Movatterモバイル変換


[0]ホーム

URL:


US20030229794A1 - System and method for protection against untrusted system management code by redirecting a system management interrupt and creating a virtual machine container - Google Patents

System and method for protection against untrusted system management code by redirecting a system management interrupt and creating a virtual machine container
Download PDF

Info

Publication number
US20030229794A1
US20030229794A1US10/165,597US16559702AUS2003229794A1US 20030229794 A1US20030229794 A1US 20030229794A1US 16559702 AUS16559702 AUS 16559702AUS 2003229794 A1US2003229794 A1US 2003229794A1
Authority
US
United States
Prior art keywords
code
mode
processor
handler
memory
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/165,597
Inventor
James Sutton
David Grawrock
Richard Uhlig
David Poisner
Andrew Glew
Clifford Hall
Lawrence Smith
Gilbert Neiger
Michael Kozuch
Robert George
Bradley Burgess
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tahoe Research Ltd
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to US10/165,597priorityCriticalpatent/US20030229794A1/en
Application filed by IndividualfiledCriticalIndividual
Assigned to INTEL CORPORATIONreassignmentINTEL CORPORATIONASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: GLEW, ANDY
Assigned to INTEL CORPORATIONreassignmentINTEL CORPORATIONASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: BURGESS, BRADLEY G., GEORGE, ROBERT T., KOZUCH, MICHAEL A., NEIGER, GILBERT, SMITH, LAWRENCE O. III, HALL, CLIFFORD D., POISNER, DAVID I., UHLIG, RICHARD A., GRAWROCK, DAVID W., SUTTON, JAMES A. II
Priority to AU2003231237Aprioritypatent/AU2003231237A1/en
Priority to RU2004139086/09Aprioritypatent/RU2313126C2/en
Priority to EP03724373Aprioritypatent/EP1512074A2/en
Priority to CNB038188236Aprioritypatent/CN100377092C/en
Priority to JP2004511985Aprioritypatent/JP4708016B2/en
Priority to PCT/US2003/013616prioritypatent/WO2003104981A2/en
Priority to MYPI20032123Aprioritypatent/MY146723A/en
Publication of US20030229794A1publicationCriticalpatent/US20030229794A1/en
Priority to US11/095,855prioritypatent/US7581219B2/en
Priority to JP2007150997Aprioritypatent/JP4846660B2/en
Priority to JP2011178882Aprioritypatent/JP5242747B2/en
Assigned to TAHOE RESEARCH, LTD.reassignmentTAHOE RESEARCH, LTD.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: INTEL CORPORATION
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

A system and method for permitting the execution of system management mode (SMM) code during secure operations in a microprocessor system is described. In one embodiment, the system management interrupt (SMI) may be first directed to a handler in a secured virtual machine monitor (SVMM). The SMI may then be re-directed to SMM code located in a virtual machine (VM) that is under the security control of the SVMM. This redirection may be accomplished by allowing the SVMM to read and write the system management (SM) base register in the processor.

Description

Claims (43)

What is claimed is:
1. A system, comprising:
a processor to operate in a user mode, a supervisor mode, and a sub operating system mode, to receive a sub operating system mode interrupt;
a first code to be contained within a first virtual machine; and
a first handler to be contained within a trusted code in a second virtual machine to redirect said sub operating system mode interrupt to said first code.
2. The system ofclaim 1, wherein said trusted code is to write an interrupt service register in said processor.
3. The system ofclaim 2, wherein said interrupt service register is a system management base register, and wherein said sub operating system mode interrupt is a system management interrupt.
4. The system ofclaim 1, wherein said first code is to execute in page mode.
5. The system ofclaim 4, wherein said first code is a system management mode code.
6. The system ofclaim 1, further comprising a second handler within said trusted code to be invoked upon access attempts to locked pages of a memory.
7. The system ofclaim 6, wherein said second handler determines if access is allowable to said locked pages of said memory.
8. The system ofclaim 6, wherein said second handler initiates an exit from said first code by issuing a modified resume instruction.
9. The system ofclaim 8, wherein said modified resume instruction is capable of execution in page mode.
10. The system ofclaim 1, wherein said first handler establishes a space within locked pages of a memory to store state data.
11. The system ofclaim 1, wherein said first code is located in unlocked pages of memory.
12. The system ofclaim 1, wherein said system comprises a single processor system.
13. The system ofclaim 1, wherein said trusted code is to disable an interrupt service register in said processor.
14. The system ofclaim 13, wherein said interrupt service register is a system management base register, and wherein said first interrupt is a system management interrupt.
15. The system ofclaim 1, wherein said first handler within said trusted code to be invoked upon access attempts to locked pages of a memory.
16. The system ofclaim 15, wherein said first handler determines if access is allowable to said locked pages of said memory.
17. The system ofclaim 15, wherein said first handler initiates an exit from said first code by issuing a modified resume instruction.
18. The system ofclaim 1, wherein said modified resume instruction is capable of execution in page mode.
19. A method, comprising:
directing a sub operating system mode interrupt to a first handler in a trusted code within a second virtual machine;
storing a state in a locked page in memory; and
entering a first code in a first virtual machine.
20. The method ofclaim 19, further comprising invoking a second handler in said trusted code from said first code.
21. The method ofclaim 20, wherein said invoking is subsequent to said first code accessing said locked page in memory.
22. The method ofclaim 19, wherein said first code is system management mode code.
23. The method ofclaim 19, further comprising invoking a second handler in said trusted code from said first code.
24. The method ofclaim 23, wherein said invoking is subsequent to said first code accessing said locked page in memory.
25. The method ofclaim 19, further comprising executing a modified resume instruction from a page mode.
26. The method ofclaim 19, further comprising determining whether said first code may access said locked page in memory.
27. The method ofclaim 19, wherein said directing includes writing a memory location within said trusted code to an interrupt service register.
28. The method ofclaim 27, wherein said interrupt service register is a system management base register.
29. The method ofclaim 19, wherein said sub operating system mode interrupt is a system management interrupt.
30. The method ofclaim 19, further comprising invoking said first handler in said trusted code from said first code.
31. The method ofclaim 30, wherein said invoking is subsequent to said first code accessing said locked page in memory.
32. A processor, comprising
a first logic to execute a modified resume instruction; and
an interrupt service register capable of being written subsequent to execution of a secure enter instruction.
33. The processor ofclaim 32, wherein said modified resume instruction returns said processor to previous program execution subsequent to execution of a first code.
34. The processor ofclaim 33, wherein said modified resume instruction may be executed from within page mode.
35. The processor ofclaim 33, wherein said execution of said first code occurs within a sub operating system mode.
36. The processor ofclaim 35, wherein said sub operating system mode is a system management mode.
37. The processor ofclaim 32, wherein said interrupt service register is a system management base register.
38. A processor, comprising
a first logic to execute a modified resume instruction; and
an interrupt service register capable of being disabled subsequent to execution of a monitor initialization instruction.
39. The processor ofclaim 38, wherein said modified resume instruction returns said processor to previous program execution subsequent to execution of a first code.
40. The processor ofclaim 39, wherein said modified resume instruction may be executed from within page mode.
41. The processor ofclaim 39, wherein said execution of said first code occurs within a sub operating system mode.
42. The processor ofclaim 41, wherein said sub operating system mode is a system management mode.
43. The processor ofclaim 38, wherein said interrupt service register is a system management base register.
US10/165,5972002-06-072002-06-07System and method for protection against untrusted system management code by redirecting a system management interrupt and creating a virtual machine containerAbandonedUS20030229794A1 (en)

Priority Applications (11)

Application NumberPriority DateFiling DateTitle
US10/165,597US20030229794A1 (en)2002-06-072002-06-07System and method for protection against untrusted system management code by redirecting a system management interrupt and creating a virtual machine container
AU2003231237AAU2003231237A1 (en)2002-06-072003-05-01System and method for protection against untrusted system management code by redirecting a system management interrupt and creating a virtual machine container
RU2004139086/09ARU2313126C2 (en)2002-06-072003-05-01System and method for protection from non-trusted system control mode code by means of redirection of system management mode interrupt and creation of virtual machine container
EP03724373AEP1512074A2 (en)2002-06-072003-05-01System and method for protection against untrusted system management code by redirecting a system management interrupt and creating a virtual machine container
CNB038188236ACN100377092C (en)2002-06-072003-05-01System and method for protection against untrusted system management code by redirecting a system management interrupt and creating a virtual machine container
JP2004511985AJP4708016B2 (en)2002-06-072003-05-01 System and method for protection against unreliable system management code by re-instructing system management instructions and creating virtual machine containers
PCT/US2003/013616WO2003104981A2 (en)2002-06-072003-05-01System and method for protection against untrusted system management code by redirecting a system management interrupt and creating a virtual machine container
MYPI20032123AMY146723A (en)2002-06-072003-06-06System and method for protection against untrusted system management code by redirecting a system management interrupt and creating a virtual machine container
US11/095,855US7581219B2 (en)2002-06-072005-03-30Transitioning between virtual machine monitor domains in a virtual machine environment
JP2007150997AJP4846660B2 (en)2002-06-072007-06-06 How to protect against untrusted system management code by re-ordering system management interrupts and creating virtual machine containers
JP2011178882AJP5242747B2 (en)2002-06-072011-08-18 How to protect against untrusted system management code by re-ordering system management interrupts and creating virtual machine containers

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
US10/165,597US20030229794A1 (en)2002-06-072002-06-07System and method for protection against untrusted system management code by redirecting a system management interrupt and creating a virtual machine container

Related Child Applications (1)

Application NumberTitlePriority DateFiling Date
US11/095,855Continuation-In-PartUS7581219B2 (en)2002-06-072005-03-30Transitioning between virtual machine monitor domains in a virtual machine environment

Publications (1)

Publication NumberPublication Date
US20030229794A1true US20030229794A1 (en)2003-12-11

Family

ID=29710476

Family Applications (2)

Application NumberTitlePriority DateFiling Date
US10/165,597AbandonedUS20030229794A1 (en)2002-06-072002-06-07System and method for protection against untrusted system management code by redirecting a system management interrupt and creating a virtual machine container
US11/095,855Expired - LifetimeUS7581219B2 (en)2002-06-072005-03-30Transitioning between virtual machine monitor domains in a virtual machine environment

Family Applications After (1)

Application NumberTitlePriority DateFiling Date
US11/095,855Expired - LifetimeUS7581219B2 (en)2002-06-072005-03-30Transitioning between virtual machine monitor domains in a virtual machine environment

Country Status (8)

CountryLink
US (2)US20030229794A1 (en)
EP (1)EP1512074A2 (en)
JP (3)JP4708016B2 (en)
CN (1)CN100377092C (en)
AU (1)AU2003231237A1 (en)
MY (1)MY146723A (en)
RU (1)RU2313126C2 (en)
WO (1)WO2003104981A2 (en)

