Abstract translation: 计算设备包括用于保护由处理器用于执行存储器访问(例如,读/写/执行)操作的间接地址(例如,指针)的技术。 计算设备使用元数据和加密算法对间接地址进行编码。 元数据可以存储在间接地址的未使用部分中。

    Methods and apparatuses to provide chiplet binding to a system on a chip platform having a disaggregated architecture

    公开(公告)号:US12177343B2

    公开(公告)日:2024-12-24

    申请号:US17358952

    申请日:2021-06-25

    Abstract: Systems, methods, and apparatuses for providing chiplet binding to a disaggregated architecture for a system on a chip are described. In one embodiment, system includes a plurality of physically separate dies, an interconnect to electrically couple the plurality of physically separate dies together, a first die-to-die communication circuit, of a first die of the plurality of physically separate dies, comprising a transmitter circuit and an encryption circuit having a link key to encrypt data to be sent from the transmitter circuit into encrypted data, and a second die-to-die communication circuit, of a second die of the plurality of physically separate dies, comprising a receiver circuit and a decryption circuit having the link key to decrypt the encrypted data sent from the transmitter circuit to the receiver circuit.

    Asymmetric device attestation using physically unclonable functions

    公开(公告)号:US11825000B2

    公开(公告)日:2023-11-21

    申请号:US17742774

    申请日:2022-05-12

    CPC classification number: H04L9/3278 H04L9/0869 H04L9/14 H04L9/30 H04L9/3268

    Abstract: In one example, a system for asymmetric device attestation includes a physically unclonable function (PUF) configured to generate a response to a challenge. A pseudo-random number generator generates a set of random numbers based on the response. A key generator determines co-prime numbers in the set of random numbers and generates a key pair using the co-prime numbers, wherein the public key is released to a manufacturer of the component for attestation of authenticity of the component. Through extending the PUF circuitry with a pseudo-random number generator, the present techniques are able to withstand unskilled and skilled hardware attacks, as the secret derived from the PUF is immune to extraction.

    SIDE-CHANNEL EXPLOIT DETECTION
    40.
    发明申请

    公开(公告)号:US20220335127A1

    公开(公告)日:2022-10-20

    申请号:US17739930

    申请日:2022-05-09

    Abstract: The present disclosure is directed to systems and methods for detecting side-channel exploit attacks such as Spectre and Meltdown. Performance monitoring circuitry includes first counter circuitry to monitor CPU cache misses and second counter circuitry to monitor DTLB load misses. Upon detecting an excessive number of cache misses and/or load misses, the performance monitoring circuitry transfers the first and second counter circuitry data to control circuitry. The control circuitry determines a CPU cache miss to DTLB load miss ratio for each of a plurality of temporal intervals. The control circuitry the identifies, determines, and/or detects a pattern or trend in the CPU cache miss to DTLB load miss ratio. Upon detecting a deviation from the identified CPU cache miss to DTLB load miss ratio pattern or trend indicative of a potential side-channel exploit attack, the control circuitry generates an output to alert a system user or system administrator.

Patent Agency Ranking