Native code module security for arm instruction set architectures
Some embodiments provide a system that executes a native code module. During operation, the system obtains the native code module. Next, the system loads the native code module into a secure runtime environment. Finally, the system safely executes the native code module in the secure runtime environ...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | SCHIMPF KARL SEHR DAVID C BIFFLE CLIFF L MUTH ROBERT |
description | Some embodiments provide a system that executes a native code module. During operation, the system obtains the native code module. Next, the system loads the native code module into a secure runtime environment. Finally, the system safely executes the native code module in the secure runtime environment by using a set of software fault isolation (SFI) mechanisms that constrain store instructions in the native code module. The SFI mechanisms also maintain control flow integrity for the native code module by dividing a code region associated with the native code module into equally sized code blocks and data blocks and starting each of the data blocks with an illegal instruction. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US8856925B2</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US8856925B2</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US8856925B23</originalsourceid><addsrcrecordid>eNrjZHD0SyzJLEtVSM5PSVXIzU8pzUlVKE5NLi3KLKlUSMsvUkgsylXIzCsuKSpNLsnMzwNKlgDFkjMyS1KTS0qLUot5GFjTEnOKU3mhNDeDgptriLOHbmpBfnxqcUFicmpeakl8aLCFhamZpZGpk5ExEUoA3sYyGw</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Native code module security for arm instruction set architectures</title><source>esp@cenet</source><creator>SCHIMPF KARL ; SEHR DAVID C ; BIFFLE CLIFF L ; MUTH ROBERT</creator><creatorcontrib>SCHIMPF KARL ; SEHR DAVID C ; BIFFLE CLIFF L ; MUTH ROBERT</creatorcontrib><description>Some embodiments provide a system that executes a native code module. During operation, the system obtains the native code module. Next, the system loads the native code module into a secure runtime environment. Finally, the system safely executes the native code module in the secure runtime environment by using a set of software fault isolation (SFI) mechanisms that constrain store instructions in the native code module. The SFI mechanisms also maintain control flow integrity for the native code module by dividing a code region associated with the native code module into equally sized code blocks and data blocks and starting each of the data blocks with an illegal instruction.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2014</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20141007&DB=EPODOC&CC=US&NR=8856925B2$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20141007&DB=EPODOC&CC=US&NR=8856925B2$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>SCHIMPF KARL</creatorcontrib><creatorcontrib>SEHR DAVID C</creatorcontrib><creatorcontrib>BIFFLE CLIFF L</creatorcontrib><creatorcontrib>MUTH ROBERT</creatorcontrib><title>Native code module security for arm instruction set architectures</title><description>Some embodiments provide a system that executes a native code module. During operation, the system obtains the native code module. Next, the system loads the native code module into a secure runtime environment. Finally, the system safely executes the native code module in the secure runtime environment by using a set of software fault isolation (SFI) mechanisms that constrain store instructions in the native code module. The SFI mechanisms also maintain control flow integrity for the native code module by dividing a code region associated with the native code module into equally sized code blocks and data blocks and starting each of the data blocks with an illegal instruction.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2014</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZHD0SyzJLEtVSM5PSVXIzU8pzUlVKE5NLi3KLKlUSMsvUkgsylXIzCsuKSpNLsnMzwNKlgDFkjMyS1KTS0qLUot5GFjTEnOKU3mhNDeDgptriLOHbmpBfnxqcUFicmpeakl8aLCFhamZpZGpk5ExEUoA3sYyGw</recordid><startdate>20141007</startdate><enddate>20141007</enddate><creator>SCHIMPF KARL</creator><creator>SEHR DAVID C</creator><creator>BIFFLE CLIFF L</creator><creator>MUTH ROBERT</creator><scope>EVB</scope></search><sort><creationdate>20141007</creationdate><title>Native code module security for arm instruction set architectures</title><author>SCHIMPF KARL ; SEHR DAVID C ; BIFFLE CLIFF L ; MUTH ROBERT</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US8856925B23</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2014</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>SCHIMPF KARL</creatorcontrib><creatorcontrib>SEHR DAVID C</creatorcontrib><creatorcontrib>BIFFLE CLIFF L</creatorcontrib><creatorcontrib>MUTH ROBERT</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>SCHIMPF KARL</au><au>SEHR DAVID C</au><au>BIFFLE CLIFF L</au><au>MUTH ROBERT</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Native code module security for arm instruction set architectures</title><date>2014-10-07</date><risdate>2014</risdate><abstract>Some embodiments provide a system that executes a native code module. During operation, the system obtains the native code module. Next, the system loads the native code module into a secure runtime environment. Finally, the system safely executes the native code module in the secure runtime environment by using a set of software fault isolation (SFI) mechanisms that constrain store instructions in the native code module. The SFI mechanisms also maintain control flow integrity for the native code module by dividing a code region associated with the native code module into equally sized code blocks and data blocks and starting each of the data blocks with an illegal instruction.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_epo_espacenet_US8856925B2 |
source | esp@cenet |
subjects | CALCULATING COMPUTING COUNTING ELECTRIC DIGITAL DATA PROCESSING PHYSICS |
title | Native code module security for arm instruction set architectures |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-23T10%3A38%3A52IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=SCHIMPF%20KARL&rft.date=2014-10-07&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS8856925B2%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |