Processing

Please wait...

Settings

Settings

Goto Application

1. WO2020198001 - RUN-TIME CODE EXECUTION VALIDATION

Publication Number WO/2020/198001
Publication Date 01.10.2020
International Application No. PCT/US2020/023843
International Filing Date 20.03.2020
IPC
G06F 21/60 2013.01
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
60Protecting data
G06F 21/62 2013.01
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
60Protecting data
62Protecting access to data via a platform, e.g. using keys or access control rules
G06F 21/55 2013.01
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
55Detecting local intrusion or implementing counter-measures
CPC
G06F 21/52
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
52during program execution, e.g. stack integrity ; ; Preventing unwanted data erasure; Buffer overflow
G06F 21/554
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
55Detecting local intrusion or implementing counter-measures
554involving event detection and direct action
G06F 2221/033
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
2221Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
033Test or assess software
H04L 9/3242
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Cryptographic mechanisms or cryptographic; arrangements for secret or secure communication
32including means for verifying the identity or authority of a user of the system ; or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
3236using cryptographic hash functions
3242involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
Applicants
  • MICRON TECHNOLOGY, INC. [US]/[US]
Inventors
  • MONDELLO, Antonino
  • TROIA, Alberto
Agents
  • DENKER, James
Priority Data
16/362,74125.03.2019US
Publication Language English (EN)
Filing Language English (EN)
Designated States
Title
(EN) RUN-TIME CODE EXECUTION VALIDATION
(FR) VALIDATION D'EXÉCUTION DE CODE D'EXÉCUTION
Abstract
(EN)
The present disclosure includes apparatuses, methods, and systems for run-time code execution validation. An embodiment includes a memory, and circuitry configured to monitor run-time executable code stored in a secure array of the memory device and receive an indication that a portion of the run-time executable code executed, wherein the indication includes a received Message Authentication Code (MAC) and take an action in response to the indication that the portion of the run-time executable code failed to execute.
(FR)
La présente invention concerne des appareils, procédés, et systèmes de validation d'exécution de code d'exécution. Un mode de réalisation comprend une mémoire, et des circuits configurés pour surveiller un code exécutable d'exécution mémorisé dans un réseau sécurisé du dispositif de mémoire et pour recevoir une indication selon laquelle une partie du code exécutable d'exécution s'est exécutée, l'indication comprenant un code d'authentification de message (MAC) reçu, et pour entreprendre une action en réponse à l'indication selon laquelle la partie du code exécutable en temps d'exécution n'a pas réussi à s'exécuter.
Also published as
Latest bibliographic data on file with the International Bureau