CONTROL FLOW INTEGRITY
    1.
    发明申请
    CONTROL FLOW INTEGRITY 审中-公开
    控制流程完整性

    公开(公告)号:WO2018063727A1

    公开(公告)日:2018-04-05

    申请号:PCT/US2017/049499

    申请日:2017-08-30

    Abstract: One embodiment provides an apparatus. The apparatus includes collector circuitry to capture processor trace (PT) data from a PT driver. The PT data includes a first target instruction pointer (TIP) packet including a first runtime target address of an indirect branch instruction of an executing target application. The apparatus further includes decoder circuitry to extract the first TIP packet from the PT data and to decode the first TIP packet to yield the first runtime target address. The apparatus further includes control flow validator circuitry to determine whether a control flow transfer to the first runtime target address corresponds to a control flow violation based, at least in part, on a control flow graph (CFG). The CFG including a plurality of nodes, each node including a start address of a first basic block, an end address of the first basic block and a next possible address of a second basic block or a not found tag.

    Abstract translation: 一个实施例提供了一种装置。 该设备包括收集器电路以从PT驱动器捕获处理器追踪(PT)数据。 PT数据包括第一目标指令指针(TIP)分组,其包括执行目标应用的间接分支指令的第一运行时目标地址。 该设备还包括解码器电路,用于从PT数据提取第一TIP分组并解码第一TIP分组以产生第一运行时目标地址。 该设备还包括控制流确认器电路,用于至少部分地基于控制流图(CFG)来确定到第一运行时间目标地址的控制流转移是否对应于控制流违例。 CFG包括多个节点,每个节点包括第一基本块的起始地址,第一基本块的结束地址和第二基本块的下一个可能地址或未找到的标签。

    SECURE PUBLIC CLOUD
    2.
    发明申请
    SECURE PUBLIC CLOUD 审中-公开
    安全的公共云

    公开(公告)号:WO2018031212A1

    公开(公告)日:2018-02-15

    申请号:PCT/US2017/043024

    申请日:2017-07-20

    Abstract: A method, system, computer-readable media, and apparatus for ensuring a secure cloud environment is provided, where public cloud services providers can remove their code from the Trusted Computing Base (TCB) of their cloud services consumers. The method for ensuring a secure cloud environment keeps the Virtual Machine Monitor (VMM), devices, firmware and the physical adversary (where a bad administrator/technician attempts to directly access the cloud host hardware) outside of a consumer's Virtual Machine (VM) TCB. Only the consumer that owns this secure VM can modify the VM or access contents of the VM (as determined by the consumer).

    Abstract translation: 提供了用于确保安全云环境的方法,系统,计算机可读介质和装置,其中公共云服务提供商可以从其云服务的可信计算库(TCB)中移除他们的代码 消费者。 确保安全云环境的方法使消费者的虚拟机(VM)TCB之外的虚拟机监视器(VMM),设备,固件和物理对手(坏的管理员/技术人员试图直接访问云主机硬件的地方) 。 只有拥有该安全虚拟机的消费者可以修改虚拟机或访问虚拟机的内容(由用户决定)。

    TECHNOLOGIES FOR EXECUTE ONLY TRANSACTIONAL MEMORY
    3.
    发明申请
    TECHNOLOGIES FOR EXECUTE ONLY TRANSACTIONAL MEMORY 审中-公开
    用于执行只有交易记忆的技术

    公开(公告)号:WO2017058463A1

    公开(公告)日:2017-04-06

    申请号:PCT/US2016/050093

    申请日:2016-09-02

    Abstract: Technologies for execute only transactional memory include a computing device with a processor and a memory. The processor includes an instruction translation lookaside buffer (iTLB) and a data translation lookaside buffer (dTLB). In response to a page miss, the processor determines whether a page physical address is within an execute only transactional (XOT) range of the memory. If within the XOT range, the processor may populate the iTLB with the page physical address and prevent the dTLB from being populated with the page physical address. In response to an asynchronous change of control flow such as an interrupt, the processor determines whether a last iTLB translation is within the XOT range. If within the XOT range, the processor clears or otherwise secures the processor register state. The processor ensures that an XOT range starts execution at an authorized entry point. Other embodiments are described and claimed.

