Abstract:
This document describes tools capable of making a portion of operating-system memory associated with a protection agent unalterable or inaccessible from an operating-system privilege mode. In some embodiments, these tools are capable of creating a protection-agent privilege mode by requesting that a virtual machine monitor protect this portion of operating-system memory. In other embodiments, these tools are capable of creating the protection-agent privilege mode by virtualizing a physical processor into multiple virtual processors, at least one of which is a protection-agent virtual processor designed to run the protection agent. By making this portion of operating-system memory unalterable or inaccessible from the operating-system privilege mode, the protection agent may be less vulnerable to attacks by entities operating within the operating-system privilege mode.
Abstract:
A computer includes a housing (100), a processor (120) positioned in the housing (100), and an external bus adapter (105, 110) configured to allow the processor (120) to access consumer electronics devices positioned outside of the housing (100) using an external bus. The processor (120) is configured to produce a first digital audio signal, to mix the first digital audio signal with a second digital audio signal to produce a unified digital audio signal, and to transmit the unified digital audio signal to a consumer electronics device using the external bus.
Abstract:
This document describes tools capable of enabling a protection agent to determine, from memory inaccessible from an operating-system privilege mode, whether one or more resources of an operating system have been modified. In some instances, these tools may enable the protection agent to reside within a virtual machine monitor. In other instances, the tools may enable the protection agent to reside within a distinct virtual partition provided by the virtual machine monitor. By operating outside of the operating-system privilege mode, the protection agent may be less vulnerable to attacks by entities operating within the operating-system privilege mode.
Abstract:
A computer includes a housing (100), a processor (120) positioned in the housing (100), and an external bus adapter (105, 110) configured to allow the processor (120) to access consumer electronics devices positioned outside of the housing (100) using an external bus. The processor (120) is configured to produce a first digital audio signal, to mix the first digital audio signal with a second digital audio signal to produce a unified digital audio signal, and to transmit the unified digital audio signal to a consumer electronics device using the external bus.
Abstract:
This document describes tools capable of enabling a protection agent to determine, from memory inaccessible from an operating-system privilege mode, whether one or more resources of an operating system have been modified. In some instances, these tools may enable the protection agent to reside within a virtual machine monitor. In other instances, the tools may enable the protection agent to reside within a distinct virtual partition provided by the virtual machine monitor. By operating outside of the operating-system privilege mode, the protection agent may be less vulnerable to attacks by entities operating within the operating-system privilege mode.
Abstract:
A computer includes a housing (100), a processor (120) positioned in the housing (100), and an external bus adapter (105, 110) configured to allow the processor (120) to access consumer electronics devices positioned outside of the housing (100) using an external bus. The processor (120) is configured to produce a first digital audio signal, to mix the first digital audio signal with a second digital audio signal to produce a unified digital audio signal, and to transmit the unified digital audio signal to a consumer electronics device using the external bus.
Abstract:
This document describes tools capable of making a portion of operating-system memory associated with a protection agent unalterable or inaccessible from an operating-system privilege mode. In some embodiments, these tools are capable of creating a protection-agent privilege mode by requesting that a virtual machine monitor protect this portion of operating-system memory. In other embodiments, these tools are capable of creating the protection-agent privilege mode by virtualizing a physical processor into multiple virtual processors, at least one of which is a protection-agent virtual processor designed to run the protection agent. By making this portion of operating-system memory unalterable or inaccessible from the operating-system privilege mode, the protection agent may be less vulnerable to attacks by entities operating within the operating-system privilege mode.