System and method of identifying and preventing security violations within a computing system
First Claim
Patent Images
1. A method, comprising:
- monitoring on a core bus coupled to a processor core at least one of voltage levels, clock frequencies, hardware fault injection and test and debug activity associated with an electronic apparatus;
identifying unauthorized manipulation of at least one of said voltage levels, clock frequencies, hardware fault injection and test and debug activity as a security violation; and
preventing execution of an instruction within the processor core in response to the security violation.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method of identifying and preventing security violations within a computing system. Some exemplary embodiments may be a method comprising monitoring activity on a core bus coupled to a processor core (the processor core operating in a computing system), identifying activity on the core bus as a security violation, and preventing execution of an instruction within the processor core in response to the security violation.
-
Citations
21 Claims
-
1. A method, comprising:
-
monitoring on a core bus coupled to a processor core at least one of voltage levels, clock frequencies, hardware fault injection and test and debug activity associated with an electronic apparatus; identifying unauthorized manipulation of at least one of said voltage levels, clock frequencies, hardware fault injection and test and debug activity as a security violation; and preventing execution of an instruction within the processor core in response to the security violation. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method, comprising:
-
monitoring activity on a core bus coupled to a processor core, the processor core operating in a computing system; identifying activity on the core bus as a security violation; identifying as the security violation software initiating an attempted access of a non-privileged resource by a privileged resource of the computing system; preventing access to the non-privileged resource; and preventing future execution of the software.
-
-
7. A method, comprising:
-
tracking activity on a core bus of a processor core of a computing system; recognizing activity on the core bus as a security violation said activity comprising more than one of instruction bus signals, data bus signals, status signals and control signals; recognizing as the security violation an attempted access of a privileged resource by a non-privileged resource of the computing system; asserting an interrupt signal to the processor core in response to the security violation; executing security response software in response to the asserted interrupt signal; blocking execution of an instruction within the processor core in response to execution of the security response software; and preventing future execution of a program requesting the attempted access.
-
-
8. A method, comprising:
-
tracking activity on a core bus of a processor core of a computing system; recognizing activity on the core bus as a security violation said activity comprising more than one of instruction bus signals, data bus signals, status signals and control signals; recognizing as the security violation an attempted access of a privileged resource by a non-privileged resource of the computing system; asserting an interrupt signal to the processor core in response to the security violation; executing security response software in response to the asserted interrupt signal; ending execution of a program requesting the attempted access in response to the security violation; and preventing future execution of the program requesting the attempted access.
-
-
9. A method, comprising:
-
tracking activity on a core bus of a processor core of a computing system; recognizing activity on the core bus as a security violation said activity comprising more than one of instruction bus signals, data bus signals, status signals and control signals; recognizing as the security violation an attempted access of a privileged resource by a non-privileged resource of the computing system; asserting an interrupt signal to the processor core in response to the security violation; executing security response software in response to the asserted interrupt signal; activating a visual indicator to signal the user that the security violation has been detected; and preventing future execution of a program requesting the attempted access.
-
-
10. A method, comprising:
-
tracking activity on a core bus of a processor core of a computing system; recognizing activity on the core bus as a security violation said activity comprising more than one of instruction bus signals, data bus signals, status signals and control signals; recognizing as the security violation an attempted access of a privileged resource by a non-privileged resource of the computing system; asserting an interrupt signal to the processor core in response to the security violation; executing security response software in response to the asserted interrupt signal; activating an audible indicator to signal the user that the security violation has been detected; and preventing future execution of a program requesting the attempted access.
-
-
11. A computing system, comprising:
-
a processor core coupled to a primary bus; and a monitoring system coupled to the primary bus, the monitoring system tracks an activity on the primary bus; wherein the monitoring system recognizes as a security violation activity on the primary bus caused by a program executing on the processor core; wherein the monitoring system blocks completion of activity initiated by the program by causing a flush of the processor core; and wherein the monitoring system blocks future execution of the program. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A computing system, comprising:
-
a processor core coupled to a primary bus; and a monitoring system coupled to the primary bus, the monitoring system tracks an activity on the primary bus; wherein the monitoring system recognizes as a security violation activity caused by a program presenting an instruction abort sequence to the processor core; wherein the monitoring system blocks completion of the activity by causing a flush of the processor core; and wherein the monitoring system blocks future execution of the program.
-
Specification