WO2016159812A1 - Procédé pour améliorer la résistance d'un ordinateur contre les attaques de hackers - Google Patents

Procédé pour améliorer la résistance d'un ordinateur contre les attaques de hackers Download PDF

Info

Publication number
WO2016159812A1
WO2016159812A1 PCT/RU2015/000201 RU2015000201W WO2016159812A1 WO 2016159812 A1 WO2016159812 A1 WO 2016159812A1 RU 2015000201 W RU2015000201 W RU 2015000201W WO 2016159812 A1 WO2016159812 A1 WO 2016159812A1
Authority
WO
WIPO (PCT)
Prior art keywords
memory
computer
data
session
commands
Prior art date
Application number
PCT/RU2015/000201
Other languages
English (en)
Russian (ru)
Inventor
Валерий Аркадьевич КОНЯВСКИЙ
Original Assignee
Валерий Аркадьевич КОНЯВСКИЙ
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Валерий Аркадьевич КОНЯВСКИЙ filed Critical Валерий Аркадьевич КОНЯВСКИЙ
Priority to PCT/RU2015/000201 priority Critical patent/WO2016159812A1/fr
Publication of WO2016159812A1 publication Critical patent/WO2016159812A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data

Definitions

  • the invention relates to the field of informatics and computer engineering and can be used in computers and similar technical means (tablets, smartphones, etc.), built mainly on the so-called.
  • "Harvard architecture” with the separation of data streams and commands.
  • SUBSTITUTE SHEET (RULE 26) it is advisable to decide on a universal computer, the inalienable ability of which to read and write information that makes the copy operation immanent, contradicts, at least, the information protection requirements.
  • SUBSTITUTE SHEET while ensuring the movement of commands and data in only one direction — from memory to the processor — in particular, by setting the RO (Read Only) mode for at least a portion of the data memory and / or computer command memory.
  • RO Read Only
  • EPROM critical data-saving reprogrammable memory device
  • this element can be a mechanical switch that allows blocking data recording in the EPROM (set it to RO mode), which is located inside the computer case [3]; for computers with wider functionalities, a switch that prohibits (in another position, permits) writing to the EPROM can be electronic, generating a control signal from data coming from the outside (with a preliminary check of the validity of these data) [4]; if the computer is designed to operate under the control of two or more operating systems (of which at least one is trusted), then, along with a switch of the closing type, a switch type switch is installed [5], etc.
  • This (essentially dynamically changing) architecture of a computer really increases its resistance to hacker attacks, since malware will not be fixed.
  • the objective of the invention is to overcome this drawback of the known method of increasing the computer's resistance to hacker attacks, as a result of which the functionality of a computer protected by a new method is expanded - it makes it possible to use all previously developed software without modifications.
  • the area (s) of the session memory can be placed, in particular, in the computer's RAM. Such a solution is advisable when other types of computer memory (in particular, long-term) have insufficient speed, and placing the areas of session memory in them can lead to a significant decrease in its performance.
  • the area (s) of the session memory can be allocated in its external (long-term) memory, especially if it is required to store a large amount of information in it.
  • the algorithm for accessing data (commands) stored in the session memory regardless of where it is physically located — can be set similar to the algorithm for accessing data (commands) stored in the computer’s RAM. This option is advisable when the amount of information stored in it is not too large, and / or the speed of accessing the external (long-term) memory is significantly lower.
  • the algorithm for accessing data (commands) stored in the session memory of a computer can be set similar to the algorithm for accessing data (commands) stored in its external (long-term) memory.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Storage Device Security (AREA)

Abstract

Le domaine d'utilisation de l'invention couvre les ordinateur et les moyens techniques y associés (tablettes, ordiphones, etc.) conçus selon le procédé "architecture de Harvard" qui prévoit la séparation des données et des commandes. Elle concerne les procédés utilisant le mode RO (Read Only - lecture seule) pour au moins une partie des données et/ou de la mémoire des commandes ordinateur. Le but de l'invention consiste à élargir les fonctionnalités d'un ordinateur protégé par ce procédé et notamment la possibilité d'utiliser l'ordinateur sans devoir mettre à niveau pratiquement toutes les applications utilisant les opération d'écriture en mémoire; le but est atteint en ce que l'on isole dans la mémoire d'ordinateur au moins une partie destinée au stockage de données pour le stockage de données et/ou de commandes pendant une session de travail (mémoire de session) pour laquelle on fixe un mode RW (Read and Write - lecture et écriture).
PCT/RU2015/000201 2015-03-30 2015-03-30 Procédé pour améliorer la résistance d'un ordinateur contre les attaques de hackers WO2016159812A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/RU2015/000201 WO2016159812A1 (fr) 2015-03-30 2015-03-30 Procédé pour améliorer la résistance d'un ordinateur contre les attaques de hackers

