PERIPHERAL BASED MEMORY SAFETY SCHEME FOR MULTI-CORE PLATFORMS

    公开(公告)号:US20200174694A1

    公开(公告)日:2020-06-04

    申请号:US16206066

    申请日:2018-11-30

    Applicant: NXP B.V.

    Abstract: A computing system using low-fat pointers, including: a memory configured to be accessed by the low-fat pointers; a processing core configured to access the memory; an interrupt controller configured to receive interrupts and to communicate interrupts to processes running on the processing core; and a memory safety peripheral configured to receive a pointer request, wherein the pointer is a low-fat pointer and to verify that the pointer request is within required memory bounds

    PROBABILISTIC MEMORY SAFETY USING CRYPTOGRAPHY

    公开(公告)号:US20200380140A1

    公开(公告)日:2020-12-03

    申请号:US16427977

    申请日:2019-05-31

    Applicant: NXP B.V.

    Abstract: A chip for securing storage of information includes a manager to access a pointer and a cipher engine to decrypt stored data. The pointer includes a first area and a second area. The first area includes an address indicating a storage location of the data and the second area includes a safety tag. The cipher engine decrypts the data output from the storage location based on a key and the safety tag in the second area of the pointer. These and other operations may be performed based on metadata that indicate probabilities that a correct safety tag was used to decrypt the data. in another embodiment, the manager may be replaced with an L1 cache.

    USING WHITE-BOX IN A LEAKAGE-RESILIENT PRIMITIVE

    公开(公告)号:US20190132116A1

    公开(公告)日:2019-05-02

    申请号:US15795890

    申请日:2017-10-27

    Applicant: NXP B.V.

    Abstract: A method for implementing a pseudo-random function (PRF) using a white-box implementation of a cryptographic function in N rounds, including: receiving an input to the PRF; receiving a cryptographic key in a first round; encrypting, using the white-box implementation of the cryptographic function and the cryptographic key, an input message that is one of M possible input messages based upon a portion of the input to produce a first output; for each succeeding round: encrypting, using the white-box implementation of the cryptographic function and an ith cryptographic key, further input messages that are one of M possible input messages based upon a further portion of the input to produce an ith output, wherein the ith cryptographic key is the output from the preceding round, wherein the white-box implementation of the cryptographic function only produces a correct output for the M possible input messages and produces an incorrect output for input messages that are not one of the M possible input messages.

Patent Agency Ranking