Cited By (145)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20040172629A1 (en)*2003-02-282004-09-02Azul SystemsSegmented virtual machine
US20040250110A1 (en)*2003-03-282004-12-09Wray Michael JohnSecurity policy in trusted computing systems
US20040268332A1 (en)*2003-04-232004-12-30Masato MitsumoriMemory access control method and processing system with memory access check function
US20050097345A1 (en)*2003-10-292005-05-05Kelley Brian H.System for selectively enabling operating modes of a device
US20050257243A1 (en)*2004-04-272005-11-17Microsoft CorporationMethod and system for enforcing a security policy via a security virtual machine
US20050289311A1 (en)*2004-06-292005-12-29David DurhamSystem and method for secure inter-platform and intra-platform communications
US20060021029A1 (en)*2004-06-292006-01-26Brickell Ernie FMethod of improving computer security through sandboxing
US20060075312A1 (en)*2004-09-302006-04-06Fischer Stephen ASystem and method for limiting exposure of hardware failure information for a secured execution environment
US20060224685A1 (en)*2005-03-292006-10-05International Business Machines CorporationSystem management architecture for multi-node computer system
US20070038997A1 (en)*2005-08-092007-02-15Steven GrobmanExclusive access for secure audio program
US20070050764A1 (en)*2005-08-302007-03-01Microsoft CorporationHierarchical virtualization with a multi-level virtualization mechanism
US20070067590A1 (en)*2005-09-222007-03-22Uday SavagaonkarProviding protected access to critical memory regions
US20070083739A1 (en)*2005-08-292007-04-12Glew Andrew FProcessor with branch predictor
US20080133893A1 (en)*2005-08-292008-06-05Centaurus Data LlcHierarchical register file
US20080133883A1 (en)*2005-08-292008-06-05Centaurus Data LlcHierarchical store buffer
US20080133889A1 (en)*2005-08-292008-06-05Centaurus Data LlcHierarchical instruction scheduler
US20080163331A1 (en)*2006-12-292008-07-03Datta Sham MReconfiguring a secure system
US20080216096A1 (en)*2005-07-152008-09-04Lenovo (Beijing) LimitedVirtual Computer System Supporting Trusted Computing and Method for Implementing Trusted Computation Thereon
US20080263679A1 (en)*2007-04-232008-10-23Microsoft CorporationStoring information in closed computing devices
US20080294892A1 (en)*2007-05-252008-11-27Ingo MolnarMethod and system for a kernel lock validator
US7480908B1 (en)2005-06-242009-01-20Azul Systems, Inc.Segmented virtual machine transport mechanism
US20090038017A1 (en)*2007-08-022009-02-05David DurhamSecure vault service for software components within an execution environment
GB2453652A (en)*2007-10-082009-04-15LenovoImplementing secure online payments by switching to a dedicated operating system (OS)
US20090172385A1 (en)*2007-12-312009-07-02Datta Sham MEnabling system management mode in a secure system
US7620953B1 (en)*2004-10-052009-11-17Azul Systems, Inc.System and method for allocating resources of a core space among a plurality of core virtual machines
US20100057982A1 (en)*2008-08-262010-03-04Phoenix Technologies LtdHypervisor security using SMM
US7748037B2 (en)2005-09-222010-06-29Intel CorporationValidating a memory type modification attempt
US20100169666A1 (en)*2008-12-312010-07-01Prashant DewanMethods and systems to direclty render an image and correlate corresponding user input in a secuire memory domain
US20110066783A1 (en)*2009-09-142011-03-17International Business Machines CorporationSecure Handling and Routing of Message-Signaled Interrupts
US20110231668A1 (en)*2005-06-302011-09-22Travis SchluesslerSigned Manifest for Run-Time Verification of Software Program Identity and Integrity
US8099718B2 (en)2007-11-132012-01-17Intel CorporationMethod and system for whitelisting software components
US20120017285A1 (en)*2009-05-182012-01-19Mark A PiwonkaSystems and methods of determining a trust level from system management mode
US20120255004A1 (en)*2011-03-312012-10-04Mcafee, Inc.System and method for securing access to system calls
WO2012135192A2 (en)2011-03-282012-10-04Mcafee, Inc.System and method for virtual machine monitor based anti-malware security
KR20120111734A (en)*2009-12-292012-10-10어드밴스드 마이크로 디바이시즈, 인코포레이티드Hypervisor isolation of processor cores
US8356297B1 (en)2007-03-212013-01-15Azul Systems, Inc.External data source redirection in segmented virtual machine
US8495750B2 (en)2010-08-312013-07-23International Business Machines CorporationFilesystem management and security system
US20130326288A1 (en)*2011-12-312013-12-05Shamanna M. DattaProcessor that detects when system management mode attempts to reach program code outside of protected space
US8813227B2 (en)2011-03-292014-08-19Mcafee, Inc.System and method for below-operating system regulation and control of self-modifying code
EP2782038A1 (en)*2013-03-192014-09-24STMicroelectronics (Grenoble 2) SASResource management in a processor for trusted and untrusted applications
EP2782007A1 (en)*2013-03-192014-09-24STMicroelectronics (Grenoble 2) SASLaunching multiple applications in containers on a processor
WO2014158603A1 (en)*2013-03-132014-10-02Intel CorporationSystem management interrupt handling for multi-core processors
US8925089B2 (en)2011-03-292014-12-30Mcafee, Inc.System and method for below-operating system modification of malicious code on an electronic device
US8959638B2 (en)2011-03-292015-02-17Mcafee, Inc.System and method for below-operating system trapping and securing of interdriver communication
US8966624B2 (en)2011-03-312015-02-24Mcafee, Inc.System and method for securing an input/output path of an application against malware with a below-operating system security agent
US8966629B2 (en)2011-03-312015-02-24Mcafee, Inc.System and method for below-operating system trapping of driver loading and unloading
US9032525B2 (en)2011-03-292015-05-12Mcafee, Inc.System and method for below-operating system trapping of driver filter attachment
US9038176B2 (en)2011-03-312015-05-19Mcafee, Inc.System and method for below-operating system trapping and securing loading of code into memory
US9087199B2 (en)2011-03-312015-07-21Mcafee, Inc.System and method for providing a secured operating system execution environment
US9176741B2 (en)2005-08-292015-11-03Invention Science Fund I, LlcMethod and apparatus for segmented sequential storage
US9223963B2 (en)2009-12-152015-12-29Mcafee, Inc.Systems and methods for behavioral sandboxing
US9262246B2 (en)2011-03-312016-02-16Mcafee, Inc.System and method for securing memory and storage of an electronic device with a below-operating system security agent
US9317690B2 (en)2011-03-282016-04-19Mcafee, Inc.System and method for firmware based anti-malware security
JP2016511872A (en)*2013-01-222016-04-21アマゾン・テクノロジーズ、インコーポレイテッド Privileged cryptographic services in a virtualized environment
US9367691B2 (en)2012-07-312016-06-14Hewlett-Packard Development Company, L.P.Modify executable bits of system management memory page table
US20160350215A1 (en)*2014-12-132016-12-01Via Alliance Semiconductor Co., Ltd.Distributed hang recovery logic
US20160350223A1 (en)*2014-12-132016-12-01Via Alliance Semiconductor Co., Ltd.Logic analyzer for detecting hangs
US9529627B2 (en)2013-03-192016-12-27Stmicroelectronics (Grenoble 2) SasManaging multiple systems in a computer device
US20170098092A1 (en)*2015-10-062017-04-06Symantec CorporationTechniques for generating a virtual private container
US20170192804A1 (en)*2014-09-302017-07-06Amazon Technologies, Inc.Threading as a service
US9946651B2 (en)*2014-12-132018-04-17Via Alliance Semiconductor Co., LtdPattern detector for detecting hangs
CN108292339A (en)*2016-01-262018-07-17惠普发展公司,有限责任合伙企业System Management Mode privilege framework
US10102040B2 (en)2016-06-292018-10-16Amazon Technologies, IncAdjusting variable limit on concurrent code executions
US10108443B2 (en)2014-09-302018-10-23Amazon Technologies, Inc.Low latency computational capacity provisioning
US10140139B1 (en)*2012-06-192018-11-27Bromium, Inc.Ensuring the privacy and integrity of a hypervisor
US10162672B2 (en)2016-03-302018-12-25Amazon Technologies, Inc.Generating data streams from pre-existing data sets
US10162688B2 (en)2014-09-302018-12-25Amazon Technologies, Inc.Processing event messages for user requests to execute program code
US10203990B2 (en)2016-06-302019-02-12Amazon Technologies, Inc.On-demand network code execution with cross-account aliases
CN109542610A (en)*2018-12-042019-03-29中国航空工业集团公司西安航空计算技术研究所A kind of multi partition operating system void interrupt criteria component realization method
US10277708B2 (en)2016-06-302019-04-30Amazon Technologies, Inc.On-demand network code execution with cross-account aliases
US10282229B2 (en)2016-06-282019-05-07Amazon Technologies, Inc.Asynchronous task management in an on-demand network code execution environment
US10353746B2 (en)2014-12-052019-07-16Amazon Technologies, Inc.Automatic determination of resource sizing
US10353678B1 (en)2018-02-052019-07-16Amazon Technologies, Inc.Detecting code characteristic alterations due to cross-service calls
US10365985B2 (en)2015-12-162019-07-30Amazon Technologies, Inc.Predictive management of on-demand code execution
CN110084039A (en)*2013-04-192019-08-02Nicira股份有限公司Frame for the coordination between endpoint security and Network Security Service
US10387177B2 (en)2015-02-042019-08-20Amazon Technologies, Inc.Stateful virtual compute system
US10437629B2 (en)2015-12-162019-10-08Amazon Technologies, Inc.Pre-triggers for code execution environments
US10528390B2 (en)2016-09-232020-01-07Amazon Technologies, Inc.Idempotent task execution in on-demand network code execution systems
US10552193B2 (en)2015-02-042020-02-04Amazon Technologies, Inc.Security protocols for low latency execution of program code
US10564946B1 (en)2017-12-132020-02-18Amazon Technologies, Inc.Dependency handling in an on-demand network code execution system
US10579405B1 (en)*2013-03-132020-03-03Amazon Technologies, Inc.Parallel virtual machine managers
US10592269B2 (en)2014-09-302020-03-17Amazon Technologies, Inc.Dynamic code deployment and versioning
US10623476B2 (en)2015-04-082020-04-14Amazon Technologies, Inc.Endpoint management system providing an application programming interface proxy service
US10691498B2 (en)2015-12-212020-06-23Amazon Technologies, Inc.Acquisition and maintenance of compute capacity
US10725752B1 (en)2018-02-132020-07-28Amazon Technologies, Inc.Dependency handling in an on-demand network code execution system
US10733085B1 (en)2018-02-052020-08-04Amazon Technologies, Inc.Detecting impedance mismatches due to cross-service calls
US10754701B1 (en)2015-12-162020-08-25Amazon Technologies, Inc.Executing user-defined code in response to determining that resources expected to be utilized comply with resource restrictions
US10776091B1 (en)2018-02-262020-09-15Amazon Technologies, Inc.Logging endpoint in an on-demand code execution system
US10776171B2 (en)2015-04-082020-09-15Amazon Technologies, Inc.Endpoint management system and virtual compute system
US10824484B2 (en)2014-09-302020-11-03Amazon Technologies, Inc.Event-driven computing
US10831898B1 (en)2018-02-052020-11-10Amazon Technologies, Inc.Detecting privilege escalations in code including cross-service calls
US10884812B2 (en)2018-12-132021-01-05Amazon Technologies, Inc.Performance-based hardware emulation in an on-demand network code execution system
US10884802B2 (en)2014-09-302021-01-05Amazon Technologies, Inc.Message-based computation request scheduling
US10884722B2 (en)2018-06-262021-01-05Amazon Technologies, Inc.Cross-environment application of tracing information for improved code execution
US10884787B1 (en)2016-09-232021-01-05Amazon Technologies, Inc.Execution guarantees in an on-demand network code execution system
US10891145B2 (en)2016-03-302021-01-12Amazon Technologies, Inc.Processing pre-existing data sets at an on demand code execution environment
US10908927B1 (en)2019-09-272021-02-02Amazon Technologies, Inc.On-demand execution of object filter code in output path of object storage service
US10915371B2 (en)2014-09-302021-02-09Amazon Technologies, Inc.Automatic management of low latency computational capacity
US10942795B1 (en)2019-11-272021-03-09Amazon Technologies, Inc.Serverless call distribution to utilize reserved capacity without inhibiting scaling
US10949237B2 (en)2018-06-292021-03-16Amazon Technologies, Inc.Operating system customization in an on-demand network code execution system
WO2021080601A1 (en)*2019-10-252021-04-29Hewlett-Packard Development Company, L.P.Integrity monitor
US10996961B2 (en)2019-09-272021-05-04Amazon Technologies, Inc.On-demand indexing of data in input path of object storage service
CN112800431A (en)*2020-08-282021-05-14支付宝(杭州)信息技术有限公司Method and device for safely entering trusted execution environment in hyper-thread scene
US11010188B1 (en)2019-02-052021-05-18Amazon Technologies, Inc.Simulated data object storage using on-demand computation of data objects
US11016815B2 (en)2015-12-212021-05-25Amazon Technologies, Inc.Code execution request routing
US11023311B2 (en)2019-09-272021-06-01Amazon Technologies, Inc.On-demand code execution in input path of data uploaded to storage service in multiple data portions
US11023416B2 (en)2019-09-272021-06-01Amazon Technologies, Inc.Data access control system for object storage service based on owner-defined code
US11055112B2 (en)2019-09-272021-07-06Amazon Technologies, Inc.Inserting executions of owner-specified code into input/output path of object storage service
US11099870B1 (en)2018-07-252021-08-24Amazon Technologies, Inc.Reducing execution times in an on-demand network code execution system using saved machine states
US11099917B2 (en)2018-09-272021-08-24Amazon Technologies, Inc.Efficient state maintenance for execution environments in an on-demand code execution system
US11106477B2 (en)2019-09-272021-08-31Amazon Technologies, Inc.Execution of owner-specified code during input/output path to object storage service
US11115404B2 (en)2019-06-282021-09-07Amazon Technologies, Inc.Facilitating service connections in serverless code executions
US11119826B2 (en)2019-11-272021-09-14Amazon Technologies, Inc.Serverless call distribution to implement spillover while avoiding cold starts
US11119813B1 (en)2016-09-302021-09-14Amazon Technologies, Inc.Mapreduce implementation using an on-demand network code execution system
US11119809B1 (en)2019-06-202021-09-14Amazon Technologies, Inc.Virtualization-based transaction handling in an on-demand network code execution system
US11132213B1 (en)2016-03-302021-09-28Amazon Technologies, Inc.Dependency-based process of pre-existing data sets at an on demand code execution environment
US11146569B1 (en)2018-06-282021-10-12Amazon Technologies, Inc.Escalation-resistant secure network services using request-scoped authentication information
US11159528B2 (en)2019-06-282021-10-26Amazon Technologies, Inc.Authentication to network-services using hosted authentication information
US11171983B2 (en)*2018-06-292021-11-09Intel CorporationTechniques to provide function-level isolation with capability-based security
US11190609B2 (en)2019-06-282021-11-30Amazon Technologies, Inc.Connection pooling for scalable network services
US11188391B1 (en)2020-03-112021-11-30Amazon Technologies, Inc.Allocating resources to on-demand code executions under scarcity conditions
CN113826072A (en)*2019-05-162021-12-21微软技术许可有限责任公司 Code Updates in System Administration Mode
US11243953B2 (en)2018-09-272022-02-08Amazon Technologies, Inc.Mapreduce implementation in an on-demand network code execution system and stream data processing system
US11250007B1 (en)2019-09-272022-02-15Amazon Technologies, Inc.On-demand execution of object combination code in output path of object storage service
US11263220B2 (en)2019-09-272022-03-01Amazon Technologies, Inc.On-demand execution of object transformation code in output path of object storage service
US11360948B2 (en)2019-09-272022-06-14Amazon Technologies, Inc.Inserting owner-specified data processing pipelines into input/output path of object storage service
US11386230B2 (en)2019-09-272022-07-12Amazon Technologies, Inc.On-demand code obfuscation of data in input path of object storage service
US11388210B1 (en)2021-06-302022-07-12Amazon Technologies, Inc.Streaming analytics using a serverless compute system
US11394761B1 (en)2019-09-272022-07-19Amazon Technologies, Inc.Execution of user-submitted code on a stream of data
US11416628B2 (en)2019-09-272022-08-16Amazon Technologies, Inc.User-specific data manipulation system for object storage service based on user-submitted code
US11449601B2 (en)*2020-01-082022-09-20Red Hat, Inc.Proof of code compliance and protected integrity using a trusted execution environment
US11550944B2 (en)2019-09-272023-01-10Amazon Technologies, Inc.Code execution environment customization system for object storage service
US11550713B1 (en)2020-11-252023-01-10Amazon Technologies, Inc.Garbage collection in distributed systems using life cycled storage roots
US11593270B1 (en)2020-11-252023-02-28Amazon Technologies, Inc.Fast distributed caching using erasure coded object parts
US20230061511A1 (en)*2021-08-302023-03-02International Business Machines CorporationInaccessible prefix pages during virtual machine execution
US11656892B1 (en)2019-09-272023-05-23Amazon Technologies, Inc.Sequential execution of user-submitted code and native functions
US11714682B1 (en)2020-03-032023-08-01Amazon Technologies, Inc.Reclaiming computing resources in an on-demand code execution system
US11775640B1 (en)2020-03-302023-10-03Amazon Technologies, Inc.Resource utilization-based malicious task detection in an on-demand code execution system
US11861386B1 (en)2019-03-222024-01-02Amazon Technologies, Inc.Application gateways in an on-demand network code execution system
US11875173B2 (en)2018-06-252024-01-16Amazon Technologies, Inc.Execution of auxiliary functions in an on-demand network code execution system
US11943093B1 (en)2018-11-202024-03-26Amazon Technologies, Inc.Network connection recovery after virtual machine transition in an on-demand network code execution system
US11968280B1 (en)2021-11-242024-04-23Amazon Technologies, Inc.Controlling ingestion of streaming data to serverless function executions
US12015603B2 (en)2021-12-102024-06-18Amazon Technologies, Inc.Multi-tenant mode for serverless code execution
US12327133B1 (en)2019-03-222025-06-10Amazon Technologies, Inc.Application gateways in an on-demand network code execution system
US12381878B1 (en)2023-06-272025-08-05Amazon Technologies, Inc.Architecture for selective use of private paths between cloud services

