Page Protection Layer
    1.
    发明申请

    公开(公告)号:US20200081847A1

    公开(公告)日:2020-03-12

    申请号:US16564502

    申请日:2019-09-09

    Applicant: Apple Inc.

    Abstract: In an embodiment, a computer system comprises a page protection layer. The page protection layer may be the component in the system which manages the page tables for virtual to physical page mappings. Transactions to the page protection layer are used to create/manage mappings created in the page tables. The page protection layer may enforce dynamic security policies in the system (i.e. security policies that may not be enforced using only a static hardware configuration). In an embodiment, the page protection layer may ensure that it is the only component which is able to modify the page tables. The page protection layer may ensure than no component in the system is able to modify a page that is marked executable in any process' address space. The page protection may ensure that any page that is marked executable has code with a verified code signature, in an embodiment.

    MARKING VALID RETURN TARGETS
    2.
    发明申请
    MARKING VALID RETURN TARGETS 审中-公开
    标记有效的返回目标

    公开(公告)号:US20170024559A1

    公开(公告)日:2017-01-26

    申请号:US14807609

    申请日:2015-07-23

    Applicant: Apple Inc.

    CPC classification number: G06F21/54

    Abstract: Systems, apparatuses, methods, and computer-readable mediums for preventing return oriented programming (ROP) attacks. A compiler may insert landing pads adjacent to valid return targets in an instruction sequence. When a return instruction is executed, the processor may treat the return as suspicious if the target of the return instruction does not have an adjacent landing pad. Additionally, each landing pad may be encoded with a color, and a colored launch pad may be inserted into the instruction stream next to each return instruction. When a return instruction is executed, the processor may determine if the target of the return has a landing pad with the same color as the launch pad of the return instruction. Return-target pairs with color mismatches may be treated as suspicious and the offending process may be killed.

    Abstract translation: 用于防止返回定向编程(ROP)攻击的系统,装置,方法和计算机可读介质。 编译器可以在指令序列中插入与有效返回目标相邻的着陆焊盘。 当执行返回指令时,如果返回指令的目标没有相邻的着陆垫,则处理器可以将返回值视为可疑。 此外,每个着陆垫可以用颜色编码,并且彩色的发射板可以插入每个返回指令旁边的指令流中。 当执行返回指令时,处理器可以确定返回目标是否具有与返回指令的发射台相同颜色的着陆键盘。 具有颜色不匹配的返回目标对可能被视为可疑的,并且违规进程可能被杀死。

    FINE-GRAINED ADDRESS SPACE LAYOUT RANDOMIZATION

    公开(公告)号:US20200034527A1

    公开(公告)日:2020-01-30

    申请号:US16409654

    申请日:2019-05-10

    Applicant: Apple Inc.

    Abstract: A data processing system can use a method of fine-grained address space layout randomization to mitigate the system's vulnerability to return oriented programming security exploits. The randomization can occur at the sub-segment level by randomizing clumps of virtual memory pages. The randomized virtual memory can be presented to processes executing on the system. The mapping between memory spaces can be obfuscated using several obfuscation techniques to prevent the reverse engineering of the shuffled virtual memory mapping.

    Fine-grained memory address space layout randomization

    公开(公告)号:US11188638B2

    公开(公告)日:2021-11-30

    申请号:US16409654

    申请日:2019-05-10

    Applicant: Apple Inc.

    Abstract: A data processing system can use a method of fine-grained address space layout randomization to mitigate the system's vulnerability to return oriented programming security exploits. The randomization can occur at the sub-segment level by randomizing clumps of virtual memory pages. The randomized virtual memory can be presented to processes executing on the system. The mapping between memory spaces can be obfuscated using several obfuscation techniques to prevent the reverse engineering of the shuffled virtual memory mapping.

    ASLR MAP OBFUSCATION
    7.
    发明申请
    ASLR MAP OBFUSCATION 审中-公开
    ASLR地图OBFUSCATION

    公开(公告)号:US20160092674A1

    公开(公告)日:2016-03-31

    申请号:US14503195

    申请日:2014-09-30

    Applicant: Apple Inc.

    CPC classification number: G06F21/52 G06F21/53 G06F2221/033

    Abstract: A data processing system can use a method of fine-grained address space layout randomization to mitigate the system's vulnerability to return oriented programming security exploits. The randomization can occur at the sub-segment level by randomizing clumps of virtual memory pages. The randomized virtual memory can be presented to processes executing on the system. The mapping between memory spaces can be obfuscated using several obfuscation techniques to prevent the reverse engineering of the shuffled virtual memory mapping.

    Abstract translation: 数据处理系统可以使用细粒度的地址空间布局随机化方法来减轻系统的漏洞,从而导致面向对象的编程安全漏洞。 随机化可以通过随机分组虚拟内存页面在子分段级别进行。 随机虚拟内存可以呈现给在系统上执行的进程。 可以使用几种混淆技术来模糊存储空间之间的映射,以防止混洗的虚拟内存映射的反向工程。

    Page protection layer
    8.
    发明授权

    公开(公告)号:US11188477B2

    公开(公告)日:2021-11-30

    申请号:US16564502

    申请日:2019-09-09

    Applicant: Apple Inc.

    Abstract: In an embodiment, a computer system comprises a page protection layer. The page protection layer may be the component in the system which manages the page tables for virtual to physical page mappings. Transactions to the page protection layer are used to create/manage mappings created in the page tables. The page protection layer may enforce dynamic security policies in the system (i.e. security policies that may not be enforced using only a static hardware configuration). In an embodiment, the page protection layer may ensure that it is the only component which is able to modify the page tables. The page protection layer may ensure than no component in the system is able to modify a page that is marked executable in any process' address space. The page protection may ensure that any page that is marked executable has code with a verified code signature, in an embodiment.

Patent Agency Ranking