RESTRICTING MEMORY AREAS FOR INSTRUCTION READING DEPENDING ON HARDWARE MODE AND SECURITY FLAG Russian patent published in 2014 - IPC G06F21/74 G06F9/312 

Abstract RU 2513909 C1

FIELD: physics, computer engineering.

SUBSTANCE: invention relates to data processing systems, having a plurality of operating hardware modes, and managing memory access depending on the current hardware mode. An apparatus for processing data (2) includes a processor (8), a memory (6) and memory control circuit (12). The processor (8) operates in a plurality of hardware modes including a privileged mode and a user mode. When operating in the privileged mode, the processor (8) is blocked by the memory control circuit (12) from fetching instructions from memory address regions (34, 38, 42) within the memory (6) which are writeable within the user mode if a security flag within register (46) is set to indicate that this blocking mechanism is active.

EFFECT: enabling a processor to access data in memory even when that option is blocked in the current operating mode of the processor.

13 cl, 4 dwg

Similar patents RU2513909C1

Title Year Author Number
SYSTEM AND METHODS FOR USE OF SYNTHESISED COMMANDS IN VIRTUAL MACHINE 2004
  • Traut Ehrik
RU2374675C2
VIRTUAL MACHINE MANAGER FACILITATED SELECTIVE CODE INTEGRITY ENFORCEMENT 2014
  • Khepkin Devid A.
  • Dzhonson Kennet D.
RU2667713C2
PROGRAMMABLE DEVICES FOR PROCESSING DATA MEMORY TRANSFER REQUESTS 2016
  • Dzhittins Bendzhamin
RU2690751C2
NEW PROCESSOR MODE FOR LIMITING FUNCTIONING OF GUEST SOFTWARE, EXECUTED AT VIRTUAL MACHINE, SUPPORTED BY VIRTUAL MACHINE MONITOR 2001
  • Chou Stefen
  • Nehjdzher Gilbert
  • Kota-Robles Ehrik
  • Dzhejasingkh Stalinselvaradzh
  • Ulig Rikhard
  • Kozuch Majkl
  • Kagi Ehlehjn
RU2265880C2
SYSTEM AND METHOD FOR PROTECTION FROM NON-TRUSTED SYSTEM CONTROL MODE CODE BY MEANS OF REDIRECTION OF SYSTEM MANAGEMENT MODE INTERRUPT AND CREATION OF VIRTUAL MACHINE CONTAINER 2003
  • Satton Ii Dzhejms
  • Graurok Dehvid
  • Ulig Richard
  • Pojsner Dehvid
  • Glu Ehndrju
  • Kholl Klifford
  • Smit Iii Lorens
  • Nejger Gilbert
  • Kozukh Majkl
  • Dzhordzh Robert
  • Berdzhess Brehdli
RU2313126C2
METHODS, SYSTEMS AND COMPUTER-READABLE MEDIUM FOR TARGET DEVICES ACTIVE CONTROL, MEMORY PROTECTION AND INTEGRITY CHECKING 2013
  • Azab Akhmed
  • Nin Pen
RU2615664C2
METHOD OF MODIFYING MEMORY ACCESS GRANTS IN SECURE PROCESSOR ENVIRONMENT 2014
  • Lesli-Kherd Rebeka
  • Aleksandrovich Ilja
  • Anati Ittaj
  • Berenzon Aleks
  • Makkin Frensis
  • Rozas Karlos
  • Savagaonkar Udaj
  • Skarlata Vinsent
  • Goldsmit Majkl
  • Dzhonson Sajmon
  • Shanbkhogue Vedvias
  • Smit Uesli
RU2602793C2
SYSTEM AND METHOD OF VIRTUALISING GRAPHIC SUBSYSTEMS 2005
  • Blit Dehvid R.
RU2406128C2
SYSTEMS AND METHODS FOR PREVENTION OF UNAUTHORIZED STACK PIVOTING 2014
  • Patel Bajdzhu V.
  • Li Syaonin
  • Envin Kh.P.
  • Mellik Asit K.
  • Nejdzher Gilbert
  • Krosslend Dzhejms B.
  • Opfermen Toubi
  • Kkhare Atul A.
  • Brendt Dzhejson V.
  • Kouk Dzhejms S.
  • Vajda Brajan L.
RU2629442C2
EVENT FILTERING FOR SECURITY APPLICATIONS OF VIRTUAL MACHINES 2017
  • Lutas Andrei-Vlad
RU2723668C1

RU 2 513 909 C1

Authors

Grajzentuehjt Richard Roj

Dates

2014-04-20Published

2010-12-16Filed