-
公开(公告)号:US20180039510A1
公开(公告)日:2018-02-08
申请号:US15653095
申请日:2017-07-18
Applicant: ARM IP Limited
Inventor: Milosch Meriac , Alessandro Angelino
CPC classification number: G06F9/4831 , G06F9/461 , G06F9/5055
Abstract: The machine implemented method for operating at least one electronic system comprises detecting a pattern of use of plural control parameters in a path through a graph of operational context switches to reach a target operational context; storing a representation of the pattern in association with an indicator identifying the target operational context; responsive to detecting at least one of a request for a switch of operation from a source operational context to the target operational context, a trapping on a resource access, and a detection of a breakpoint, retrieving the representation in accordance with the indicator identifying the target operational context; and responsive to the retrieving, applying at least one control parameter to said at least one electronic system to match the pattern.
-
公开(公告)号:US11210393B2
公开(公告)日:2021-12-28
申请号:US16303291
申请日:2017-04-06
Applicant: Arm IP Limited
Inventor: Milosch Meriac , Alessandro Angelino
Abstract: A technology for mutually isolating accessors of a shared electronic device from leakage of context data after a context switch comprises: on making the shared electronic device available to the plurality of accessors, establishing a portion of storage as an indicator location for the shared electronic device; when a first accessor requests use of the shared electronic device, writing at least one device-reset-required indicator to the indicator location; on switching context to a new context, after context save, when a second accessor requests use of the shared electronic device, resetting context data of the shared electronic device to a known state and reconciling the first device-reset-required indicator and a second device-reset-required indicator for the new context.
-
公开(公告)号:US10757100B2
公开(公告)日:2020-08-25
申请号:US15659849
申请日:2017-07-26
Applicant: ARM IP Limited
Inventor: Alessandro Angelino , Milosch Meriac
Abstract: A machine implemented method for protecting a target domain and a source domain from unauthorized accesses. The method comprising: identifying an exit call gateway comprising an exit transition instruction and at least one exit access parameter, said exit access parameters restricting exit from said source domain; identifying an entry call gateway corresponding to said exit call gateway, said entry call gateway comprising a transition instruction and at least one entry access parameter, said entry access parameters restricting access to said target domain; determining that said exit access parameters and said entry access parameters are compatible with each other; and performing a context switch from said source domain to said target domain, when said exit access parameters and said entry access parameters are complied with.
-
公开(公告)号:US10579418B2
公开(公告)日:2020-03-03
申请号:US15653095
申请日:2017-07-18
Applicant: ARM IP Limited
Inventor: Milosch Meriac , Alessandro Angelino
Abstract: The machine implemented method for operating at least one electronic system comprises detecting a pattern of use of plural control parameters in a path through a graph of operational context switches to reach a target operational context; storing a representation of the pattern in association with an indicator identifying the target operational context; responsive to detecting at least one of a request for a switch of operation from a source operational context to the target operational context, a trapping on a resource access, and a detection of a breakpoint, retrieving the representation in accordance with the indicator identifying the target operational context; and responsive to the retrieving, applying at least one control parameter to said at least one electronic system to match the pattern.
-
公开(公告)号:US11194899B2
公开(公告)日:2021-12-07
申请号:US15578387
申请日:2016-05-31
Applicant: Arm IP Limited
Inventor: Alessandro Angelino , Milosch Meriac
IPC: G06F21/54 , G06F21/74 , G06F21/78 , G06F21/79 , G06F21/51 , G06F21/70 , G06F21/52 , G06F21/50 , G06F21/71 , G06F8/61 , G06F9/455 , G06F8/654 , G06F21/57
Abstract: A data processing apparatus having a first secure area and a second secure area coupled by a monitor is provided. The monitor applies security credentials to processing circuitry transitioning from the first secure area to the second secure area to enable the processing circuitry to perform functions in the second secure area. A call gateway comprising a transition instruction and access parameters stored in a trusted storage device is used by the monitor to determine when to applying the security credentials to the processing circuitry. The access parameters comprising a target function or a memory location.
-
公开(公告)号:US10956577B2
公开(公告)日:2021-03-23
申请号:US16113241
申请日:2018-08-27
Applicant: Arm IP Limited
Inventor: Alessandro Angelino , Milosch Meriac , Brendan James Moran
Abstract: An apparatus and methods are provided to defending device against attacks. When it is determined that a device is under attack, a determination is made as to whether a layout of objects within said at least one resource at said device is protecting said device against said attack. The determination is then transferred to a remote server together with a layout of the resource at the device. When it is determined that the layout of objects within the at least one resource at the device is not protecting the device against the attack, then the layout of the at least one resource is changed. Either the remote server or the device may determine whether to change the layout in response to the attack.
-
公开(公告)号:US11188378B2
公开(公告)日:2021-11-30
申请号:US16801790
申请日:2020-02-26
Applicant: ARM IP Limited
Inventor: Milosch Meriac , Alessandro Angelino
Abstract: The machine implemented method for operating at least one electronic system comprises detecting a pattern of use of plural control parameters in a path through a graph of operational context switches to reach a target operational context; storing a representation of the pattern in association with an indicator identifying the target operational context; responsive to detecting at least one of a request for a switch of operation from a source operational context to the target operational context, a trapping on a resource access, and a detection of a breakpoint, retrieving the representation in accordance with the indicator identifying the target operational context; and responsive to the retrieving, applying at least one control parameter to said at least one electronic system to match the pattern.
-
公开(公告)号:US10657086B2
公开(公告)日:2020-05-19
申请号:US16303305
申请日:2017-05-26
Applicant: Arm IP Limited
Inventor: Milosch Meriac , Alessandro Angelino
Abstract: A machine implemented method for prioritizing system interrupts in a processing system is provided. The method comprising: determining, at a supervisor module, for each interrupt, a relative interrupt priority in accordance with at least one interrupt parameter for said interrupt; prioritising, at said supervisor module, each said interrupt with respect to other interrupts of said system in compliance with said determined relative interrupt priority; and in response to a change to said at least one interrupt parameter during operation of said system, adjusting said determined relative interrupt priority, and re-prioritising each said interrupt with respect to said other interrupts of said system in compliance with said adjusted relative interrupt priority.
-
公开(公告)号:US20180048648A1
公开(公告)日:2018-02-15
申请号:US15659849
申请日:2017-07-26
Applicant: ARM IP Limited
Inventor: Alessandro Angelino , Milosch Meriac
Abstract: A machine implemented method for protecting a target domain and a source domain from unauthorized accesses. The method comprising: identifying an exit call gateway comprising an exit transition instruction and at least one exit access parameter, said exit access parameters restricting exit from said source domain; identifying an entry call gateway corresponding to said exit call gateway, said entry call gateway comprising a transition instruction and at least one entry access parameter, said entry access parameters restricting access to said target domain; determining that said exit access parameters and said entry access parameters are compatible with each other; and performing a context switch from said source domain to said target domain, when said exit access parameters and said entry access parameters are complied with.
-
-
-
-
-
-
-
-