Detection of unauthorized memory modification and access using transactional memory
    3.
    发明授权
    Detection of unauthorized memory modification and access using transactional memory 有权
    使用事务性存储器检测未经授权的内存修改和访问

    公开(公告)号:US09384148B2

    公开(公告)日:2016-07-05

    申请号:US14367989

    申请日:2013-12-17

    申请人: Intel Corporation

    IPC分类号: G06F21/14 G06F12/14 G06F21/60

    摘要: Technologies for detecting unauthorized memory accesses include a computing device having transactional memory support. The computing device executes a code segment identified as suspicious and detects a transactional abort during execution of the code segment. The computing device may execute a security support thread concurrently with the code segment that reads one or more monitored memory locations. A transactional abort may be caused by a read of the security support thread conflicting with a write from the code segment. The computing device may set a breakpoint within the code segment, and a transactional abort may be caused by execution of the code segment reaching the breakpoint. An abort handler determines whether a security event has occurred and reports the security event. The abort handler may determine whether the security event has occurred based on the cause of the transactional abort. Other embodiments are described and claimed.

    摘要翻译: 用于检测未经授权的存储器访问的技术包括具有事务存储器支持的计算设备。 计算设备执行标识为可疑的代码段,并且在执行代码段期间检测事务中止。 计算设备可以与读取一个或多个监视的存储器位置的代码段同时执行安全支持线程。 事务中止可能是由安全支持线程读取与代码段的写入冲突引起的。 计算设备可以在代码段内设置断点,并且可能由执行到达断点的代码段引起事务中止。 中止处理程序确定是否发生安全事件并报告安全事件。 中止处理程序可以基于事务中止的原因来确定安全事件是否已经发生。 描述和要求保护其他实施例。

    Techniques for integrated endpoint and network detection and eradication of attacks

    公开(公告)号:US10469524B2

    公开(公告)日:2019-11-05

    申请号:US14369587

    申请日:2013-12-18

    申请人: INTEL CORPORATION

    IPC分类号: H04L29/06 G06F21/56 G06F21/55

    摘要: Various embodiments are generally directed to techniques to detect and eradicate malware attacks by employing information indicative of malware activity received from both endpoint devices and network devices proving network services to endpoint devices. An apparatus to detect malware includes a processor component, an analysis component for execution by the processor component to employ a trust level assigned to a device in a network as a factor in an analysis of an indication received from the device of a malware attack, and an eradication component for execution by the processor component to determine an action to take through the network to eradicate the malware attack based on the analysis. Other embodiments are described and claimed.