Families Citing this family (55)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8041761B1 (en)*2002-12-232011-10-18Netapp, Inc.Virtual filer and IP space based IT configuration transitioning framework
CN100349123C (en)*2004-03-022007-11-14英特维数位科技股份有限公司 Method for Remotely Controlling Computer System
US7305592B2 (en)*2004-06-302007-12-04Intel CorporationSupport for nested fault in a virtual machine environment
US7757231B2 (en)2004-12-102010-07-13Intel CorporationSystem and method to deprivilege components of a virtual machine monitor
US9785485B2 (en)*2005-07-272017-10-10Intel CorporationVirtualization event processing in a layered virtualization architecture
US20140373144A9 (en)*2006-05-222014-12-18Alen CapalikSystem and method for analyzing unauthorized intrusion into a computer network
US8973094B2 (en)2006-05-262015-03-03Intel CorporationExecution of a secured environment initialization instruction on a point-to-point interconnect system
US7490191B2 (en)*2006-09-222009-02-10Intel CorporationSharing information between guests in a virtual machine environment
US7533207B2 (en)*2006-12-062009-05-12Microsoft CorporationOptimized interrupt delivery in a virtualized environment
US9354927B2 (en)2006-12-212016-05-31Vmware, Inc.Securing virtual machine data
US9098347B2 (en)*2006-12-212015-08-04VmwareImplementation of virtual machine operations using storage system functionality
US9189265B2 (en)2006-12-212015-11-17Vmware, Inc.Storage architecture for virtual machines
US7698507B2 (en)*2007-02-282010-04-13Intel CorporationProtecting system management mode (SMM) spaces against cache attacks
JP4864817B2 (en)2007-06-222012-02-01株式会社日立製作所 Virtualization program and virtual computer system
US8151264B2 (en)*2007-06-292012-04-03Intel CorporationInjecting virtualization events in a layered virtualization architecture
US20090119748A1 (en)*2007-08-302009-05-07Jiewen YaoSystem management mode isolation in firmware
US8250641B2 (en)*2007-09-172012-08-21Intel CorporationMethod and apparatus for dynamic switching and real time security control on virtualized systems
JP4678396B2 (en)*2007-09-252011-04-27日本電気株式会社 Computer and method for monitoring virtual machine monitor, and virtual machine monitor monitor program
US8522236B2 (en)*2007-12-282013-08-27Intel CorporationMethod and system for establishing a robust virtualized environment
US8261028B2 (en)*2007-12-312012-09-04Intel CorporationCached dirty bits for context switch consistency checks
CN101970477B (en)*2008-03-142014-12-31诺沃-诺迪斯克有限公司Protease-stabilized insulin analogues
US8145471B2 (en)*2008-04-302012-03-27International Business Machines CorporationNon-destructive simulation of a failure in a virtualization environment
JP5405799B2 (en)2008-10-302014-02-05株式会社日立製作所 Virtual computer control method, virtualization program, and virtual computer system
US8205197B2 (en)*2008-11-122012-06-19Lenovo (Singapore) Pte. Ltd.Apparatus, system, and method for granting hypervisor privileges
US8868925B2 (en)*2008-12-092014-10-21Nvidia CorporationMethod and apparatus for the secure processing of confidential content within a virtual machine of a processor
KR101571880B1 (en)*2009-02-022015-11-25삼성전자 주식회사Virtualized electronic apparatus virtual machine store and method for using virtual machine service
JP4961459B2 (en)*2009-06-262012-06-27株式会社日立製作所 Virtual computer system and control method in virtual computer system
US8612975B2 (en)*2009-07-072013-12-17Advanced Micro Devices, Inc.World switch between virtual machines with selective storage of state information
DE102009051350A1 (en)*2009-10-302011-05-05Continental Automotive Gmbh Method of operating a tachograph and tachograph
US20110197256A1 (en)*2009-12-182011-08-11Assured Information Security, Inc.Methods for securing a processing system and devices thereof
US8346935B2 (en)*2010-01-152013-01-01Joyent, Inc.Managing hardware resources by sending messages amongst servers in a data center
US9106697B2 (en)*2010-06-242015-08-11NeurallQ, Inc.System and method for identifying unauthorized activities on a computer system using a data structure model
US8555276B2 (en)2011-03-112013-10-08Joyent, Inc.Systems and methods for transparently optimizing workloads
CN103748556B (en)2011-08-302018-02-02惠普发展公司,有限责任合伙企业 Communicating with Virtual Trusted Runtime BIOS
US10303501B2 (en)2011-08-302019-05-28Hewlett-Packard Development Company, L.P.Virtual high privilege mode for a system management request
US8782224B2 (en)2011-12-292014-07-15Joyent, Inc.Systems and methods for time-based dynamic allocation of resource management
RU2522019C1 (en)*2012-12-252014-07-10Закрытое акционерное общество "Лаборатория Касперского"System and method of detecting threat in code executed by virtual machine
RU2535175C2 (en)*2012-12-252014-12-10Закрытое акционерное общество "Лаборатория Касперского"System and method for detecting malware by creating isolated environment
US8826279B1 (en)2013-03-142014-09-02Joyent, Inc.Instruction set architecture for compute-based object stores
US8881279B2 (en)2013-03-142014-11-04Joyent, Inc.Systems and methods for zone-based intrusion detection
US8943284B2 (en)2013-03-142015-01-27Joyent, Inc.Systems and methods for integrating compute resources in a storage area network
US8677359B1 (en)*2013-03-142014-03-18Joyent, Inc.Compute-centric object stores and methods of use
US9104456B2 (en)2013-03-142015-08-11Joyent, Inc.Zone management of compute-centric object stores
US9092238B2 (en)2013-03-152015-07-28Joyent, Inc.Versioning schemes for compute-centric object stores
US8793688B1 (en)2013-03-152014-07-29Joyent, Inc.Systems and methods for double hulled virtualization operations
US8775485B1 (en)2013-03-152014-07-08Joyent, Inc.Object store management operations within compute-centric object stores
US9330035B2 (en)*2013-05-232016-05-03Arm LimitedMethod and apparatus for interrupt handling
CN103927224B (en)*2014-03-282016-06-29小米科技有限责任公司Bead performs method and apparatus
US20160048679A1 (en)*2014-08-182016-02-18Bitdefender IPR Management Ltd.Systems And Methods for Exposing A Current Processor Instruction Upon Exiting A Virtual Machine
US9471799B2 (en)*2014-09-222016-10-18Advanced Micro Devices, Inc.Method for privileged mode based secure input mechanism
US10104099B2 (en)2015-01-072018-10-16CounterTack, Inc.System and method for monitoring a computer system using machine interpretable code
GB2539436B (en)*2015-06-162019-02-06Advanced Risc Mach LtdSecure initialisation
US11347529B2 (en)*2019-03-082022-05-31International Business Machines CorporationInject interrupts and exceptions into secure virtual machine
CN113791865B (en)*2021-09-082024-07-26山石网科通信技术股份有限公司Container security processing method and device, storage medium and processor
CN113986481A (en)*2021-09-302022-01-28深圳曦华科技有限公司Interrupt service instance calling method and related device

