MECHANISM FOR TRACKING TAINTED DATA

The disclosure relates in some aspects to protecting systems and data from maliciously caused destruction. Data integrity is maintained by monitoring data to detect and prevent potential attacks. A mechanism for tracking whether data is tainted is implemented in a Data Flow computer architecture or...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: PADDON, Michael William, DUGGAN, Matthew Christian, TARUI, Kento, BROWN, Craig
Format: Patent
Sprache:eng ; fre ; ger
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator PADDON, Michael William
DUGGAN, Matthew Christian
TARUI, Kento
BROWN, Craig
description The disclosure relates in some aspects to protecting systems and data from maliciously caused destruction. Data integrity is maintained by monitoring data to detect and prevent potential attacks. A mechanism for tracking whether data is tainted is implemented in a Data Flow computer architecture or some other suitable architecture. In some aspects, a taint checking mechanism is implemented within a register file, memory management, and an instruction set of such an architecture. To this end, an indication of whether the data stored in a given physical memory location is tainted is stored along with the physical memory location. For example, a register can include a bit for a corresponding taint flag, a memory page can include a bit for a corresponding taint flag, and an input/output (I/O) port can include a bit for a corresponding taint flag.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_EP3254221A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>EP3254221A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_EP3254221A13</originalsourceid><addsrcrecordid>eNrjZFD2dXX2cPTzDPZVcPMPUggJcnT29vRzVwhx9PQLcXVRcHEMceRhYE1LzClO5YXS3AwKbq4hzh66qQX58anFBYnJqXmpJfGuAcZGpiZGRoaOhsZEKAEAAboiCg</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>MECHANISM FOR TRACKING TAINTED DATA</title><source>esp@cenet</source><creator>PADDON, Michael William ; DUGGAN, Matthew Christian ; TARUI, Kento ; BROWN, Craig</creator><creatorcontrib>PADDON, Michael William ; DUGGAN, Matthew Christian ; TARUI, Kento ; BROWN, Craig</creatorcontrib><description>The disclosure relates in some aspects to protecting systems and data from maliciously caused destruction. Data integrity is maintained by monitoring data to detect and prevent potential attacks. A mechanism for tracking whether data is tainted is implemented in a Data Flow computer architecture or some other suitable architecture. In some aspects, a taint checking mechanism is implemented within a register file, memory management, and an instruction set of such an architecture. To this end, an indication of whether the data stored in a given physical memory location is tainted is stored along with the physical memory location. For example, a register can include a bit for a corresponding taint flag, a memory page can include a bit for a corresponding taint flag, and an input/output (I/O) port can include a bit for a corresponding taint flag.</description><language>eng ; fre ; ger</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2017</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20171213&amp;DB=EPODOC&amp;CC=EP&amp;NR=3254221A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76289</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20171213&amp;DB=EPODOC&amp;CC=EP&amp;NR=3254221A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>PADDON, Michael William</creatorcontrib><creatorcontrib>DUGGAN, Matthew Christian</creatorcontrib><creatorcontrib>TARUI, Kento</creatorcontrib><creatorcontrib>BROWN, Craig</creatorcontrib><title>MECHANISM FOR TRACKING TAINTED DATA</title><description>The disclosure relates in some aspects to protecting systems and data from maliciously caused destruction. Data integrity is maintained by monitoring data to detect and prevent potential attacks. A mechanism for tracking whether data is tainted is implemented in a Data Flow computer architecture or some other suitable architecture. In some aspects, a taint checking mechanism is implemented within a register file, memory management, and an instruction set of such an architecture. To this end, an indication of whether the data stored in a given physical memory location is tainted is stored along with the physical memory location. For example, a register can include a bit for a corresponding taint flag, a memory page can include a bit for a corresponding taint flag, and an input/output (I/O) port can include a bit for a corresponding taint flag.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2017</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZFD2dXX2cPTzDPZVcPMPUggJcnT29vRzVwhx9PQLcXVRcHEMceRhYE1LzClO5YXS3AwKbq4hzh66qQX58anFBYnJqXmpJfGuAcZGpiZGRoaOhsZEKAEAAboiCg</recordid><startdate>20171213</startdate><enddate>20171213</enddate><creator>PADDON, Michael William</creator><creator>DUGGAN, Matthew Christian</creator><creator>TARUI, Kento</creator><creator>BROWN, Craig</creator><scope>EVB</scope></search><sort><creationdate>20171213</creationdate><title>MECHANISM FOR TRACKING TAINTED DATA</title><author>PADDON, Michael William ; DUGGAN, Matthew Christian ; TARUI, Kento ; BROWN, Craig</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_EP3254221A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng ; fre ; ger</language><creationdate>2017</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>PADDON, Michael William</creatorcontrib><creatorcontrib>DUGGAN, Matthew Christian</creatorcontrib><creatorcontrib>TARUI, Kento</creatorcontrib><creatorcontrib>BROWN, Craig</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>PADDON, Michael William</au><au>DUGGAN, Matthew Christian</au><au>TARUI, Kento</au><au>BROWN, Craig</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>MECHANISM FOR TRACKING TAINTED DATA</title><date>2017-12-13</date><risdate>2017</risdate><abstract>The disclosure relates in some aspects to protecting systems and data from maliciously caused destruction. Data integrity is maintained by monitoring data to detect and prevent potential attacks. A mechanism for tracking whether data is tainted is implemented in a Data Flow computer architecture or some other suitable architecture. In some aspects, a taint checking mechanism is implemented within a register file, memory management, and an instruction set of such an architecture. To this end, an indication of whether the data stored in a given physical memory location is tainted is stored along with the physical memory location. For example, a register can include a bit for a corresponding taint flag, a memory page can include a bit for a corresponding taint flag, and an input/output (I/O) port can include a bit for a corresponding taint flag.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng ; fre ; ger
recordid cdi_epo_espacenet_EP3254221A1
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC DIGITAL DATA PROCESSING
PHYSICS
title MECHANISM FOR TRACKING TAINTED DATA
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-07T14%3A17%3A32IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=PADDON,%20Michael%20William&rft.date=2017-12-13&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EEP3254221A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true