MODE-SPECIFIC ENDBRANCH FOR CONTROL FLOW TERMINATION

    公开(公告)号:US20220019432A1

    公开(公告)日:2022-01-20

    申请号:US17404890

    申请日:2021-08-17

    Abstract: A processor includes an execution unit and a processing logic operatively coupled to the execution unit, the processing logic to: enter a first execution state and transition to a second execution state responsive to executing a control transfer instruction. Responsive to executing a target instruction of the control transfer instruction, the processing logic further transitions to the first execution state responsive to the target instruction being a control transfer termination instruction of a mode identical to a mode of the processing logic following the execution of the control transfer instruction; and raises an execution exception responsive to the target instruction being a control transfer termination instruction of a mode different than the mode of the processing logic following the execution of the control transfer instruction.

    Technologies for untrusted code execution with processor sandbox support

    公开(公告)号:US11055401B2

    公开(公告)日:2021-07-06

    申请号:US15720083

    申请日:2017-09-29

    Abstract: Technologies for untrusted code execution include a computing device having a processor with sandbox support. The computing device executes code included in a native domain in a non-privileged, native processor mode. The computing device may invoke a sandbox jump processor instruction during execution of the code in the native domain to enter a sandbox domain. The computing device executes code in the sandbox domain in a non-privileged, sandbox processor mode in response to invoking the sandbox jump instruction. While executing in the sandbox processor mode, the processor denies access to memory outside of the sandbox domain and may deny execution of one or more prohibited instructions. From the sandbox domain, the computing device may execute a sandbox exit instruction to exit the sandbox domain and resume execution in the native domain. The computing device may execute processor instructions to configure the sandbox domain. Other embodiments are described and claimed.

    RETURN ORIENTED PROGRAMMING STACK PIVOTING PROTECTION
    5.
    发明申请
    RETURN ORIENTED PROGRAMMING STACK PIVOTING PROTECTION 有权
    返回面向编程堆栈保护

    公开(公告)号:US20160283410A1

    公开(公告)日:2016-09-29

    申请号:US14667125

    申请日:2015-03-24

    CPC classification number: G06F12/1458 G06F21/52 G06F2212/1052

    Abstract: Systems, apparatuses and methods may provide for identifying a stack pointer associated with a sequence of code being executed on a computing system and counting a number of exchange updates to the stack pointer. Additionally, a hardware interrupt may be generated if the number of exchange updates reaches a threshold. In one example, the hardware interrupt is a performance monitoring interrupt.

    Abstract translation: 系统,装置和方法可以提供用于识别与在计算系统上执行的代码序列相关联的堆栈指针,并且对堆栈指针的多个交换更新进行计数。 另外,如果交换更新次数达到阈值,则可能会产生硬件中断。 在一个示例中,硬件中断是性能监视中断。

    Technologies for untrusted code execution with processor sandbox support

    公开(公告)号:US11847206B2

    公开(公告)日:2023-12-19

    申请号:US17367106

    申请日:2021-07-02

    Abstract: Technologies for untrusted code execution include a computing device having a processor with sandbox support. The computing device executes code included in a native domain in a non-privileged, native processor mode. The computing device may invoke a sandbox jump processor instruction during execution of the code in the native domain to enter a sandbox domain. The computing device executes code in the sandbox domain in a non-privileged, sandbox processor mode in response to invoking the sandbox jump instruction. While executing in the sandbox processor mode, the processor denies access to memory outside of the sandbox domain and may deny execution of one or more prohibited instructions. From the sandbox domain, the computing device may execute a sandbox exit instruction to exit the sandbox domain and resume execution in the native domain. The computing device may execute processor instructions to configure the sandbox domain. Other embodiments are described and claimed.

    Technologies for protecting dynamically generated managed code with protection domains

    公开(公告)号:US10311252B2

    公开(公告)日:2019-06-04

    申请号:US15459640

    申请日:2017-03-15

    Abstract: Technologies for managed code execution include a computing device having a processor with protection key support. The computing device sets a protection key register of the processor with permissions to disallow data access to any protection domain of the computing device and then executes a domain switch routine to switch to a managed applet. The managed applet is included in an applet protection domain, the domain switch routine is included in a switch protection domain, and a managed runtime environment is included in a normal protection domain. The domain switch routine sets the protection key register with permissions to disallow access to any protection domain other than the applet protection domain and then executes the managed applet. Other managed applets may be each be included in separate applet domains. Each managed applet may be a thread executed within a common process address space. Other embodiments are described and claimed.

    TECHNOLOGIES FOR PROTECTING DYNAMICALLY GENERATED MANAGED CODE WITH PROTECTION DOMAINS

    公开(公告)号:US20180268170A1

    公开(公告)日:2018-09-20

    申请号:US15459640

    申请日:2017-03-15

    CPC classification number: G06F21/6281

    Abstract: Technologies for managed code execution include a computing device having a processor with protection key support. The computing device sets a protection key register of the processor with permissions to disallow data access to any protection domain of the computing device and then executes a domain switch routine to switch to a managed applet. The managed applet is included in an applet protection domain, the domain switch routine is included in a switch protection domain, and a managed runtime environment is included in a normal protection domain. The domain switch routine sets the protection key register with permissions to disallow access to any protection domain other than the applet protection domain and then executes the managed applet. Other managed applets may be each be included in separate applet domains. Each managed applet may be a thread executed within a common process address space. Other embodiments are described and claimed.

Patent Agency Ranking