Citations (98)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US3699532A (en)*1970-04-211972-10-17Singer CoMultiprogramming control for a data handling system
US3996449A (en)*1975-08-251976-12-07International Business Machines CorporationOperating system authenticator
US4162536A (en)*1976-01-021979-07-24Gould Inc., Modicon Div.Digital input/output system and method
US4207609A (en)*1978-05-081980-06-10International Business Machines CorporationMethod and means for path independent device reservation and reconnection in a multi-CPU and shared device access system
US4247905A (en)*1977-08-261981-01-27Sharp Kabushiki KaishaMemory clear system
US4276594A (en)*1978-01-271981-06-30Gould Inc. Modicon DivisionDigital computer with multi-processor capability utilizing intelligent composite memory and input/output modules and method for performing the same
US4278837A (en)*1977-10-311981-07-14Best Robert MCrypto microprocessor for executing enciphered programs
US4307214A (en)*1979-12-121981-12-22Phillips Petroleum CompanySC2 activation of supported chromium oxide catalysts
US4307447A (en)*1979-06-191981-12-22Gould Inc.Programmable controller
US4319233A (en)*1978-11-301982-03-09Kokusan Denki Co., Ltd.Device for electrically detecting a liquid level
US4319323A (en)*1980-04-041982-03-09Digital Equipment CorporationCommunications device for data processing system
US4347565A (en)*1978-12-011982-08-31Fujitsu LimitedAddress control system for software simulation
US4366537A (en)*1980-05-231982-12-28International Business Machines Corp.Authorization mechanism for transfer of program control or data between different address spaces having different storage protect keys
US4403283A (en)*1980-07-281983-09-06Ncr CorporationExtended memory system and method
US4419724A (en)*1980-04-141983-12-06Sperry CorporationMain bus interface package
US4430709A (en)*1980-09-131984-02-07Robert Bosch GmbhApparatus for safeguarding data entered into a microprocessor
US4521852A (en)*1982-06-301985-06-04Texas Instruments IncorporatedData processing device formed on a single semiconductor substrate having secure memory
US4571672A (en)*1982-12-171986-02-18Hitachi, Ltd.Access control method for multiprocessor systems
US4759064A (en)*1985-10-071988-07-19Chaum David LBlind unanticipated signature systems
US4795893A (en)*1986-07-111989-01-03Bull, Cp8Security device prohibiting the function of an electronic data processing unit after a first cutoff of its electrical power
US4802084A (en)*1985-03-111989-01-31Hitachi, Ltd.Address translator
US4825052A (en)*1985-12-311989-04-25Bull Cp8Method and apparatus for certifying services obtained using a portable carrier such as a memory card
US4907272A (en)*1986-07-111990-03-06Bull Cp8Method for authenticating an external authorizing datum by a portable object, such as a memory card
US4907270A (en)*1986-07-111990-03-06Bull Cp8Method for certifying the authenticity of a datum exchanged between two devices connected locally or remotely by a transmission line
US4910774A (en)*1987-07-101990-03-20Schlumberger IndustriesMethod and system for suthenticating electronic memory cards
US4975836A (en)*1984-12-191990-12-04Hitachi, Ltd.Virtual computer system
US5007082A (en)*1988-08-031991-04-09Kelly Services, Inc.Computer software encryption apparatus
US5022077A (en)*1989-08-251991-06-04International Business Machines Corp.Apparatus and method for preventing unauthorized access to BIOS in a personal computer system
US5075842A (en)*1989-12-221991-12-24Intel CorporationDisabling tag bit recognition and allowing privileged operations to occur in an object-oriented memory protection mechanism
US5079737A (en)*1988-10-251992-01-07United Technologies CorporationMemory management unit for the MIL-STD 1750 bus
US5139760A (en)*1989-02-281992-08-18Mizusawa Industrial Chemicals, Ltd.Amorphous silica-alumina spherical particles and process for preparation thereof
US5187802A (en)*1988-12-261993-02-16Hitachi, Ltd.Virtual machine system with vitual machine resetting store indicating that virtual machine processed interrupt without virtual machine control program intervention
US5230069A (en)*1990-10-021993-07-20International Business Machines CorporationApparatus and method for providing private and shared access to host address and data spaces by guest programs in a virtual machine computer system
US5237616A (en)*1992-09-211993-08-17International Business Machines CorporationSecure computer system having privileged and unprivileged memories
US5255379A (en)*1990-12-281993-10-19Sun Microsystems, Inc.Method for automatically transitioning from V86 mode to protected mode in a computer system using an Intel 80386 or 80486 processor
US5287363A (en)*1991-07-011994-02-15Disk Technician CorporationSystem for locating and anticipating data storage media failures
US5293424A (en)*1992-10-141994-03-08Bull Hn Information Systems Inc.Secure memory card
US5295251A (en)*1989-09-211994-03-15Hitachi, Ltd.Method of accessing multiple virtual address spaces and computer system
US5317705A (en)*1990-10-241994-05-31International Business Machines CorporationApparatus and method for TLB purge reduction in a multi-level machine system
US5319760A (en)*1991-06-281994-06-07Digital Equipment CorporationTranslation buffer for virtual machines with address space match
US5355490A (en)*1991-06-141994-10-11Toshiba America Information Systems, Inc.System and method for saving the state for advanced microprocessor operating modes
US5361375A (en)*1989-02-091994-11-01Fujitsu LimitedVirtual computer system having input/output interrupt control of virtual machines
US5386552A (en)*1991-10-211995-01-31Intel CorporationPreservation of a computer system processing state in a mass storage device
US5421006A (en)*1992-05-071995-05-30Compaq Computer Corp.Method and apparatus for assessing integrity of computer system software
US5434999A (en)*1988-11-091995-07-18Bull Cp8Safeguarded remote loading of service programs by authorizing loading in protected memory zones in a terminal
US5437033A (en)*1990-11-161995-07-25Hitachi, Ltd.System for recovery from a virtual machine monitor failure with a continuous guest dispatched to a nonguest mode
US5442645A (en)*1989-06-061995-08-15Bull Cp8Method for checking the integrity of a program or data, and apparatus for implementing this method
US5455909A (en)*1991-07-051995-10-03Chips And Technologies Inc.Microprocessor with operation capture facility
US5459867A (en)*1989-10-201995-10-17Iomega CorporationKernels, description tables, and device drivers
US5459869A (en)*1994-02-171995-10-17Spilo; Michael L.Method for providing protected mode services for device drivers and other resident software
US5469557A (en)*1993-03-051995-11-21Microchip Technology IncorporatedCode protection in microcontroller with EEPROM fuses
US5473692A (en)*1994-09-071995-12-05Intel CorporationRoving software license for a hardware agent
US5479509A (en)*1993-04-061995-12-26Bull Cp8Method for signature of an information processing file, and apparatus for implementing it
US5504922A (en)*1989-06-301996-04-02Hitachi, Ltd.Virtual machine with hardware display controllers for base and target machines
US5506975A (en)*1992-12-181996-04-09Hitachi, Ltd.Virtual machine I/O interrupt control method compares number of pending I/O interrupt conditions for non-running virtual machines with predetermined number
US5511217A (en)*1992-11-301996-04-23Hitachi, Ltd.Computer system of virtual machines sharing a vector processor
US5522075A (en)*1991-06-281996-05-28Digital Equipment CorporationProtection ring extension for computers having distinct virtual machine monitor and virtual machine address spaces
US5528231A (en)*1993-06-081996-06-18Bull Cp8Method for the authentication of a portable object by an offline terminal, and apparatus for implementing the process
US5533126A (en)*1993-04-221996-07-02Bull Cp8Key protection device for smart cards
US5555414A (en)*1994-12-141996-09-10International Business Machines CorporationMultiprocessing system including gating of host I/O and external enablement to guest enablement at polling intervals
US5555385A (en)*1993-10-271996-09-10International Business Machines CorporationAllocation of address spaces within virtual machine compute system
US5560013A (en)*1994-12-061996-09-24International Business Machines CorporationMethod of using a target processor to execute programs of a source architecture that uses multiple address spaces
US5564040A (en)*1994-11-081996-10-08International Business Machines CorporationMethod and apparatus for providing a server function in a logically partitioned hardware machine
US5566323A (en)*1988-12-201996-10-15Bull Cp8Data processing system including programming voltage inhibitor for an electrically erasable reprogrammable nonvolatile memory
US5574936A (en)*1992-01-021996-11-12Amdahl CorporationAccess control mechanism controlling access to and logical purging of access register translation lookaside buffer (ALB) in a computer system
US5582717A (en)*1990-09-121996-12-10Di Santo; Dennis E.Water dispenser with side by side filling-stations
US5603499A (en)*1995-07-261997-02-18Doris G. JagoszBlackjack play option response indicator
US5604805A (en)*1994-02-281997-02-18Brands; Stefanus A.Privacy-protected transfer of electronic information
US5606617A (en)*1994-10-141997-02-25Brands; Stefanus A.Secret-key certificates
US5615263A (en)*1995-01-061997-03-25Vlsi Technology, Inc.Dual purpose security architecture with protected internal operating system
US5628022A (en)*1993-06-041997-05-06Hitachi, Ltd.Microcomputer with programmable ROM
US5633929A (en)*1995-09-151997-05-27Rsa Data Security, IncCryptographic key escrow system having reduced vulnerability to harvesting attacks
US5657445A (en)*1996-01-261997-08-12Dell Usa, L.P.Apparatus and method for limiting access to mass storage devices in a computer system
US5668971A (en)*1992-12-011997-09-16Compaq Computer CorporationPosted disk read operations performed by signalling a disk read complete to the system prior to completion of data transfer
US5684948A (en)*1995-09-011997-11-04National Semiconductor CorporationMemory management circuit which provides simulated privilege levels
US5706469A (en)*1994-09-121998-01-06Mitsubishi Denki Kabushiki KaishaData processing system controlling bus access to an arbitrary sized memory area
US5708818A (en)*1994-02-251998-01-13Munz; HeinrichMethod and apparatus for real-time operation of a processor
US5717903A (en)*1995-05-151998-02-10Compaq Computer CorporationMethod and appartus for emulating a peripheral device to allow device driver development before availability of the peripheral device
US5720609A (en)*1991-01-091998-02-24Pfefferle; William CharlesCatalytic method
US5721222A (en)*1992-04-161998-02-24Zeneca LimitedHeterocyclic ketones
US5729760A (en)*1996-06-211998-03-17Intel CorporationSystem for providing first type access to register if processor in first mode and second type access to register if processor not in first mode
US5737604A (en)*1989-11-031998-04-07Compaq Computer CorporationMethod and apparatus for independently resetting processors and cache controllers in multiple processor systems
US5740178A (en)*1996-08-291998-04-14Lucent Technologies Inc.Software for controlling a reliable backup memory
US5752046A (en)*1993-01-141998-05-12Apple Computer, Inc.Power management system for computer device interconnection bus
US5757919A (en)*1996-12-121998-05-26Intel CorporationCryptographically protected paging subsystem
US5764969A (en)*1995-02-101998-06-09International Business Machines CorporationMethod and system for enhanced management operation utilizing intermixed user level and supervisory level instructions with partial concept synchronization
US5854913A (en)*1995-06-071998-12-29International Business Machines CorporationMicroprocessor with an architecture mode control capable of supporting extensions of two distinct instruction-set architectures
US5987604A (en)*1997-10-071999-11-16Phoenix Technologies, Ltd.Method and apparatus for providing execution of system management mode services in virtual mode
US6075938A (en)*1997-06-102000-06-13The Board Of Trustees Of The Leland Stanford Junior UniversityVirtual machine monitors for scalable multiprocessors
US6182089B1 (en)*1997-09-232001-01-30Silicon Graphics, Inc.Method, system and computer program product for dynamically allocating large memory pages of different sizes
US6272637B1 (en)*1997-04-142001-08-07Dallas Semiconductor CorporationSystems and methods for protecting access to encrypted information
US6282650B1 (en)*1999-01-252001-08-28Intel CorporationSecure public digital watermark
US6314409B2 (en)*1996-01-112001-11-06Veridian Information SolutionsSystem for controlling access and distribution of digital property
US6374317B1 (en)*1999-10-072002-04-16Intel CorporationMethod and apparatus for initializing a computer interface
US6397242B1 (en)*1998-05-152002-05-28Vmware, Inc.Virtualization system including a virtual machine monitor for a computer with a segmented architecture
US20020099753A1 (en)*2001-01-202002-07-25Hardin David S.System and method for concurrently supporting multiple independent virtual machines
US20030037089A1 (en)*2001-08-152003-02-20Erik Cota-RoblesTracking operating system process and thread execution and virtual machine execution in hardware or in a virtual machine monitor
US6961941B1 (en)*2001-06-082005-11-01Vmware, Inc.Computer configuration for resource management in systems including a virtual machine

