Instruction set adapted for security risk monitoring
First Claim
1. A processor operable to execute instructions of a defined instruction set architecture comprising:
- an instruction of the instruction set architecture operable to access data from a source and operable to receive a taint indicator indicative of potential security risk associated with the data;
a taint storage element operable for updating in response to receipt of the taint indicator; and
logic operable to update the taint storage element, process the taint storage element, determine a security risk condition based on the processing of the taint storage element; and
respond to the security risk condition.
7 Assignments
0 Petitions
Accused Products
Abstract
A processor is adapted to manage security risk by updating and monitoring a taint storage element in response to receipt of taint indicators, and responding to predetermined taint conditions detecting by the monitoring. The processor can be operable to execute instructions of a defined instruction set architecture and comprises an instruction of the instruction set architecture operable to access data from a source and operable to receive a taint indicator indicative of potential security risk associated with the data. The processor can further comprise a taint storage element operable for updating in response to receipt of the taint indicator and logic. The logic can be operable to update the taint storage element, process the taint storage element, determine a security risk condition based on the processing of the taint storage element, and respond to the security risk condition.
44 Citations
51 Claims
-
1. A processor operable to execute instructions of a defined instruction set architecture comprising:
-
an instruction of the instruction set architecture operable to access data from a source and operable to receive a taint indicator indicative of potential security risk associated with the data; a taint storage element operable for updating in response to receipt of the taint indicator; and logic operable to update the taint storage element, process the taint storage element, determine a security risk condition based on the processing of the taint storage element; and
respond to the security risk condition. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34)
-
-
35-46. -46. (canceled)
-
47. A processor operable to execute instructions of a defined instruction set architecture comprising:
-
an instruction of the instruction set architecture specified to store to a predetermined memory address that stores to a hash of the predetermined memory address; and logic operable to compute a hash of the predetermined memory address and store to the hash of the predetermined memory address.
-
-
48-49. -49. (canceled)
-
50. A processor operable to execute instructions of a defined instruction set architecture comprising:
-
an instruction of the instruction set architecture specified to operate on data at a destination that passes a taint indicator aspect associated with the destination; a taint storage element operable for updating in response to receipt of a taint indicator; and logic operable to process the taint storage element, derive the taint indicator aspect based on the taint indicator and/or the processed taint storage element associated with the destination, and pass the taint indicator aspect.
-
-
51-104. -104. (canceled)
Specification