Application Integrity Attestation
    1.
    发明公开

    公开(公告)号:US20240078343A1

    公开(公告)日:2024-03-07

    申请号:US18463744

    申请日:2023-09-08

    Applicant: Apple Inc.

    CPC classification number: G06F21/64 H04L9/14 H04L9/3236 H04L9/3263 H04L9/3271

    Abstract: Techniques are disclosed relating to application verification. In various embodiments, a computing device includes a secure circuit configured to maintain a plurality of cryptographic keys of the computing device. In such an embodiment, the computing device receives, from an application, a request for an attestation usable to confirm an integrity of the application, instructs the secure circuit to use one of the plurality of cryptographic keys to supply the attestation for the application, and provides the attestation to a remote computing system in communication with the application. In some embodiments, the secure circuit is configured to verify received metadata pertaining to the identity of the application and use the cryptographic key to generate the attestation indicative of the identity of the application.

    Return-oriented programming (ROP)/jump oriented programming (JOP) attack protection

    公开(公告)号:US10831484B1

    公开(公告)日:2020-11-10

    申请号:US16524490

    申请日:2019-07-29

    Applicant: Apple Inc.

    Abstract: In an embodiment, a processor includes hardware circuitry and/or supports instructions which may be used to detect that a return address or jump address has been modified since it was written to memory. In response to detecting the modification, the processor may be configured to signal an exception or otherwise initiate error handling to prevent execution at the modified address. In an embodiment, the processor may perform a cryptographic sign operation on the return address/jump address before writing the signed return address/jump address to memory and the signature may be verified before the address is used as a return target or jump target. Security of the system may be improved by foiling ROP/JOP attacks.

    Secure escrow service
    5.
    发明授权

    公开(公告)号:US10708049B2

    公开(公告)日:2020-07-07

    申请号:US16186426

    申请日:2018-11-09

    Applicant: Apple Inc.

    Abstract: A method of restoring confidential information items of a first device to a second device by using a set of servers. The method generates a public and private key pair and ties the private key to the hash of executable code of the servers at the time of generating the public and private keys. The method receives the encrypted confidential information items in a secure object which is encrypted with a user-specific key and the public key. The method only provides the confidential information to the second device when the second device provides the same user-specific key as the key that encrypts the secure object and the hash of the executable code of the servers at the time of accessing the private key to decrypt the secure object matches the hash of the executable code running on the servers at the time of generating the private key.

    Return-oriented programming (ROP)/jump oriented programming (JOP) attack protection

    公开(公告)号:US10409600B1

    公开(公告)日:2019-09-10

    申请号:US15202269

    申请日:2016-07-05

    Applicant: Apple Inc.

    Abstract: In an embodiment, a processor includes hardware circuitry and/or supports instructions which may be used to detect that a return address or jump address has been modified since it was written to memory. In response to detecting the modification, the processor may be configured to signal an exception or otherwise initiate error handling to prevent execution at the modified address. In an embodiment, the processor may perform a cryptographic sign operation on the return address/jump address before writing the signed return address/jump address to memory and the signature may be verified before the to address is used as a return target or jump target. Security of the system may be improved by foiling ROP/JOP attacks.

Patent Agency Ranking