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US4253145A (en)*1978-12-261981-02-24Honeywell Information Systems Inc.Hardware virtualizer for supporting recursive virtual computer systems on a host computer system
WO1993009494A1 (en)*1991-10-281993-05-13Digital Equipment CorporationFault-tolerant computer processing using a shadow virtual processor
GB2282245B (en)*1993-09-231998-04-15Advanced Risc Mach LtdExecution of data processing instructions
US6181703B1 (en)*1995-09-082001-01-30Sprint Communications Company L. P.System for managing telecommunications
US6093213A (en)*1995-10-062000-07-25Advanced Micro Devices, Inc.Flexible implementation of a system management mode (SMM) in a processor
CA2285106A1 (en)*1997-04-021998-10-08David M. SilverMethod for integrating a virtual machine with input method editors
US6496847B1 (en)*1998-05-152002-12-17Vmware, Inc.System and method for virtualizing computer systems
JP2002041305A (en)*2000-07-262002-02-08Hitachi Ltd Method of allocating computer resources in virtual computer system and virtual computer system
US6725289B1 (en)*2002-04-172004-04-20Vmware, Inc.Transparent address remapping for high-speed I/O
US7318141B2 (en)*2002-12-172008-01-08Intel CorporationMethods and systems to control virtual machines
US7424709B2 (en)*2003-09-152008-09-09Intel CorporationUse of multiple virtual machine monitors to handle privileged events

Patent Citations (99)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US3699532A (en)*1970-04-211972-10-17Singer CoMultiprogramming control for a data handling system
US3996449A (en)*1975-08-251976-12-07International Business Machines CorporationOperating system authenticator
US4162536A (en)*1976-01-021979-07-24Gould Inc., Modicon Div.Digital input/output system and method
US4247905A (en)*1977-08-261981-01-27Sharp Kabushiki KaishaMemory clear system
US4278837A (en)*1977-10-311981-07-14Best Robert MCrypto microprocessor for executing enciphered programs
US4276594A (en)*1978-01-271981-06-30Gould Inc. Modicon DivisionDigital computer with multi-processor capability utilizing intelligent composite memory and input/output modules and method for performing the same
US4207609A (en)*1978-05-081980-06-10International Business Machines CorporationMethod and means for path independent device reservation and reconnection in a multi-CPU and shared device access system
US4319233A (en)*1978-11-301982-03-09Kokusan Denki Co., Ltd.Device for electrically detecting a liquid level
US4347565A (en)*1978-12-011982-08-31Fujitsu LimitedAddress control system for software simulation
US4307447A (en)*1979-06-191981-12-22Gould Inc.Programmable controller
US4307214A (en)*1979-12-121981-12-22Phillips Petroleum CompanySC2 activation of supported chromium oxide catalysts
US4319323A (en)*1980-04-041982-03-09Digital Equipment CorporationCommunications device for data processing system
US4419724A (en)*1980-04-141983-12-06Sperry CorporationMain bus interface package
US4366537A (en)*1980-05-231982-12-28International Business Machines Corp.Authorization mechanism for transfer of program control or data between different address spaces having different storage protect keys
US4403283A (en)*1980-07-281983-09-06Ncr CorporationExtended memory system and method
US4430709A (en)*1980-09-131984-02-07Robert Bosch GmbhApparatus for safeguarding data entered into a microprocessor
US4521852A (en)*1982-06-301985-06-04Texas Instruments IncorporatedData processing device formed on a single semiconductor substrate having secure memory
US4571672A (en)*1982-12-171986-02-18Hitachi, Ltd.Access control method for multiprocessor systems
US4975836A (en)*1984-12-191990-12-04Hitachi, Ltd.Virtual computer system
US4802084A (en)*1985-03-111989-01-31Hitachi, Ltd.Address translator
US4759064A (en)*1985-10-071988-07-19Chaum David LBlind unanticipated signature systems
US4825052A (en)*1985-12-311989-04-25Bull Cp8Method and apparatus for certifying services obtained using a portable carrier such as a memory card
US4907270A (en)*1986-07-111990-03-06Bull Cp8Method for certifying the authenticity of a datum exchanged between two devices connected locally or remotely by a transmission line
US4907272A (en)*1986-07-111990-03-06Bull Cp8Method for authenticating an external authorizing datum by a portable object, such as a memory card
US4795893A (en)*1986-07-111989-01-03Bull, Cp8Security device prohibiting the function of an electronic data processing unit after a first cutoff of its electrical power
US4910774A (en)*1987-07-101990-03-20Schlumberger IndustriesMethod and system for suthenticating electronic memory cards
US5007082A (en)*1988-08-031991-04-09Kelly Services, Inc.Computer software encryption apparatus
US5079737A (en)*1988-10-251992-01-07United Technologies CorporationMemory management unit for the MIL-STD 1750 bus
US5434999A (en)*1988-11-091995-07-18Bull Cp8Safeguarded remote loading of service programs by authorizing loading in protected memory zones in a terminal
US5566323A (en)*1988-12-201996-10-15Bull Cp8Data processing system including programming voltage inhibitor for an electrically erasable reprogrammable nonvolatile memory
US5187802A (en)*1988-12-261993-02-16Hitachi, Ltd.Virtual machine system with vitual machine resetting store indicating that virtual machine processed interrupt without virtual machine control program intervention
US5361375A (en)*1989-02-091994-11-01Fujitsu LimitedVirtual computer system having input/output interrupt control of virtual machines
US5139760A (en)*1989-02-281992-08-18Mizusawa Industrial Chemicals, Ltd.Amorphous silica-alumina spherical particles and process for preparation thereof
US5442645A (en)*1989-06-061995-08-15Bull Cp8Method for checking the integrity of a program or data, and apparatus for implementing this method
US5504922A (en)*1989-06-301996-04-02Hitachi, Ltd.Virtual machine with hardware display controllers for base and target machines
US5022077A (en)*1989-08-251991-06-04International Business Machines Corp.Apparatus and method for preventing unauthorized access to BIOS in a personal computer system
US5295251A (en)*1989-09-211994-03-15Hitachi, Ltd.Method of accessing multiple virtual address spaces and computer system
US5459867A (en)*1989-10-201995-10-17Iomega CorporationKernels, description tables, and device drivers
US5737604A (en)*1989-11-031998-04-07Compaq Computer CorporationMethod and apparatus for independently resetting processors and cache controllers in multiple processor systems
US5075842A (en)*1989-12-221991-12-24Intel CorporationDisabling tag bit recognition and allowing privileged operations to occur in an object-oriented memory protection mechanism
US5582717A (en)*1990-09-121996-12-10Di Santo; Dennis E.Water dispenser with side by side filling-stations
US5230069A (en)*1990-10-021993-07-20International Business Machines CorporationApparatus and method for providing private and shared access to host address and data spaces by guest programs in a virtual machine computer system
US5317705A (en)*1990-10-241994-05-31International Business Machines CorporationApparatus and method for TLB purge reduction in a multi-level machine system
US5437033A (en)*1990-11-161995-07-25Hitachi, Ltd.System for recovery from a virtual machine monitor failure with a continuous guest dispatched to a nonguest mode
US5255379A (en)*1990-12-281993-10-19Sun Microsystems, Inc.Method for automatically transitioning from V86 mode to protected mode in a computer system using an Intel 80386 or 80486 processor
US5720609A (en)*1991-01-091998-02-24Pfefferle; William CharlesCatalytic method
US5355490A (en)*1991-06-141994-10-11Toshiba America Information Systems, Inc.System and method for saving the state for advanced microprocessor operating modes
US5319760A (en)*1991-06-281994-06-07Digital Equipment CorporationTranslation buffer for virtual machines with address space match
US5522075A (en)*1991-06-281996-05-28Digital Equipment CorporationProtection ring extension for computers having distinct virtual machine monitor and virtual machine address spaces
US5287363A (en)*1991-07-011994-02-15Disk Technician CorporationSystem for locating and anticipating data storage media failures
US5455909A (en)*1991-07-051995-10-03Chips And Technologies Inc.Microprocessor with operation capture facility
US5386552A (en)*1991-10-211995-01-31Intel CorporationPreservation of a computer system processing state in a mass storage device
US5574936A (en)*1992-01-021996-11-12Amdahl CorporationAccess control mechanism controlling access to and logical purging of access register translation lookaside buffer (ALB) in a computer system
US5721222A (en)*1992-04-161998-02-24Zeneca LimitedHeterocyclic ketones
US5421006A (en)*1992-05-071995-05-30Compaq Computer Corp.Method and apparatus for assessing integrity of computer system software
US5237616A (en)*1992-09-211993-08-17International Business Machines CorporationSecure computer system having privileged and unprivileged memories
US5293424A (en)*1992-10-141994-03-08Bull Hn Information Systems Inc.Secure memory card
US5511217A (en)*1992-11-301996-04-23Hitachi, Ltd.Computer system of virtual machines sharing a vector processor
US5668971A (en)*1992-12-011997-09-16Compaq Computer CorporationPosted disk read operations performed by signalling a disk read complete to the system prior to completion of data transfer
US5506975A (en)*1992-12-181996-04-09Hitachi, Ltd.Virtual machine I/O interrupt control method compares number of pending I/O interrupt conditions for non-running virtual machines with predetermined number
US5752046A (en)*1993-01-141998-05-12Apple Computer, Inc.Power management system for computer device interconnection bus
US5469557A (en)*1993-03-051995-11-21Microchip Technology IncorporatedCode protection in microcontroller with EEPROM fuses
US5479509A (en)*1993-04-061995-12-26Bull Cp8Method for signature of an information processing file, and apparatus for implementing it
US5533126A (en)*1993-04-221996-07-02Bull Cp8Key protection device for smart cards
US5628022A (en)*1993-06-041997-05-06Hitachi, Ltd.Microcomputer with programmable ROM
US5528231A (en)*1993-06-081996-06-18Bull Cp8Method for the authentication of a portable object by an offline terminal, and apparatus for implementing the process
US5555385A (en)*1993-10-271996-09-10International Business Machines CorporationAllocation of address spaces within virtual machine compute system
US5459869A (en)*1994-02-171995-10-17Spilo; Michael L.Method for providing protected mode services for device drivers and other resident software
US5708818A (en)*1994-02-251998-01-13Munz; HeinrichMethod and apparatus for real-time operation of a processor
US5604805A (en)*1994-02-281997-02-18Brands; Stefanus A.Privacy-protected transfer of electronic information
US5473692A (en)*1994-09-071995-12-05Intel CorporationRoving software license for a hardware agent
US5568552A (en)*1994-09-071996-10-22Intel CorporationMethod for providing a roving software license from one node to another node
US5706469A (en)*1994-09-121998-01-06Mitsubishi Denki Kabushiki KaishaData processing system controlling bus access to an arbitrary sized memory area
US5606617A (en)*1994-10-141997-02-25Brands; Stefanus A.Secret-key certificates
US5564040A (en)*1994-11-081996-10-08International Business Machines CorporationMethod and apparatus for providing a server function in a logically partitioned hardware machine
US5560013A (en)*1994-12-061996-09-24International Business Machines CorporationMethod of using a target processor to execute programs of a source architecture that uses multiple address spaces
US5555414A (en)*1994-12-141996-09-10International Business Machines CorporationMultiprocessing system including gating of host I/O and external enablement to guest enablement at polling intervals
US5615263A (en)*1995-01-061997-03-25Vlsi Technology, Inc.Dual purpose security architecture with protected internal operating system
US5764969A (en)*1995-02-101998-06-09International Business Machines CorporationMethod and system for enhanced management operation utilizing intermixed user level and supervisory level instructions with partial concept synchronization
US5717903A (en)*1995-05-151998-02-10Compaq Computer CorporationMethod and appartus for emulating a peripheral device to allow device driver development before availability of the peripheral device
US5854913A (en)*1995-06-071998-12-29International Business Machines CorporationMicroprocessor with an architecture mode control capable of supporting extensions of two distinct instruction-set architectures
US5603499A (en)*1995-07-261997-02-18Doris G. JagoszBlackjack play option response indicator
US5684948A (en)*1995-09-011997-11-04National Semiconductor CorporationMemory management circuit which provides simulated privilege levels
US5633929A (en)*1995-09-151997-05-27Rsa Data Security, IncCryptographic key escrow system having reduced vulnerability to harvesting attacks
US6314409B2 (en)*1996-01-112001-11-06Veridian Information SolutionsSystem for controlling access and distribution of digital property
US5657445A (en)*1996-01-261997-08-12Dell Usa, L.P.Apparatus and method for limiting access to mass storage devices in a computer system
US5729760A (en)*1996-06-211998-03-17Intel CorporationSystem for providing first type access to register if processor in first mode and second type access to register if processor not in first mode
US5740178A (en)*1996-08-291998-04-14Lucent Technologies Inc.Software for controlling a reliable backup memory
US5757919A (en)*1996-12-121998-05-26Intel CorporationCryptographically protected paging subsystem
US6272637B1 (en)*1997-04-142001-08-07Dallas Semiconductor CorporationSystems and methods for protecting access to encrypted information
US6075938A (en)*1997-06-102000-06-13The Board Of Trustees Of The Leland Stanford Junior UniversityVirtual machine monitors for scalable multiprocessors
US6182089B1 (en)*1997-09-232001-01-30Silicon Graphics, Inc.Method, system and computer program product for dynamically allocating large memory pages of different sizes
US5987604A (en)*1997-10-071999-11-16Phoenix Technologies, Ltd.Method and apparatus for providing execution of system management mode services in virtual mode
US6397242B1 (en)*1998-05-152002-05-28Vmware, Inc.Virtualization system including a virtual machine monitor for a computer with a segmented architecture
US6282650B1 (en)*1999-01-252001-08-28Intel CorporationSecure public digital watermark
US6374317B1 (en)*1999-10-072002-04-16Intel CorporationMethod and apparatus for initializing a computer interface
US20020099753A1 (en)*2001-01-202002-07-25Hardin David S.System and method for concurrently supporting multiple independent virtual machines
US6961941B1 (en)*2001-06-082005-11-01Vmware, Inc.Computer configuration for resource management in systems including a virtual machine
US20030037089A1 (en)*2001-08-152003-02-20Erik Cota-RoblesTracking operating system process and thread execution and virtual machine execution in hardware or in a virtual machine monitor

