Abstract:
Methods, systems and computer readable media are provide for protecting stored data from ransomware. In an embodiment, the data is stored in an external drive connected to the processor. The connection between the processor and external drive is interrupted (e.g., open) except during a data transfer between the processor and the external drive. Connection of the processor to the external drive, permitted for a time period specified by a user or until the transfer of data is complete, occurs in response to manual actuation of a control means interposed between the processor and external drive and optionally, an indication from the user computing system that malware has not been detected on the device. The control means may be a mechanical switch or a fingerprint authentication device.
Abstract:
A computer implemented method of detecting execution of unregistered code in a protected networked system, comprising maintaining a pages registry record in a storage of an endpoint in a protected networked system, the pages registry record comprising a registration signature for each of a plurality of registered executable pages, monitoring a plurality of executable pages at a page management level using an adjusted page fault handler of an operating system kernel executed by one or more processors of the endpoint, detecting one or more unregistered executable pages by identifying incompliance of a runtime signature calculated in runtime for the unregistered executable page(s) with respective registration signature stored in the pages registry record and initiating one or more actions in case of the detection of the unregistered executable page(s).
Abstract translation:一种用于检测受保护的联网系统中的未注册代码的执行的计算机实现的方法,包括:将页面注册表记录维护在受保护的联网系统中的端点的存储装置中,所述页面注册表记录包括注册签名 对于多个注册的可执行页面中的每一个,使用由所述端点的一个或多个处理器执行的操作系统内核的经调整的页面错误处理程序,在页面管理级别监视多个可执行页面;通过以下步骤检测一个或多个未注册的可执行页面: 识别未注册的可执行页面在运行时计算的运行时间签名与存储在页面注册表记录中的相应注册签名的不一致性,并且在检测到未注册的可执行页面的情况下启动一个或多个动作。 p >
Abstract:
Embodiments of apparatus, computer-implemented methods, systems, devices, and computer-readable media are described herein for identifying and encrypting a subset of a plurality of instructions, for execution in a more secure execution environment, In various embodiments, the subset may include a single entry point and a single exit point. In various embodiments, one or more instructions of the plurality of instructions that precede or follow the subset may be executed in a first execution environment with a first security level. In various embodiments, the subset may be executed in a second execution environment with a second security level that is more secure than the first security level.
Abstract translation:为了实现使用便携式信息终端的控制装置HMI功能,HMI显示终端单元(4)具有人体检测传感器(45),IEEE802.11 I / F(46)和用于传送数据的CPU 从控制装置和HMI显示数据,用于通过IEEE802.11 I / F 46格式化收集的数据以显示到智能手机,其中CPU基于人的检测结果来确定操作者是否接近 检测传感器(45),当操作者靠近时,通过IEEE802.11 I / F(46)获取操作者的智能手机专用信息,根据获取的特定信息对智能手机进行认证,当认证成功时,发送 HMI显示数据和收集的数据,当认证失败时,不发送HMI显示数据和收集的数据。
Abstract:
In one embodiment, a method includes initializing a portion of a computing system in a pre-boot environment using a basic input/output system (BIOS) stored in a non-volatile storage of the computing system, launching a boot manager to enable a launch of an operating system (OS) payload, and if the OS payload is not successfully launched, executing an OS payload portion and an antivirus stack stored in the non-volatile storage to restore an integrity of the mass storage. Other embodiments are described and claimed.
Abstract:
Disclosed is a system and method for extending anti-malware protection to systems having multiple storage devices, such as RAID. In embodiments, a trusted connection may be established between a host and a controller of the multiple storage devices. The trusted connection may use various information encryption techniques to undermine attempts by malware to preserve malware-infected locations on the storage devices by redirecting anti-malware protection related operations by the host. Through an encrypted and trusted connection between the host and a controller of the multiple storage devices, anti-virus and/or anti-malware software (hereinafter, AVS) may transmit encrypted anti-malware protection related operations to the controller of the multiple storage devices, overcoming detection and/or diversion by the malware. Other embodiments may be described and claimed.
Abstract:
Embodiments of processors, methods, and systems for directed wakeup into a secured system environment are disclosed. In one embodiment, a processor includes a decode unit, a control unit, and a messaging unit. The decode unit is to receive a secured system environment wakeup instruction. The control unit is to cause wake-inhibit indicator to be set for each of a plurality of responding logical processor to be kept in a sleep state. The messaging unit is to send a wakeup message to the plurality of responding logical processors, wherein the wakeup message is to be ignored by each of the plurality of responding logical processors for which the wake-inhibit indicator is set.
Abstract:
Embodiments herein relate to accessing secure information over a network. The secure information is read and/or modified based on a command received over the network, regardless of an operating state of an operating system (OS) of the device and/or a power state of the device.
Abstract:
A data processing system may include a high integrity storage (HIS) device with a partition or cache that is protected from updates. The data processing system may perform a boot process in response to being reactivated. The boot process may include the operation of executing a boot object. During the boot process, before executing the boot object, the data processing system may retrieve a digest for the boot object from the protected cache of the HIS device. The digest may be a cryptographic hash value for the boot object. During the boot process, the retrieved digest may be extended into a platform configuration register in a trusted platform module of the data processing system. Other embodiments are described and claimed.