Abstract:
A computer implemented method (200) for preventing rowhammer attack in a computing device is disclosed. The device has memory which includes a plurality of untrusted memory portions and a plurality of trusted memory portions, the plurality of untrusted memory portions and trusted memory portions being distributed within the memory. The method comprises: determining (202) respective trusted memory portions that are arranged physically contiguous to respective at least one untrusted memory portion to provide an identified set of trusted memory portions, the respective untrusted memory portions being accessible to perform the attack on the respective trusted memory portions; determining (204) trusted memory portions in the identified set of trusted memory portions that are movable to a different memory location in the memory; moving (206) the movable trusted memory portions to an available memory location in the memory to form a block of trusted memory portions; generating (208) at least one memory guard portion; and configuring (210) the memory guard portion to be arranged at an end of the block of trusted memory portions that is physically contiguous to an untrusted memory portion. The memory guard portion prevents electrical-interaction between the block of trusted memory portions and the untrusted memory portion to prevent the attack.
Abstract:
This document discloses a system and method for managing installation of an application package (APK) in a device whereby the APK requires the device to grant specific high-risk permissions to the application upon installation.
Abstract translation:该文件公开了一种用于管理设备中的应用程序包(APK)的安装的系统和方法,由此APK需要设备在安装时向应用程序授予特定的高风险许可。 p >
Abstract:
This document describes a device and method for a device to reinforce the control flow integrity of a software application as the application is being executed on the device.
Abstract:
This document discloses a system and method for verifying system integrity of an electronic device. The electronic device includes a verifier module provided within a secure environment of the electronic device and a scanner module provided within a normal environment of the electronic device whereby the secure environment comprises hardware that is isolated from the hardware in the normal environment, i.e. these two environments are hardware isolated.