Abstract:
PROBLEM TO BE SOLVED: To achieve end-to-end security with traffic visibility. SOLUTION: A combined encryption-authentication unit includes a cipher unit and an authentication unit coupled in parallel to the cipher unit, and generates an authentication tag by using an authentication key, in parallel with the generation of the cipher text using an encryption key, where the authentication key and the encryption key have different key values. In various embodiments, the cipher unit operates in AES counter mode, and the authentication unit operates in parallel, in an AES-GMAC mode. Using a two key, single-pass combined mode algorithm preserves network performance by using a limited number of HW gates, while allowing an intermediate device to access to the encryption key for deciphering the data, without having to provide to that device the ability to compromise data integrity, which is preserved between the end to end devices. COPYRIGHT: (C)2009,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To more efficiently and effectively protect software agents, in particular, critical software agents in a VT environment. SOLUTION: Methods and apparatuses for comparing a first security domain of a first memory page of a physical device to a second security domain of a second memory page of the physical device, with a plurality of security domains being stored in one or more registers of a processor of the physical device are included. Based on the comparison, the processor disallows an instruction from the first memory page to access the second memory page if a preferential domain of the first security domain is different from that of the second security domain. COPYRIGHT: (C)2009,JPO&INPIT
Abstract:
A technique to enable secure application and data integrity within a computer system. In one embodiment, one or more secure enclaves are established in which an application and data may be stored and executed.
Abstract:
Embodiments of apparatuses and methods including virtual address memory range registers are disclosed. In one embodiment, a processor includes a memory interface, address translation hardware, and virtual memory address comparison hardware. The memory interface is to access a system memory using a physical memory address. The address translation hardware is to support translation of a virtual memory address to the physical memory address. The virtual memory address is used by software to access a virtual memory location in the virtual memory address space of the processor. The virtual memory address comparison hardware is to determine whether the virtual memory address is within a virtual memory address range.
Abstract:
Un procesador (200) que comprende: una unidad de instrucción (214) para recibir una primera instrucción, en donde la primera instrucción es inicializar un enclave seguro, y en donde la primera instrucción también incluye establecer un bit de atributo específico de funcionalidad para el enclave seguro; y una unidad de ejecución (270) para ejecutar la primera instrucción, en donde la ejecución de la primera instrucción incluye verificar que una clave de estructura de firma coincida con una clave digital (216) incorporada en el procesador para permitir que el software que se ejecuta dentro del enclave seguro utilice software o hardware para realizar una función fuera del enclave seguro; y en donde la unidad de instrucción (214) sirve también para recibir una segunda instrucción desde dentro del enclave seguro, y la unidad de ejecución (270) sirve para ejecutar la segunda instrucción, en donde la ejecución de la segunda instrucción incluye proporcionar una clave específica de funcionalidad si se activa el bit de atributo específico de funcionalidad.
Abstract:
On décrit ici des procédés, des dispositifs, des articles et des systèmes pour observer, à l'aide d'un gestionnaire de machines virtuelles d'un dispositif physique, l'exécution d'un traitement cible d'une machine virtuelle du dispositif physique, y compris des adresses virtuelles de la machine virtuelle auxquelles il est fait référence pendant l'exécution. Le gestionnaire de machines virtuelles détermine en outre si le traitement cible s'exécute d'une manière escomptée en se basant au moins en partie sur les références à des adresses virtuelles observées et sur les références à des adresses virtuelles escomptées.
Abstract:
A virtual machine manager of a physical device observing execution of a target process of a virtual machine of the physical device, including virtual addresses of the virtual machine referenced during the execution, and determining whether the target process is executing in an expected manner based at least in part on the observed virtual address references and expected virtual address references.