Cited By (222)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US7536688B2 (en)*2003-02-282009-05-19Azul SystemsSegmented virtual machine
US20040172629A1 (en)*2003-02-282004-09-02Azul SystemsSegmented virtual machine
US20040250110A1 (en)*2003-03-282004-12-09Wray Michael JohnSecurity policy in trusted computing systems
US8612755B2 (en)*2003-03-282013-12-17Hewlett-Packard Development Company, L.P.Security policy in trusted computing systems
US20040268332A1 (en)*2003-04-232004-12-30Masato MitsumoriMemory access control method and processing system with memory access check function
US20050097345A1 (en)*2003-10-292005-05-05Kelley Brian H.System for selectively enabling operating modes of a device
US7496958B2 (en)*2003-10-292009-02-24Qualcomm IncorporatedSystem for selectively enabling operating modes of a device
US20050257243A1 (en)*2004-04-272005-11-17Microsoft CorporationMethod and system for enforcing a security policy via a security virtual machine
US8607299B2 (en)2004-04-272013-12-10Microsoft CorporationMethod and system for enforcing a security policy via a security virtual machine
US20050289311A1 (en)*2004-06-292005-12-29David DurhamSystem and method for secure inter-platform and intra-platform communications
WO2006012197A3 (en)*2004-06-292006-04-06Intel CorpMethod of improving computer security through sandboxing
WO2006012197A2 (en)2004-06-292006-02-02Intel CorporationMethod of improving computer security through sandboxing
WO2006012341A1 (en)2004-06-292006-02-02Intel CorporationSystem and method for secure inter-platform and intra-platform communications
US7908653B2 (en)*2004-06-292011-03-15Intel CorporationMethod of improving computer security through sandboxing
US20060021029A1 (en)*2004-06-292006-01-26Brickell Ernie FMethod of improving computer security through sandboxing
US20060075312A1 (en)*2004-09-302006-04-06Fischer Stephen ASystem and method for limiting exposure of hardware failure information for a secured execution environment
US7934076B2 (en)2004-09-302011-04-26Intel CorporationSystem and method for limiting exposure of hardware failure information for a secured execution environment
US7620953B1 (en)*2004-10-052009-11-17Azul Systems, Inc.System and method for allocating resources of a core space among a plurality of core virtual machines
US20060224685A1 (en)*2005-03-292006-10-05International Business Machines CorporationSystem management architecture for multi-node computer system
US7487222B2 (en)2005-03-292009-02-03International Business Machines CorporationSystem management architecture for multi-node computer system
US7480908B1 (en)2005-06-242009-01-20Azul Systems, Inc.Segmented virtual machine transport mechanism
US8276138B2 (en)2005-06-242012-09-25Azul Systems, Inc.Segmented virtual machine transport mechanism
US20090178039A1 (en)*2005-06-242009-07-09Azul Systems, Inc.Segmented virtual machine transport mechanism
US20090172665A1 (en)*2005-06-242009-07-02Azul Systems, Inc.Reducing latency in a segmented virtual machine
US8336048B2 (en)2005-06-242012-12-18Azul Systems, Inc.Reducing latency in a segmented virtual machine
US9361471B2 (en)2005-06-302016-06-07Intel CorporationSecure vault service for software components within an execution environment
US9547772B2 (en)2005-06-302017-01-17Intel CorporationSecure vault service for software components within an execution environment
US8601273B2 (en)2005-06-302013-12-03Intel CorporationSigned manifest for run-time verification of software program identity and integrity
US8499151B2 (en)2005-06-302013-07-30Intel CorporationSecure platform voucher service for software components within an execution environment
US20110231668A1 (en)*2005-06-302011-09-22Travis SchluesslerSigned Manifest for Run-Time Verification of Software Program Identity and Integrity
US20080216096A1 (en)*2005-07-152008-09-04Lenovo (Beijing) LimitedVirtual Computer System Supporting Trusted Computing and Method for Implementing Trusted Computation Thereon
US20100192150A1 (en)*2005-08-092010-07-29Steven GrobmanExclusive access for secure audio program
US7971057B2 (en)*2005-08-092011-06-28Intel CorporationExclusive access for secure audio program
US20070038997A1 (en)*2005-08-092007-02-15Steven GrobmanExclusive access for secure audio program
US7752436B2 (en)*2005-08-092010-07-06Intel CorporationExclusive access for secure audio program
US20080133893A1 (en)*2005-08-292008-06-05Centaurus Data LlcHierarchical register file
US9176741B2 (en)2005-08-292015-11-03Invention Science Fund I, LlcMethod and apparatus for segmented sequential storage
US8296550B2 (en)2005-08-292012-10-23The Invention Science Fund I, LlcHierarchical register file with operand capture ports
US7644258B2 (en)2005-08-292010-01-05Searete, LlcHybrid branch predictor using component predictors each having confidence and override signals
US20080133885A1 (en)*2005-08-292008-06-05Centaurus Data LlcHierarchical multi-threading processor
US20070083739A1 (en)*2005-08-292007-04-12Glew Andrew FProcessor with branch predictor
US8275976B2 (en)2005-08-292012-09-25The Invention Science Fund I, LlcHierarchical instruction scheduler facilitating instruction replay
US20080133883A1 (en)*2005-08-292008-06-05Centaurus Data LlcHierarchical store buffer
US8266412B2 (en)2005-08-292012-09-11The Invention Science Fund I, LlcHierarchical store buffer having segmented partitions
US20080133889A1 (en)*2005-08-292008-06-05Centaurus Data LlcHierarchical instruction scheduler
US8037288B2 (en)2005-08-292011-10-11The Invention Science Fund I, LlcHybrid branch predictor having negative ovedrride signals
US8028152B2 (en)2005-08-292011-09-27The Invention Science Fund I, LlcHierarchical multi-threading processor for executing virtual threads in a time-multiplexed fashion
US8327353B2 (en)*2005-08-302012-12-04Microsoft CorporationHierarchical virtualization with a multi-level virtualization mechanism
US20070050764A1 (en)*2005-08-302007-03-01Microsoft CorporationHierarchical virtualization with a multi-level virtualization mechanism
US7748037B2 (en)2005-09-222010-06-29Intel CorporationValidating a memory type modification attempt
US20070067590A1 (en)*2005-09-222007-03-22Uday SavagaonkarProviding protected access to critical memory regions
US20080163331A1 (en)*2006-12-292008-07-03Datta Sham MReconfiguring a secure system
US8316414B2 (en)2006-12-292012-11-20Intel CorporationReconfiguring a secure system
US8683191B2 (en)2006-12-292014-03-25Intel CorporationReconfiguring a secure system
US8356297B1 (en)2007-03-212013-01-15Azul Systems, Inc.External data source redirection in segmented virtual machine
US20080263679A1 (en)*2007-04-232008-10-23Microsoft CorporationStoring information in closed computing devices
US20080294892A1 (en)*2007-05-252008-11-27Ingo MolnarMethod and system for a kernel lock validator
US8145903B2 (en)*2007-05-252012-03-27Red Hat, Inc.Method and system for a kernel lock validator
US8839450B2 (en)2007-08-022014-09-16Intel CorporationSecure vault service for software components within an execution environment
US20090038017A1 (en)*2007-08-022009-02-05David DurhamSecure vault service for software components within an execution environment
GB2453652A (en)*2007-10-082009-04-15LenovoImplementing secure online payments by switching to a dedicated operating system (OS)
GB2453652B (en)*2007-10-082010-07-14LenovoMethod and client system for implementing online secure payment
US8099718B2 (en)2007-11-132012-01-17Intel CorporationMethod and system for whitelisting software components
US20090172385A1 (en)*2007-12-312009-07-02Datta Sham MEnabling system management mode in a secure system
US8473945B2 (en)*2007-12-312013-06-25Intel CorporationEnabling system management mode in a secure system
US8843742B2 (en)*2008-08-262014-09-23Hewlett-Packard CompanyHypervisor security using SMM
US20100057982A1 (en)*2008-08-262010-03-04Phoenix Technologies LtdHypervisor security using SMM
US8364601B2 (en)2008-12-312013-01-29Intel CorporationMethods and systems to directly render an image and correlate corresponding user input in a secure memory domain
US20100169666A1 (en)*2008-12-312010-07-01Prashant DewanMethods and systems to direclty render an image and correlate corresponding user input in a secuire memory domain
US20120017285A1 (en)*2009-05-182012-01-19Mark A PiwonkaSystems and methods of determining a trust level from system management mode
US8850601B2 (en)*2009-05-182014-09-30Hewlett-Packard Development Company, L.P.Systems and methods of determining a trust level from system management mode
US8250273B2 (en)*2009-09-142012-08-21International Business Machines CorporationSecure handling and routing of message-signaled interrupts
US20110066783A1 (en)*2009-09-142011-03-17International Business Machines CorporationSecure Handling and Routing of Message-Signaled Interrupts
US9223963B2 (en)2009-12-152015-12-29Mcafee, Inc.Systems and methods for behavioral sandboxing
US9058183B2 (en)2009-12-292015-06-16Advanced Micro Devices, Inc.Hypervisor isolation of processor cores to enable computing accelerator cores
KR20120111734A (en)*2009-12-292012-10-10어드밴스드 마이크로 디바이시즈, 인코포레이티드Hypervisor isolation of processor cores
KR101668399B1 (en)2009-12-292016-10-21어드밴스드 마이크로 디바이시즈, 인코포레이티드Hypervisor isolation of processor cores
US8495750B2 (en)2010-08-312013-07-23International Business Machines CorporationFilesystem management and security system
EP2691908A4 (en)*2011-03-282014-10-29Mcafee Inc SYSTEM AND METHOD FOR ANTI-MALICIAL SECURITY BASED ON A VIRTUAL MACHINE MONITOR
US9317690B2 (en)2011-03-282016-04-19Mcafee, Inc.System and method for firmware based anti-malware security
US9747443B2 (en)2011-03-282017-08-29Mcafee, Inc.System and method for firmware based anti-malware security
WO2012135192A2 (en)2011-03-282012-10-04Mcafee, Inc.System and method for virtual machine monitor based anti-malware security
US9392016B2 (en)2011-03-292016-07-12Mcafee, Inc.System and method for below-operating system regulation and control of self-modifying code
US8925089B2 (en)2011-03-292014-12-30Mcafee, Inc.System and method for below-operating system modification of malicious code on an electronic device
US8959638B2 (en)2011-03-292015-02-17Mcafee, Inc.System and method for below-operating system trapping and securing of interdriver communication
US9032525B2 (en)2011-03-292015-05-12Mcafee, Inc.System and method for below-operating system trapping of driver filter attachment
US8813227B2 (en)2011-03-292014-08-19Mcafee, Inc.System and method for below-operating system regulation and control of self-modifying code
US20120255004A1 (en)*2011-03-312012-10-04Mcafee, Inc.System and method for securing access to system calls
US9087199B2 (en)2011-03-312015-07-21Mcafee, Inc.System and method for providing a secured operating system execution environment
US9038176B2 (en)2011-03-312015-05-19Mcafee, Inc.System and method for below-operating system trapping and securing loading of code into memory
US8966629B2 (en)2011-03-312015-02-24Mcafee, Inc.System and method for below-operating system trapping of driver loading and unloading
US9262246B2 (en)2011-03-312016-02-16Mcafee, Inc.System and method for securing memory and storage of an electronic device with a below-operating system security agent
US8966624B2 (en)2011-03-312015-02-24Mcafee, Inc.System and method for securing an input/output path of an application against malware with a below-operating system security agent
US8863283B2 (en)*2011-03-312014-10-14Mcafee, Inc.System and method for securing access to system calls
US9530001B2 (en)2011-03-312016-12-27Mcafee, Inc.System and method for below-operating system trapping and securing loading of code into memory
US9448867B2 (en)*2011-12-312016-09-20Intel CorporationProcessor that detects when system management mode attempts to reach program code outside of protected space
US20130326288A1 (en)*2011-12-312013-12-05Shamanna M. DattaProcessor that detects when system management mode attempts to reach program code outside of protected space
US10140139B1 (en)*2012-06-192018-11-27Bromium, Inc.Ensuring the privacy and integrity of a hypervisor
US10877903B2 (en)2012-07-312020-12-29Hewlett-Packard Development Company, L.P.Protected memory area
US9367691B2 (en)2012-07-312016-06-14Hewlett-Packard Development Company, L.P.Modify executable bits of system management memory page table
US10102154B2 (en)2012-07-312018-10-16Hewlett-Packard Development Company, L.P.Protected memory area
JP2016511872A (en)*2013-01-222016-04-21アマゾン・テクノロジーズ、インコーポレイテッド Privileged cryptographic services in a virtualized environment
US9311138B2 (en)2013-03-132016-04-12Intel CorporationSystem management interrupt handling for multi-core processors
WO2014158603A1 (en)*2013-03-132014-10-02Intel CorporationSystem management interrupt handling for multi-core processors
US10579405B1 (en)*2013-03-132020-03-03Amazon Technologies, Inc.Parallel virtual machine managers
US9529627B2 (en)2013-03-192016-12-27Stmicroelectronics (Grenoble 2) SasManaging multiple systems in a computer device
EP2782007A1 (en)*2013-03-192014-09-24STMicroelectronics (Grenoble 2) SASLaunching multiple applications in containers on a processor
US9552477B2 (en)2013-03-192017-01-24Stmicroelectronics (Grenoble 2) SasResource management in a processor
EP2782038A1 (en)*2013-03-192014-09-24STMicroelectronics (Grenoble 2) SASResource management in a processor for trusted and untrusted applications
US10140958B2 (en)2013-03-192018-11-27Stmicroelectronics (Grenoble 2) SasManaging multiple systems in a computer device
US9317304B2 (en)2013-03-192016-04-19Stmicroelectronics (Grenoble 2) SasLaunching multiple applications in a processor
US11736530B2 (en)2013-04-192023-08-22Nicira, Inc.Framework for coordination between endpoint security and network security services
CN110084039A (en)*2013-04-192019-08-02Nicira股份有限公司Frame for the coordination between endpoint security and Network Security Service