    Abstract translation: 仅用于执行事务性存储器的技术包括具有处理器和存储器的计算设备。 处理器包括指令转换后备缓冲器(iTLB)和数据转换后备缓冲器(dTLB)。 响应于页面未命中,处理器确定页面物理地址是否在存储器的仅执行事务(XOT)范围内。 如果在XOT范围内,处理器可以使用页面物理地址填充iTLB,并防止dTLB填充页面物理地址。 响应于诸如中断的控制流的异步改变,处理器确定最后的iTLB转换是否在XOT范围内。 如果在XOT范围内,处理器将清除或以其他方式保护处理器寄存器状态。 处理器确保XOT范围在授权的入口点开始执行。 描述和要求保护其他实施例。

    MEMORY SCANNING METHODS AND APPARATUS
    4.
    发明申请
    MEMORY SCANNING METHODS AND APPARATUS 审中-公开
    内存扫描方法和设备

    公开(公告)号:WO2016160119A1

    公开(公告)日:2016-10-06

    申请号:PCT/US2016/016355

    申请日:2016-02-03

    CPC classification number: G06F21/567 G06F12/0802 G06F12/1009 G06F21/564

    Abstract: Memory scanning methods and apparatus are disclosed. An example apparatus includes a walker to traverse a paging structure of an address translation system; a bit analyzer to determine whether a bit associated with an entry of the paging structure is indicative of the entry being recently accessed; an address identifier to, when the bit analyzer determines that the bit associated with the entry of the paging structure is indicative of the entry being recently accessed, determine an address associated with the entry; and an outputter to provide the determined address to a memory scanner.

    Abstract translation: 公开了存储器扫描方法和装置。 示例性装置包括:行走者,用于遍历地址转换系统的寻呼结构; 位分析器,用于确定与所述寻呼结构的条目相关联的位是否指示最近访问的条目; 地址标识符,当位分析器确定与寻呼结构的条目相关联的位指示最近被访问的条目时,确定与条目相关联的地址; 以及输出器,用于将确定的地址提供给存储器扫描器。

    METHOD AND DEVICE FOR SECURELY SHARING IMAGES ACROSS UNTRUSTED CHANNELS
    5.
    发明申请
    METHOD AND DEVICE FOR SECURELY SHARING IMAGES ACROSS UNTRUSTED CHANNELS 审中-公开
    用于非侵入通道安全地共享图像的方法和装置

    公开(公告)号:WO2013039476A1

    公开(公告)日:2013-03-21

    申请号:PCT/US2011/051261

    申请日:2011-09-12

    Abstract: A method and device for securely sharing images across untrusted channels includes downloading an encrypted image from a remote server to a computing device. The encrypted image may be encrypted at the time of uploading by another user. The current user of the computing device is authenticated using a facial recognition procedure. If the current user is authenticated and is determined to be authorized to view the decrypted image, the encrypted image is decrypted and displayed to the user. If the user becomes unauthenticated (e.g., the user leaves the computing device or another user replaces the current user), the encrypted image is displayed in place of the encrypted image such that the decrypted image is displayed only for authorized persons physically present at the computing device.

    Abstract translation: 一种用于在不信任信道上安全地共享图像的方法和设备包括将加密图像从远程服务器下载到计算设备。 加密图像可以在其他用户上传时被加密。 使用面部识别程序认证计算设备的当前用户。 如果当前用户被认证并被确定被授权以查看解密的图像,则加密的图像被解密并显示给用户。 如果用户变得未认证(例如,用户离开计算设备或另一用户替换当前用户),则加密图像被代替加密图像被显示,使得解密的图像仅针对被计算的物理存在的授权人员显示 设备。

    MONITORING THE OPERATION OF A PROCESSOR
    8.
    发明申请
    MONITORING THE OPERATION OF A PROCESSOR 审中-公开
    监控处理器的运行

    公开(公告)号:WO2017105758A1

    公开(公告)日:2017-06-22

    申请号:PCT/US2016/062575

    申请日:2016-11-17

    Abstract: Embodiments of an invention for monitoring the operation of a processor are disclosed. In one embodiment, a system includes a processor and a hardware agent external to the processor. The processor includes virtualization logic to provide for the processor to operate in a root mode and in a non-root mode. The hardware agent is to verify operation of the processor in the non-root mode based on tracing information to be collected by a software agent to be executed by the processor in the root mode.

    Abstract translation: 公开了用于监视处理器的操作的发明的实施例。 在一个实施例中,系统包括处理器和处理器外部的硬件代理。 处理器包括虚拟化逻辑以提供处理器以根模式和非根模式操作。 硬件代理是基于由根处理器执行的软件代理收集的跟踪信息来验证处于非根模式的处理器的操作。

Patent Agency Ranking