-
公开(公告)号:US20220391507A1
公开(公告)日:2022-12-08
申请号:US17761646
申请日:2019-10-25
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Christopher Ian Dalton , David Plaquin , Pierre Belgarric , Titouan Lazard
Abstract: In an example there is provided an apparatus for a computing system. The apparatus comprises a central processing unit (CPU) and at least one further hardware component. The apparatus comprises a probe communicatively coupled with the hardware component and the CPU, to intercept communication between the hardware component and CPU and an inspection module communicatively coupled to the probe, to access communication data intercepted at the probe relating to communication between the hardware component and CPU determine a state of a process executing on the CPU, on the basis of the communication data and apply a model to the state to infer malicious activity on the CPU.
-
公开(公告)号:US20220342984A1
公开(公告)日:2022-10-27
申请号:US17761694
申请日:2019-10-25
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Maugan Villatel , David Plaquin , Christopher Ian Dalton
IPC: G06F21/55
Abstract: There is described a method including obtaining memory management configuration data, for example, from a memory management unit. The memory management configuration data is used to identify memory locations having a predetermined property. Content is monitored at the identified memory locations.
-
公开(公告)号:US11449618B2
公开(公告)日:2022-09-20
申请号:US17047030
申请日:2019-08-06
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: David Plaquin , Christopher Ian Dalton , Ronny Chevalier
Abstract: A method is provided, comprising actively testing the access control policy of a software target using a probing logic. The method further comprises determining whether an intrusion in the software target has occurred based on monitored side effects. According to the method, the probing logic is to execute at least one operation that is forbidden by the access control policy. The probing logic is further to create at least one predetermined observable side effect based on the successful execution of the operation.
-
24.
公开(公告)号:US20210406378A1
公开(公告)日:2021-12-30
申请号:US16479737
申请日:2018-01-29
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Jeffrey Kevin Jeansonne , Rosilet Retnamoni Braduke , Joshua Serratelli Schiffman , David Plaquin
Abstract: An example system with a pre-OS (Operating System) environment, the pre-OS environment includes a private memory that is isolated from a processor of the system. The pre-OS environment also includes an embedded controller (EC) coupled to the private memory, where the EC includes an embedded key. The EC is to execute instructions to generate an encryption key based on the embedded key; generate a signature key; obtain data; produce an integrity-verification tag based on a hash of the obtained data, where the hash employs the signature key; encrypt the obtained data based on the encryption key; store the encrypted data in the private memory; and store the integrity-verification tag in the private memory in association with the stored encrypted data.
-
公开(公告)号:US20210326443A1
公开(公告)日:2021-10-21
申请号:US16604161
申请日:2018-05-02
Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
Inventor: David Plaquin , Ijlal Loutfi
Abstract: An example method is disclosed, for example a method of executing a software module in a computing system, the method comprising executing, in a first processing device of the computing system, a first software module to verify a second software module and to cause a second processing device of the computing system to execute the second software module, executing, in the second processing device, the second software module to execute, in the second processing device, a third software module and to provide a first key of a key pair to the third software module, and protecting, by the second processing device, a memory space associated with the third software module, wherein the memory space contains the first key of the key pair, wherein the first processing device contains a second key of the key pair.
-
公开(公告)号:US20210312092A1
公开(公告)日:2021-10-07
申请号:US17058152
申请日:2018-10-25
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Pierre Belgarric , David Plaquin , Eugene Cohen , Chris R. Gunning
IPC: G06F21/76 , G06K19/073 , G06F1/3296 , G06F21/60
Abstract: An IC comprising functional circuit to perform primary functions of the IC is provided. The functional circuit is to enable electrical signals to propagate through it within a timing constraint of the functional circuit. The IC comprises at least one canary circuit used for detecting glitch attacks on the circuit. Electrical signals are to propagate through the canary circuit(s) within a defined timing constraint of the canary circuit(s). The canary circuit is to provide a signal path designed such that in the event of a timing constraint of the functional circuit(s) is violated due to a glitch attack, also the timing constraint of the canary circuit(s) is violated.
-
公开(公告)号:US20190332510A1
公开(公告)日:2019-10-31
申请号:US16503887
申请日:2019-07-05
Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
Inventor: Jeffrey Kevin Jeansonne , Boris Balacheff , Valiuddin Ali , Chris I. Dalton , David Plaquin
Abstract: Examples herein disclose monitoring an expected functionality upon execution of a system management mode (SMM) code. The examples detect whether a change has occurred to the SMM code based on the monitoring of the expected functionality. The change indicates that the SMM code is compromised.
-
公开(公告)号:US10387651B2
公开(公告)日:2019-08-20
申请号:US15329877
申请日:2014-09-23
Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
Inventor: Jeffrey Kevin Jeansonne , Boris Balacheff , Valiuddin Ali , Chris I Dalton , David Plaquin
Abstract: Examples herein disclose monitoring an expected functionality upon execution of a system management mode (SMM) BIOS code. The examples detect whether a change has occurred to the SMM BIOS code based on the monitoring of the expected functionality. The change indicates that the SMM BIOS code is compromised.
-
公开(公告)号:US11860207B2
公开(公告)日:2024-01-02
申请号:US17758143
申请日:2020-01-31
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: David Plaquin , Carey Huscroft
IPC: G01R29/08 , G01R31/312
CPC classification number: G01R29/0814 , G01R31/312
Abstract: In an example, a method includes receiving an indication of an electrical parameter associated with at least part of a computing device. The method further includes determining whether or not the indication is indicative of an expected electric field distribution associated with a specified hardware configuration for the computing device.
-
公开(公告)号:US11615188B2
公开(公告)日:2023-03-28
申请号:US16604161
申请日:2018-05-02
Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
Inventor: David Plaquin , Ijlal Loutfi
Abstract: An example method is disclosed, for example a method of executing a software module in a computing system, the method comprising executing, in a first processing device of the computing system, a first software module to verify a second software module and to cause a second processing device of the computing system to execute the second software module, executing, in the second processing device, the second software module to execute, in the second processing device, a third software module and to provide a first key of a key pair to the third software module, and protecting, by the second processing device, a memory space associated with the third software module, wherein the memory space contains the first key of the key pair, wherein the first processing device contains a second key of the key pair.
-
-
-
-
-
-
-
-
-