Protecting Caller Function from Undesired Access by Callee Function
    1.
    发明申请
    Protecting Caller Function from Undesired Access by Callee Function 有权
    保护来电者功能不受管道功能的不理想访问

    公开(公告)号:US20080280593A1

    公开(公告)日:2008-11-13

    申请号:US11770067

    申请日:2007-06-28

    CPC classification number: G06F21/52 G06F9/4486

    Abstract: Disclosed is a method for restricting access of a first code of a plurality of codes and data of a first function from a second function. Thee method comprises calling the second function by the first function, addresses of the plurality of data may be stored in a stack page and colored in a first color (102). The method comprises performing access control check in a transition page for verifying whether the first function has permission to call the second function (104). Further the method comprises protecting the first code from the second function by coloring the data and/or addresses in a second color (106). Furthermore, the method comprises executing the second function by pushing addresses of the second function on the stack page, the addresses of the second function colored in a third color (108) and unprotecting the first code by coloring the addresses of the first code in the first color (110).

    Abstract translation: 公开了一种用于从第二功能限制多个代码的第一代码和第一函数的数据的访问的方法。 该方法包括通过第一功能调用第二功能,多个数据的地址可以被存储在堆栈页面中并以第一颜色(102)着色。 该方法包括在转换页面中执行访问控制检查,以验证第一功能是否具有调用第二功能的权限(104)。 此外,该方法包括通过使第二颜色(106)中的数据和/或地址着色来保护第一代码免受第二功能。 此外,该方法包括通过在堆栈页面上推动第二函数的地址来执行第二函数,第二函数的地址以第三颜色(108)着色,并且通过着色第一代码中的第一代码的地址来对第一代码进行保护 第一颜色(110)。

    Dynamically sharing a stack between different code segments
    2.
    发明申请
    Dynamically sharing a stack between different code segments 失效
    在不同代码段之间动态共享堆栈

    公开(公告)号:US20080022065A1

    公开(公告)日:2008-01-24

    申请号:US11490824

    申请日:2006-07-21

    CPC classification number: G06F12/1475 G06F12/145

    Abstract: In one embodiment, the present invention includes a method for receiving a request from a caller code portion of a first color to color at least a portion of a stack with a second color, determining if the request is valid, and if so remapping the stack portion from a first mapping colored with the first color to a second mapping colored with the second color. Other embodiments are described and claimed.

    Abstract translation: 在一个实施例中,本发明包括一种方法,用于从第一颜色的呼叫者代码部分接收请求以对具有第二颜色的堆栈的至少一部分进行着色,确定请求是否有效,以及如果重新映射堆栈 从具有第一颜色的第一映射部分到第二颜色的第二映射。 描述和要求保护其他实施例。

    Protecting caller function from undesired access by callee function
    3.
    发明授权
    Protecting caller function from undesired access by callee function 有权
    保护来电功能免受被叫功能的不期望的访问

    公开(公告)号:US08261065B2

    公开(公告)日:2012-09-04

    申请号:US11770067

    申请日:2007-06-28

    CPC classification number: G06F21/52 G06F9/4486

    Abstract: Disclosed is a method for restricting access of a first code of a plurality of codes and data of a first function from a second function. Thee method comprises calling the second function by the first function, addresses of the plurality of data may be stored in a stack page and colored in a first color (102). The method comprises performing access control check in a transition page for verifying whether the first function has permission to call the second function (104). Further the method comprises protecting the first code from the second function by coloring the data and/or addresses in a second color (106). Furthermore, the method comprises executing the second function by pushing addresses of the second function on the stack page, the addresses of the second function colored in a third color (108) and unprotecting the first code by coloring the addresses of the first code in the first color (110).

    Abstract translation: 公开了一种用于从第二功能限制多个代码的第一代码和第一函数的数据的访问的方法。 该方法包括通过第一功能调用第二功能,多个数据的地址可以被存储在堆栈页面中并以第一颜色(102)着色。 该方法包括在转换页面中执行访问控制检查,以验证第一功能是否具有调用第二功能的权限(104)。 此外,该方法包括通过使第二颜色(106)中的数据和/或地址着色来保护第一代码免受第二功能。 此外,该方法包括通过在堆栈页面上推动第二函数的地址来执行第二函数,第二函数的地址以第三颜色(108)着色,并且通过着色第一代码中的第一代码的地址来对第一代码进行保护 第一颜色(110)。

    Protecting Caller Function from Undesired Access by Callee Function
    4.
    发明申请
    Protecting Caller Function from Undesired Access by Callee Function 有权
    保护来电者功能不受管道功能的不理想访问

    公开(公告)号:US20080282358A1

    公开(公告)日:2008-11-13

    申请号:US11745399

    申请日:2007-05-07

    CPC classification number: G06F21/629 G06F2221/2141

    Abstract: Disclosed is a method for restricting access of a first code of a plurality of codes of a first function from a second function. Thee method comprises calling the second function by the first function, addresses of the plurality of codes are stored in a stack page and colored in a first color (102). The method comprises performing access control check in a transition page for verifying whether the first function has permission to call the second function (104). Further the method comprises protecting the first code from the second function by coloring the addresses in a second color (106). Furthermore, the method comprises executing the second function by pushing addresses of the second function on the stack page, the addresses of the second function colored in a third color (108) and unprotecting the first code by coloring the addresses of the first code in the first color (110).

