BINARY TRANSLATION OF A TRUSTED BINARY WITH INPUT TAGGING
    2.
    发明申请
    BINARY TRANSLATION OF A TRUSTED BINARY WITH INPUT TAGGING 有权
    具有输入标签的二进制二进制的二进制翻译

    公开(公告)号:US20160188873A1

    公开(公告)日:2016-06-30

    申请号:US14583620

    申请日:2014-12-27

    IPC分类号: G06F21/53 H04L9/32

    摘要: In an example, a computing device includes a trusted execution environment (TEE), including an enclave. The enclave may include both a binary translation engine (BTE) and an input verification engine (IVE). In one embodiment, the IVE receives a trusted binary as an input, and analyzes the trusted binary to identify functions, classes, and variables that perform input/output operations. To ensure the security of these interfaces, those operations may be performed within the enclave. The IVE tags the trusted binary and provides the binary to the BTE. The BTE then translates the trusted binary into a second format, including designating the tagged portion for execution within the enclave. The BTE may also sign the new binary in the second format and export it out of the enclave.

    摘要翻译: 在一个示例中,计算设备包括可信执行环境(TEE),包括飞地。 飞地可以包括二进制翻译引擎(BTE)和输入验证引擎(IVE)。 在一个实施例中,IVE接收可信二进制作为输入,并且分析可信二进制以识别执行输入/输出操作的功能,类和变量。 为了确保这些接口的安全性,可以在飞地内执行这些操作。 IVE标记可信任的二进制文件,并向BTE提供二进制文件。 BTE然后将可信二进制文件转换为第二格式,包括指定用于在飞地内执行的标记部分。 BTE也可能以第二种格式签署新的二进制文件,并将其从飞地出口。

    AUTOMATED SECURITY POLICY
    6.
    发明申请

    公开(公告)号:US20180115585A1

    公开(公告)日:2018-04-26

    申请号:US15791840

    申请日:2017-10-24

    申请人: Dmitri Rubakha

    发明人: Dmitri Rubakha

    IPC分类号: H04L29/06 G06F9/455

    摘要: There is disclosed a computing apparatus, including: a hardware platform; a service mapping requirements table including a plurality of components and having associated therewith a plurality of service requirements; an isolation platform; and a security policy engine configured to: receive a new appliance image for the isolation platform; scan the new appliance image and build a bill of materials (BoM) for the new container image, the BoM including a plurality of components; search the service mapping requirements table for the plurality of components and identify service requirements for the components; and generate a security policy for the new appliance image.