METHOD FOR CIRCUMVENTING PROCESSOR ERROR INDUCED VULNERABILITY

    公开(公告)号:US20240370575A1

    公开(公告)日:2024-11-07

    申请号:US18691811

    申请日:2022-08-03

    Abstract: Various embodiments include methods and devices for circumventing processor error induced vulnerability. Embodiments may include determining whether a condition indicative of an error in a processor exists for a first processor, and preventing use of the first processor in response to determining that the condition indicative of the error in the processor exists for the first processor. In some embodiments, preventing use of the first processor may include transitioning the first processor to a low power state. In some embodiments, preventing use of the first processor may include preventing the first processor from being registered with an operating system. In some embodiments, the condition indicative of the error in the processor may include an enabled non-secure debug feature of the processor and a disabled secure debug feature of the processor.

    FUSE-BASED SEED AS AN INPUT FOR A PSEUDO-RANDOM NUMBER GENERATOR

    公开(公告)号:US20240354060A1

    公开(公告)日:2024-10-24

    申请号:US18303361

    申请日:2023-04-19

    CPC classification number: G06F7/582 G06F9/4401

    Abstract: Systems and techniques are provided for booting an electronic device. For example, a process can include initiating a boot procedure for the electronic device. The process can also include determining a hardware pseudo-random number generator (PRNG) is inoperable, obtaining a seed value from a read-only memory, based on the determination that the hardware PRNG is inoperable, initiating a software PRNG based on the seed value, obtaining a pseudo-random number from the software PRNG, and continuing the boot procedure using the obtained pseudo-random number.

    DEFENSE AGAINST ROW HAMMER ATTACKS
    3.
    发明公开

    公开(公告)号:US20230410882A1

    公开(公告)日:2023-12-21

    申请号:US17842606

    申请日:2022-06-16

    CPC classification number: G11C11/4078 G11C11/4087 G11C11/40615 G11C11/40618

    Abstract: The present disclosure generally relates to techniques for defending against row hammer attacks. Some aspects of the present disclosure include systems and techniques for defending against row hammer attacks using dynamic assignment of guard rows. One example computing device for memory protection generally includes at least one memory and one or more processors coupled to the at least one memory and configured to: receive a first memory assignment for a service; determine, in response to receiving the first memory assignment, that the service is associated with a type of data; assign guard rows adjacent to a memory subset to protect the memory subset based on the determination; and dedicate at least a portion of the memory subset for storage of data for the service.

Patent Agency Ranking