    Abstract translation: 公开了一种用于从第二功能限制第一功能的多个代码的第一代码的访问的方法。 该方法包括通过第一功能调用第二函数,多个代码的地址被存储在堆栈页中并以第一颜色(102)着色。 该方法包括在转换页面中执行访问控制检查,以验证第一功能是否具有调用第二功能的权限(104)。 此外,该方法包括通过着色第二颜色(106)中的地址来保护第一代码免受第二功能。 此外,该方法包括通过在堆栈页面上推动第二函数的地址来执行第二函数,第二函数的地址以第三颜色(108)着色,并且通过着色第一代码中的第一代码的地址来对第一代码进行保护 第一颜色(110)。

    Protecting caller function from undesired access by callee function
    5.
    发明授权
    Protecting caller function from undesired access by callee function 有权
    保护来电功能免受被叫功能的不期望的访问

    公开(公告)号:US08645704B2

    公开(公告)日:2014-02-04

    申请号:US11745399

    申请日:2007-05-07

    CPC classification number: G06F21/629 G06F2221/2141

    Abstract: Disclosed is a method for restricting access of a first code of a plurality of codes of a first function from a second function. The method comprises calling the second function by the first function, addresses of the plurality of codes are stored in a stack page and colored in a first color (102). The method comprises performing access control check in a transition page for verifying whether the first function has permission to call the second function (104). Further the method comprises protecting the first code from the second function by coloring the addresses in a second color (106). Furthermore, the method comprises executing the second function by pushing addresses of the second function on the stack page, the addresses of the second function colored in a third color (108) and unprotecting the first code by coloring the addresses of the first code in the first color (110).

    Abstract translation: 公开了一种用于从第二功能限制第一功能的多个代码的第一代码的访问的方法。 该方法包括通过第一功能调用第二功能,将多个代码的地址存储在堆栈页面中并以第一颜色(102)着色。 该方法包括在转换页面中执行访问控制检查,以验证第一功能是否具有调用第二功能的权限(104)。 此外,该方法包括通过着色第二颜色(106)中的地址来保护第一代码免受第二功能。 此外,该方法包括通过在堆栈页面上推动第二函数的地址来执行第二函数,第二函数的地址以第三颜色(108)着色,并且通过着色第一代码中的第一代码的地址来对第一代码进行保护 第一颜色(110)。

    Dynamically sharing a stack between different code segments
    6.
    发明授权
    Dynamically sharing a stack between different code segments 失效
    在不同代码段之间动态共享堆栈

    公开(公告)号:US07512768B2

    公开(公告)日:2009-03-31

    申请号:US11490824

    申请日:2006-07-21

    CPC classification number: G06F12/1475 G06F12/145

    Abstract: In one embodiment, the present invention includes a method for receiving a request from a caller code portion of a first color to color at least a portion of a stack with a second color, determining if the request is valid, and if so remapping the stack portion from a first mapping colored with the first color to a second mapping colored with the second color. Other embodiments are described and claimed.

    Abstract translation: 在一个实施例中,本发明包括一种方法,用于从第一颜色的呼叫者代码部分接收请求以对具有第二颜色的堆栈的至少一部分进行着色,确定请求是否有效,以及如果重新映射堆栈 从具有第一颜色的第一映射部分到第二颜色的第二映射。 描述和要求保护其他实施例。

    SEAMLESSLY ENCRYPTING MEMORY REGIONS TO PROTECT AGAINST HARDWARE-BASED ATTACKS
    9.
    发明申请
    SEAMLESSLY ENCRYPTING MEMORY REGIONS TO PROTECT AGAINST HARDWARE-BASED ATTACKS 审中-公开
    无缝加密存储区域防范基于硬件的攻击

    公开(公告)号:US20150205732A1

    公开(公告)日:2015-07-23

    申请号:US14449467

    申请日:2014-08-01

    CPC classification number: G06F12/1408 G06F12/1441 G06F2212/1052

    Abstract: Systems, apparatuses, and methods, and for seamlessly protecting memory regions to protect against hardware-based attacks are disclosed. In one embodiment, an apparatus includes a decoder, control logic, and cryptographic logic. The decoder is to decode a transaction between a processor and memory-mapped input/output space. The control logic is to redirect the transaction from the memory-mapped input/output space to a system memory. The cryptographic logic is to operate on data for the transaction.

    Abstract translation: 公开了系统,装置和方法,并且用于无缝地保护存储器区域以防止基于硬件的攻击。 在一个实施例中,一种装置包括解码器,控制逻辑和加密逻辑。 解码器是对处理器和存储器映射的输入/输出空间之间的事务进行解码。 控制逻辑是将事务从存储器映射的输入/输出空间重定向到系统存储器。 密码逻辑是对数据进行交易操作。

Patent Agency Ranking