System and method of identifying and preventing security violations within a computing system
First Claim
Patent Images
1. A method, comprising:
- monitoring activity on a core bus coupled to a processor core, the processor core operating in a computing system;
identifying activity on the core bus as a security violation; and
preventing execution of an instruction within the processor core in response to the security violation.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method of identifying and preventing security violations within a computing system. Some exemplary embodiments may be a method comprising monitoring activity on a core bus coupled to a processor core (the processor core operating in a computing system), identifying activity on the core bus as a security violation, and preventing execution of an instruction within the processor core in response to the security violation.
91 Citations
31 Claims
-
1. A method, comprising:
-
monitoring activity on a core bus coupled to a processor core, the processor core operating in a computing system;
identifying activity on the core bus as a security violation; and
preventing execution of an instruction within the processor core in response to the security violation. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method, comprising:
-
tracking activity on a core bus of a processor core of a computing system;
recognizing activity on the core bus as a security violation;
asserting an interrupt signal to the processor core in response to the security violation; and
executing security response software in response to the asserted interrupt signal. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A computing system, comprising:
-
a processor core coupled to a primary bus; and
a monitoring system coupled to the primary bus, the monitoring system tracks an activity on the primary bus;
wherein the monitoring system recognizes a security violation comprising the activity on the primary bus caused by a program executing on the processor core; and
wherein the monitoring system blocks completion of the activity by causing a flush of the processor core. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. A computing system, comprising:
-
a monitoring system;
a plurality of computing system components; and
a firewall system, the firewall system monitors an attempted access to at least one of the plurality of system components, and couples between the plurality of computing system components and the monitoring system;
wherein the firewall system recognizes as a security violation a violation of at least one of a plurality of stored firewall constraints; and
wherein the firewall system blocks the attempted access if the attempted access is recognized as the security violation. - View Dependent Claims (30, 31)
-
Specification