×

Tamper protection of software agents operating in a vitual technology environment methods and apparatuses

  • US 7,882,318 B2
  • Filed: 09/29/2006
  • Issued: 02/01/2011
  • Est. Priority Date: 09/29/2006
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method comprising:

  • assigning by a virtual machine manager disposed in a memory of a computing device and operated by a processor of the computing device, a first security domain to a first memory page of the memory of the computing device, and a second security domain to a second memory page of the memory of the computing device, wherein the virtual machine manager manages a plurality of virtual machines disposed in the memory and operated by the processor, wherein the virtual machines include a plurality of programs, and the processor is enhanced with a previous security domain register and a current security domain register;

    storing by the virtual machine manager information indicative of the first security domain in a first extended page table entry structure that references the first memory page, and information indicative of the second security domain in a second extended page table entry structure that references the second memory page, the first and second extended page table entry structures being part of a page table structure managed by and disposed within the virtual machine manager;

    copying by the processor, the information indicative of the first security domain and the information indicative of the second security domain to the previous security domain register and the current security domain register, respectively, if an instruction residing in the first memory page attempts to reference or access the second memory page, wherein the instruction belongs to one of the plurality of programs of the plurality of virtual machines;

    comparing by the processor, using the previous security domain register and the current security domain register, the first and second security domains of the first and second memory pages; and

    determining by the processor, whether to allow or to disallow the instruction from the first memory page to reference or access the second memory page based at least in part on said comparing.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×