US11263034B2 (en)2014-09-302022-03-01Amazon Technologies, Inc.Low latency computational capacity provisioning
US10915371B2 (en)2014-09-302021-02-09Amazon Technologies, Inc.Automatic management of low latency computational capacity
US10956185B2 (en)2014-09-302021-03-23Amazon Technologies, Inc.Threading as a service
US10108443B2 (en)2014-09-302018-10-23Amazon Technologies, Inc.Low latency computational capacity provisioning
US10140137B2 (en)*2014-09-302018-11-27Amazon Technologies, Inc.Threading as a service
US12321766B2 (en)2014-09-302025-06-03Amazon Technologies, Inc.Low latency computational capacity provisioning
US11467890B2 (en)2014-09-302022-10-11Amazon Technologies, Inc.Processing event messages for user requests to execute program code
US11561811B2 (en)2014-09-302023-01-24Amazon Technologies, Inc.Threading as a service
US10162688B2 (en)2014-09-302018-12-25Amazon Technologies, Inc.Processing event messages for user requests to execute program code
US10884802B2 (en)2014-09-302021-01-05Amazon Technologies, Inc.Message-based computation request scheduling
US20170192804A1 (en)*2014-09-302017-07-06Amazon Technologies, Inc.Threading as a service
US10824484B2 (en)2014-09-302020-11-03Amazon Technologies, Inc.Event-driven computing
US10592269B2 (en)2014-09-302020-03-17Amazon Technologies, Inc.Dynamic code deployment and versioning
US11126469B2 (en)2014-12-052021-09-21Amazon Technologies, Inc.Automatic determination of resource sizing
US10353746B2 (en)2014-12-052019-07-16Amazon Technologies, Inc.Automatic determination of resource sizing
US9946651B2 (en)*2014-12-132018-04-17Via Alliance Semiconductor Co., LtdPattern detector for detecting hangs
US20160350215A1 (en)*2014-12-132016-12-01Via Alliance Semiconductor Co., Ltd.Distributed hang recovery logic
US10067871B2 (en)*2014-12-132018-09-04Via Alliance Semiconductor Co., LtdLogic analyzer for detecting hangs
US10324842B2 (en)*2014-12-132019-06-18Via Alliance Semiconductor Co., LtdDistributed hang recovery logic
US20160350223A1 (en)*2014-12-132016-12-01Via Alliance Semiconductor Co., Ltd.Logic analyzer for detecting hangs
US11461124B2 (en)2015-02-042022-10-04Amazon Technologies, Inc.Security protocols for low latency execution of program code
US11360793B2 (en)2015-02-042022-06-14Amazon Technologies, Inc.Stateful virtual compute system
US10853112B2 (en)2015-02-042020-12-01Amazon Technologies, Inc.Stateful virtual compute system
US10552193B2 (en)2015-02-042020-02-04Amazon Technologies, Inc.Security protocols for low latency execution of program code
US10387177B2 (en)2015-02-042019-08-20Amazon Technologies, Inc.Stateful virtual compute system
US10623476B2 (en)2015-04-082020-04-14Amazon Technologies, Inc.Endpoint management system providing an application programming interface proxy service
US10776171B2 (en)2015-04-082020-09-15Amazon Technologies, Inc.Endpoint management system and virtual compute system
US9940470B2 (en)*2015-10-062018-04-10Symantec CorporationTechniques for generating a virtual private container
US20170098092A1 (en)*2015-10-062017-04-06Symantec CorporationTechniques for generating a virtual private container
US10754701B1 (en)2015-12-162020-08-25Amazon Technologies, Inc.Executing user-defined code in response to determining that resources expected to be utilized comply with resource restrictions
US10437629B2 (en)2015-12-162019-10-08Amazon Technologies, Inc.Pre-triggers for code execution environments
US10365985B2 (en)2015-12-162019-07-30Amazon Technologies, Inc.Predictive management of on-demand code execution
US11243819B1 (en)2015-12-212022-02-08Amazon Technologies, Inc.Acquisition and maintenance of compute capacity
US10691498B2 (en)2015-12-212020-06-23Amazon Technologies, Inc.Acquisition and maintenance of compute capacity
US11016815B2 (en)2015-12-212021-05-25Amazon Technologies, Inc.Code execution request routing
US10747873B2 (en)2016-01-262020-08-18Hewlett-Packard Development Company, L.P.System management mode privilege architecture
CN108292339A (en)*2016-01-262018-07-17惠普发展公司,有限责任合伙企业System Management Mode privilege framework
EP3314516A4 (en)*2016-01-262019-01-09Hewlett-Packard Development Company, L.P. SYSTEM MANAGEMENT MODE PRIVILEGE ARCHITECTURE
US10162672B2 (en)2016-03-302018-12-25Amazon Technologies, Inc.Generating data streams from pre-existing data sets
US11132213B1 (en)2016-03-302021-09-28Amazon Technologies, Inc.Dependency-based process of pre-existing data sets at an on demand code execution environment
US10891145B2 (en)2016-03-302021-01-12Amazon Technologies, Inc.Processing pre-existing data sets at an on demand code execution environment
US10282229B2 (en)2016-06-282019-05-07Amazon Technologies, Inc.Asynchronous task management in an on-demand network code execution environment
US11354169B2 (en)2016-06-292022-06-07Amazon Technologies, Inc.Adjusting variable limit on concurrent code executions
US10402231B2 (en)2016-06-292019-09-03Amazon Technologies, Inc.Adjusting variable limit on concurrent code executions
US10102040B2 (en)2016-06-292018-10-16Amazon Technologies, IncAdjusting variable limit on concurrent code executions
US10203990B2 (en)2016-06-302019-02-12Amazon Technologies, Inc.On-demand network code execution with cross-account aliases
US10277708B2 (en)2016-06-302019-04-30Amazon Technologies, Inc.On-demand network code execution with cross-account aliases
US10528390B2 (en)2016-09-232020-01-07Amazon Technologies, Inc.Idempotent task execution in on-demand network code execution systems
US10884787B1 (en)2016-09-232021-01-05Amazon Technologies, Inc.Execution guarantees in an on-demand network code execution system
US11119813B1 (en)2016-09-302021-09-14Amazon Technologies, Inc.Mapreduce implementation using an on-demand network code execution system
US10564946B1 (en)2017-12-132020-02-18Amazon Technologies, Inc.Dependency handling in an on-demand network code execution system
US10353678B1 (en)2018-02-052019-07-16Amazon Technologies, Inc.Detecting code characteristic alterations due to cross-service calls
US10733085B1 (en)2018-02-052020-08-04Amazon Technologies, Inc.Detecting impedance mismatches due to cross-service calls
US10831898B1 (en)2018-02-052020-11-10Amazon Technologies, Inc.Detecting privilege escalations in code including cross-service calls
US10725752B1 (en)2018-02-132020-07-28Amazon Technologies, Inc.Dependency handling in an on-demand network code execution system
US10776091B1 (en)2018-02-262020-09-15Amazon Technologies, Inc.Logging endpoint in an on-demand code execution system
US11875173B2 (en)2018-06-252024-01-16Amazon Technologies, Inc.Execution of auxiliary functions in an on-demand network code execution system
US12314752B2 (en)2018-06-252025-05-27Amazon Technologies, Inc.Execution of auxiliary functions in an on-demand network code execution system
US10884722B2 (en)2018-06-262021-01-05Amazon Technologies, Inc.Cross-environment application of tracing information for improved code execution
US11146569B1 (en)2018-06-282021-10-12Amazon Technologies, Inc.Escalation-resistant secure network services using request-scoped authentication information
US11171983B2 (en)*2018-06-292021-11-09Intel CorporationTechniques to provide function-level isolation with capability-based security
US10949237B2 (en)2018-06-292021-03-16Amazon Technologies, Inc.Operating system customization in an on-demand network code execution system
US11836516B2 (en)2018-07-252023-12-05Amazon Technologies, Inc.Reducing execution times in an on-demand network code execution system using saved machine states
US11099870B1 (en)2018-07-252021-08-24Amazon Technologies, Inc.Reducing execution times in an on-demand network code execution system using saved machine states
US11099917B2 (en)2018-09-272021-08-24Amazon Technologies, Inc.Efficient state maintenance for execution environments in an on-demand code execution system
US11243953B2 (en)2018-09-272022-02-08Amazon Technologies, Inc.Mapreduce implementation in an on-demand network code execution system and stream data processing system
US11943093B1 (en)2018-11-202024-03-26Amazon Technologies, Inc.Network connection recovery after virtual machine transition in an on-demand network code execution system
CN109542610A (en)*2018-12-042019-03-29中国航空工业集团公司西安航空计算技术研究所A kind of multi partition operating system void interrupt criteria component realization method
US10884812B2 (en)2018-12-132021-01-05Amazon Technologies, Inc.Performance-based hardware emulation in an on-demand network code execution system
US11010188B1 (en)2019-02-052021-05-18Amazon Technologies, Inc.Simulated data object storage using on-demand computation of data objects
US12327133B1 (en)2019-03-222025-06-10Amazon Technologies, Inc.Application gateways in an on-demand network code execution system
US11861386B1 (en)2019-03-222024-01-02Amazon Technologies, Inc.Application gateways in an on-demand network code execution system
CN113826072A (en)*2019-05-162021-12-21微软技术许可有限责任公司 Code Updates in System Administration Mode
US11119809B1 (en)2019-06-202021-09-14Amazon Technologies, Inc.Virtualization-based transaction handling in an on-demand network code execution system
US11714675B2 (en)2019-06-202023-08-01Amazon Technologies, Inc.Virtualization-based transaction handling in an on-demand network code execution system
US11115404B2 (en)2019-06-282021-09-07Amazon Technologies, Inc.Facilitating service connections in serverless code executions
US11190609B2 (en)2019-06-282021-11-30Amazon Technologies, Inc.Connection pooling for scalable network services
US11159528B2 (en)2019-06-282021-10-26Amazon Technologies, Inc.Authentication to network-services using hosted authentication information
US11023311B2 (en)2019-09-272021-06-01Amazon Technologies, Inc.On-demand code execution in input path of data uploaded to storage service in multiple data portions
US11263220B2 (en)2019-09-272022-03-01Amazon Technologies, Inc.On-demand execution of object transformation code in output path of object storage service
US11386230B2 (en)2019-09-272022-07-12Amazon Technologies, Inc.On-demand code obfuscation of data in input path of object storage service
US10908927B1 (en)2019-09-272021-02-02Amazon Technologies, Inc.On-demand execution of object filter code in output path of object storage service
US11394761B1 (en)2019-09-272022-07-19Amazon Technologies, Inc.Execution of user-submitted code on a stream of data
US11416628B2 (en)2019-09-272022-08-16Amazon Technologies, Inc.User-specific data manipulation system for object storage service based on user-submitted code
US10996961B2 (en)2019-09-272021-05-04Amazon Technologies, Inc.On-demand indexing of data in input path of object storage service
US11656892B1 (en)2019-09-272023-05-23Amazon Technologies, Inc.Sequential execution of user-submitted code and native functions
US11250007B1 (en)2019-09-272022-02-15Amazon Technologies, Inc.On-demand execution of object combination code in output path of object storage service
US11550944B2 (en)2019-09-272023-01-10Amazon Technologies, Inc.Code execution environment customization system for object storage service
US11023416B2 (en)2019-09-272021-06-01Amazon Technologies, Inc.Data access control system for object storage service based on owner-defined code
US11860879B2 (en)2019-09-272024-01-02Amazon Technologies, Inc.On-demand execution of object transformation code in output path of object storage service
US11055112B2 (en)2019-09-272021-07-06Amazon Technologies, Inc.Inserting executions of owner-specified code into input/output path of object storage service
US11106477B2 (en)2019-09-272021-08-31Amazon Technologies, Inc.Execution of owner-specified code during input/output path to object storage service
US11360948B2 (en)2019-09-272022-06-14Amazon Technologies, Inc.Inserting owner-specified data processing pipelines into input/output path of object storage service
WO2021080601A1 (en)*2019-10-252021-04-29Hewlett-Packard Development Company, L.P.Integrity monitor
US10942795B1 (en)2019-11-272021-03-09Amazon Technologies, Inc.Serverless call distribution to utilize reserved capacity without inhibiting scaling
US11119826B2 (en)2019-11-272021-09-14Amazon Technologies, Inc.Serverless call distribution to implement spillover while avoiding cold starts
US11449601B2 (en)*2020-01-082022-09-20Red Hat, Inc.Proof of code compliance and protected integrity using a trusted execution environment
US11714682B1 (en)2020-03-032023-08-01Amazon Technologies, Inc.Reclaiming computing resources in an on-demand code execution system
US11188391B1 (en)2020-03-112021-11-30Amazon Technologies, Inc.Allocating resources to on-demand code executions under scarcity conditions
US11775640B1 (en)2020-03-302023-10-03Amazon Technologies, Inc.Resource utilization-based malicious task detection in an on-demand code execution system
CN112800431A (en)*2020-08-282021-05-14支付宝(杭州)信息技术有限公司Method and device for safely entering trusted execution environment in hyper-thread scene
US11550713B1 (en)2020-11-252023-01-10Amazon Technologies, Inc.Garbage collection in distributed systems using life cycled storage roots
US11593270B1 (en)2020-11-252023-02-28Amazon Technologies, Inc.Fast distributed caching using erasure coded object parts
US11388210B1 (en)2021-06-302022-07-12Amazon Technologies, Inc.Streaming analytics using a serverless compute system
US12020059B2 (en)*2021-08-302024-06-25International Business Machines CorporationInaccessible prefix pages during virtual machine execution
US20230061511A1 (en)*2021-08-302023-03-02International Business Machines CorporationInaccessible prefix pages during virtual machine execution
US11968280B1 (en)2021-11-242024-04-23Amazon Technologies, Inc.Controlling ingestion of streaming data to serverless function executions
US12015603B2 (en)2021-12-102024-06-18Amazon Technologies, Inc.Multi-tenant mode for serverless code execution
US12381878B1 (en)2023-06-272025-08-05Amazon Technologies, Inc.Architecture for selective use of private paths between cloud services

