Technologies for deterministic code flow integrity protection

    公开(公告)号:US10223528B2

    公开(公告)日:2019-03-05

    申请号:US15276895

    申请日:2016-09-27

    Abstract: Technologies for code flow integrity protection include a static analyzer that identifies a potential gadget in an atomic code path of a protected code. A marker instruction is inserted after the potential gadget with a parameter that corresponds to an address of the marker instruction, a hash evaluator instruction is inserted after an exit point of the atomic code path with a parameter that corresponds to the address of the marker instruction, and a compare evaluator instruction and a hash check instruction are inserted after the hash evaluator instruction. A target computing device executes the protected code and updates a path hash as a function of the parameter of the marker instruction, determines an expected hash value as a function of the parameter of the hash evaluator instruction, and generates an exception if the path hash and the expected hash value do not match. Other embodiments are described and claimed.

    Secure Public Cloud with Protected Guest-Verified Host Control

    公开(公告)号:US20180373895A9

    公开(公告)日:2018-12-27

    申请号:US15444771

    申请日:2017-02-28

    Abstract: A host Virtual Machine Monitor (VMM) operates “blindly,” without the host VMM having the ability to access data within a guest virtual machine (VM) or the ability to access directly control structures that control execution flow of the guest VM. Guest VMs execute within a protected region of memory (called a key domain) that even the host VMM cannot access. Virtualization data structures that pertain to the execution state (e.g., a Virtual Machine Control Structure (VMCS)) and memory mappings (e.g., Extended Page Tables (EPTs)) of the guest VM are also located in the protected memory region and are also encrypted with the key domain key. The host VMM and other guest VMs, which do not possess the key domain key for other key domains, cannot directly modify these control structures nor access the protected memory region. The host VMM, however, can verify correctness of the control structures of guest VMs.

    Memory scanning methods and apparatus

    公开(公告)号:US09805194B2

    公开(公告)日:2017-10-31

    申请号:US14671764

    申请日:2015-03-27

    CPC classification number: G06F21/567 G06F12/0802 G06F12/1009 G06F21/564

    Abstract: Memory scanning methods and apparatus are disclosed. An example apparatus includes a walker to traverse a paging structure of an address translation system; a bit analyzer to determine whether a bit associated with an entry of the paging structure is indicative of the entry being recently accessed; an address identifier to, when the bit analyzer determines that the bit associated with the entry of the paging structure is indicative of the entry being recently accessed, determine an address associated with the entry; and an outputter to provide the determined address to a memory scanner.

    Memory integrity with error detection and correction

    公开(公告)号:US20170185532A1

    公开(公告)日:2017-06-29

    申请号:US14998054

    申请日:2015-12-24

    Abstract: Apparatus, systems, and/or methods may provide for identifying unencrypted data including a plurality of bits, wherein the unencrypted data may be encrypted and stored in memory. In addition, a determination may be made as to whether the unencrypted data includes a random distribution of the plurality of bits, for example based on a compressibility function. An integrity action may be implemented when the unencrypted data includes a random distribution of the plurality of bits, which may include error correction including a modification to ciphertext of the unencrypted data. Independently of error correction, a diffuser may generate intermediate and final ciphertext. In addition, a key and/or a tweak may be derived for a location in the memory. Moreover, an integrity value may be generated (e.g., as a copy) from a portion of the unencrypted data, and/or stored in a slot of an integrity check line based on the location.

    Range Based User Identification and Profile Determination
    60.
    发明申请
    Range Based User Identification and Profile Determination 审中-公开
    基于范围的用户识别和简档确定

    公开(公告)号:US20160269406A1

    公开(公告)日:2016-09-15

    申请号:US15154399

    申请日:2016-05-13

    CPC classification number: H04L63/0876 G06F21/35 G06Q10/10 G06Q30/02 H04L67/306

    Abstract: An embodiment includes a main compute node that detects the physical presence of a first user and subsequently loads a profile for the first user. The main compute node may detect the first user's presence based on detecting a first compute node corresponding to the first user. For example, the main compute node may be a desktop computer that detects the presence of the first user's Smart phone, which is nearby the first user. The main compute node may unload the first user's profile when the main compute node no longer detects the first user's presence. Upon detecting a second user's presence, the main computer may load a profile for the second user. The profile may include cookies and/or other identifiers for the second user. The profile may facilitate the second user's navigation of a computing environment (e.g. web pages). Other embodiments are addressed herein.

    Abstract translation: 一个实施例包括主计算节点,其检测第一用户的物理存在并随后加载用于第一用户的简档。 主计算节点可以基于检测对应于第一用户的第一计算节点来检测第一用户的存在。 例如,主计算节点可以是检测在第一用户附近的第一用户的智能电话的存在的台式计算机。 当主计算节点不再检测到第一用户的存在时,主计算节点可以卸载第一用户的简档。 在检测到第二用户的存在时,主计算机可以加载用于第二用户的简档。 该简档可以包括用于第二用户的cookie和/或其他标识符。 该简档可以促进第二用户导航计算环境(例如,网页)。 其他实施例在这里被解决。

Patent Agency Ranking