Tagless implicit integrity with multi-perspective pattern search

    公开(公告)号:US12045174B2

    公开(公告)日:2024-07-23

    申请号:US17704771

    申请日:2022-03-25

    CPC classification number: G06F12/1408 G06F9/30043 G06F12/1441 G06F12/1458

    Abstract: Embodiments are directed to tagless implicit integrity with multi-perspective pattern search for memory safety. An embodiment of an apparatus includes one or more processors comprising hardware circuitry to: access encrypted data stored in a memory hierarchy using a pointer; decrypt the encrypted data using a current version of a pointer tag of the pointer to yield first decrypted data; perform an entropy test on the first decrypted data; responsive to the entropy test failing to detect patterns in the first decrypted data, re-decrypt the encrypted data using one or more different versions of the pointer tag of the pointer to yield one or more other decrypted data; perform the entropy test on the one or more other decrypted versions; and responsive to the entropy test detecting the patterns in the one or more other decrypted data, signal an exception to the one or more processors with respect to the encrypted data.

    Object and cacheline granularity cryptographic memory integrity

    公开(公告)号:US11954045B2

    公开(公告)日:2024-04-09

    申请号:US17485213

    申请日:2021-09-24

    CPC classification number: G06F12/1408 G06F12/0802 G06F21/554 G06F2212/466

    Abstract: Technologies disclosed herein provide one example of a system that includes processor circuitry and integrity circuitry. The processor circuitry is to receive a first request associated with an application to perform a memory access operation for an address range in a memory allocation of memory circuitry. The integrity circuitry is to determine a location of a metadata region within a cacheline that includes at least some of the address range, identify a first portion of the cacheline based at least in part on a first data bounds value stored in the metadata region, generate a first integrity value based on the first portion of the cacheline, and prevent the memory access operation in response to determining that the first integrity value does not correspond to a second integrity value stored in the metadata region.

    Technologies for memory tagging
    5.
    发明授权

    公开(公告)号:US11940927B2

    公开(公告)日:2024-03-26

    申请号:US17839877

    申请日:2022-06-14

    CPC classification number: G06F12/1009 G06F12/0238 G06F12/1063 G06F12/1408

    Abstract: Techniques for memory tagging are disclosed. In the illustrative embodiment, 16 bits of a virtual memory address are used as memory tag bits. In a page table entry corresponding to the virtual memory address, page tag bits indicate which of the 16 bits of the virtual memory address are to be sent to the memory as memory tag bits when a memory operation is requested on the virtual memory address. The memory can then compare the memory tag bits sent with the physical memory address to memory tag bits stored on the memory that correspond to the physical memory address. If the memory tag bits match, then the operation is allowed to proceed.

    Secure public cloud
    8.
    发明授权

    公开(公告)号:US11783081B2

    公开(公告)日:2023-10-10

    申请号:US17022177

    申请日:2020-09-16

    Abstract: In a method to utilize a secure public cloud, a computer receives a domain manager image and memory position-dependent address information in response to requesting a service from a cloud services provider. The computer also verifies the domain manager image and identifies a key domain key to be used to encrypt data stored in a key domain of a key domain-capable server. The computer also uses the key domain key and the memory-position dependent address information to encrypt a domain launch image such that the encrypted domain launch image is cryptographically bound to at least one memory location of the key domain. The computer also encrypts the key domain key and sends the encrypted domain launch image and the encrypted key domain key to the key domain-capable server, to cause a processor of the key domain-capable server to create the key domain. Other embodiments are described and claimed.

Patent Agency Ranking