Also Published As

Publication numberPublication date
RU2313126C2 (en)2007-12-20
US20060015869A1 (en)2006-01-19
JP4846660B2 (en)2011-12-28
AU2003231237A8 (en)2003-12-22
CN1675623A (en)2005-09-28
CN100377092C (en)2008-03-26
US7581219B2 (en)2009-08-25
JP5242747B2 (en)2013-07-24
AU2003231237A1 (en)2003-12-22
WO2003104981A3 (en)2004-05-13
JP2005529401A (en)2005-09-29
EP1512074A2 (en)2005-03-09
MY146723A (en)2012-09-14
JP4708016B2 (en)2011-06-22
WO2003104981A2 (en)2003-12-18
JP2007265434A (en)2007-10-11
RU2004139086A (en)2005-07-10
JP2011227939A (en)2011-11-10

Similar Documents

PublicationPublication DateTitle
US20030229794A1 (en)System and method for protection against untrusted system management code by redirecting a system management interrupt and creating a virtual machine container
US7631160B2 (en)Method and apparatus for securing portions of memory
JP6404283B2 (en) System and method for executing instructions to initialize a secure environment
US7260848B2 (en)Hardened extensible firmware framework
US5944821A (en)Secure software registration and integrity assessment in a computer system
US10360386B2 (en)Hardware enforcement of providing separate operating system environments for mobile devices
KR100950102B1 (en)A computer system including a secure execution mode-capable processor and a method of initializing the computer system
JP3982687B2 (en) Controlling access to multiple isolated memories in an isolated execution environment
JP2006012170A (en)Method to enable user mode process to operate in privileged execution mode
US11989576B2 (en)Execution of code in system memory
US20060136679A1 (en)Protected processing apparatus, systems, and methods

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:INTEL CORPORATION, CALIFORNIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:GLEW, ANDY;REEL/FRAME:012995/0740

Effective date:20020603

ASAssignment

Owner name:INTEL CORPORATION, CALIFORNIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SUTTON, JAMES A. II;GRAWROCK, DAVID W.;UHLIG, RICHARD A.;AND OTHERS;REEL/FRAME:013389/0650;SIGNING DATES FROM 20020813 TO 20021004

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

ASAssignment

Owner name:TAHOE RESEARCH, LTD., IRELAND

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:INTEL CORPORATION;REEL/FRAME:061175/0176

Effective date:20220718


[8]ページ先頭

©2009-2025 Movatter.jp