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/RU2015/000201 WO2016159812A1 (fr) 2015-03-30 2015-03-30 Procédé pour améliorer la résistance d'un ordinateur contre les attaques de hackers

Publications (1)

Publication Number Publication Date
WO2016159812A1 true WO2016159812A1 (fr) 2016-10-06

Family

ID=57006201

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/RU2015/000201 WO2016159812A1 (fr) 2015-03-30 2015-03-30 Procédé pour améliorer la résistance d'un ordinateur contre les attaques de hackers

Country Status (1)

Country Link
WO (1) WO2016159812A1 (fr)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001075595A2 (fr) * 2000-03-31 2001-10-11 Intel Corporation Commande d'acces a une memoire isolee, par utilisation d'une unite de commande de memoire pour une execution isolee
RU118773U1 (ru) * 2012-04-18 2012-07-27 Закрытое акционерное общество "Особое Конструкторское Бюро Систем Автоматизированного Проектирования" Компьютер типа "тонкий клиент" с аппаратной защитой данных
RU123571U1 (ru) * 2012-08-14 2012-12-27 Валерий Аркадьевич Конявский Съемный носитель информации с безопасным управлением доступом

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001075595A2 (fr) * 2000-03-31 2001-10-11 Intel Corporation Commande d'acces a une memoire isolee, par utilisation d'une unite de commande de memoire pour une execution isolee
RU118773U1 (ru) * 2012-04-18 2012-07-27 Закрытое акционерное общество "Особое Конструкторское Бюро Систем Автоматизированного Проектирования" Компьютер типа "тонкий клиент" с аппаратной защитой данных
RU123571U1 (ru) * 2012-08-14 2012-12-27 Валерий Аркадьевич Конявский Съемный носитель информации с безопасным управлением доступом

Similar Documents

Publication Publication Date Title
RU2627107C2 (ru) Профилирование выполнения кода
JP6282305B2 (ja) ハイパーバイザモードにおけるコードの安全な実行システムおよび方法
US9565214B2 (en) Real-time module protection
EP3779745B1 (fr) Authentification de pointeur code pour commande de flux de matériel
US9262246B2 (en) System and method for securing memory and storage of an electronic device with a below-operating system security agent
JP7175549B2 (ja) 潜在的に悪意のあるコードを検出するためのトラップ・アドレス範囲を生成するために、プログラムを実行するプロセスの実行パスへのトラップ・コードの投入
US20120255011A1 (en) Systems and methods for identifying hidden processes
EP3283995B1 (fr) Procédé et système de protection de systèmes informatisés à partir d'un code malveillant au moyen d'instructions mutables
CN109558372B (zh) 用于安全处理器的设备和方法
US9165141B2 (en) Systems and methods for providing anti-malware protection and malware forensics on storage devices
CN111241604A (zh) 与用于存储器安全的存储器停用有关的设备和方法
WO2016159812A1 (fr) Procédé pour améliorer la résistance d'un ordinateur contre les attaques de hackers
KR102022626B1 (ko) 로그 분석을 이용한 공격 탐지 장치 및 방법
Tychalas et al. Special session: Potentially leaky controller: Examining cache side-channel attacks in programmable logic controllers
KR101986028B1 (ko) 코드 포인터 보수를 사용하여 프로세싱 흐름에 대한 공격에 대해 장치를 보호하기 위한 시스템 및 방법
US10019576B1 (en) Security control system for protection of multi-core processors
US11588848B2 (en) System and method for suspending a computing device suspected of being infected by a malicious code using a kill switch button
US10990664B2 (en) Eliminating and reporting kernel instruction alteration
US20170109526A1 (en) Systems and methods for providing anti-malware protection and malware forensics on storage devices
KR102388797B1 (ko) 하드웨어 보안칩을 이용한 하드웨어 제어 장치
KR20200020077A (ko) 머신러닝을 이용한 개인정보 검출방법
TR201607717A2 (tr) Yazilimlarin saldirilara karşi korunabi̇lmesi̇ i̇çi̇n kullanilabi̇len kontrol akişina bağli öz şi̇freleme yöntemi̇

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15887910

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15887910

Country of ref document: EP

Kind code of ref document: A1