BR112018010437A8 - proteção do código básico de entrada/saída (bios) - Google Patents

proteção do código básico de entrada/saída (bios)

Info

Publication number
BR112018010437A8
BR112018010437A8 BR112018010437A BR112018010437A BR112018010437A8 BR 112018010437 A8 BR112018010437 A8 BR 112018010437A8 BR 112018010437 A BR112018010437 A BR 112018010437A BR 112018010437 A BR112018010437 A BR 112018010437A BR 112018010437 A8 BR112018010437 A8 BR 112018010437A8
Authority
BR
Brazil
Prior art keywords
bios
relocation
variables
handlers
code
Prior art date
Application number
BR112018010437A
Other languages
English (en)
Other versions
BR112018010437A2 (pt
Inventor
M Barlow Dallas
Kevin Jeansonne Jeffrey
Ze Liu Wei
Original Assignee
Hewlett Packard Development Co
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hewlett Packard Development Co filed Critical Hewlett Packard Development Co
Publication of BR112018010437A2 publication Critical patent/BR112018010437A2/pt
Publication of BR112018010437A8 publication Critical patent/BR112018010437A8/pt

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/572Secure firmware programming, e.g. of basic input output system [BIOS]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/575Secure boot
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2151Time stamp

Abstract

trata-se de um método de proteção do código de sistema básico de entrada/saída (bios). o método inclui, com uma ferramenta de informações de realocação executada por um processador, refatorar diversas seções de dados dentro de diversos manipuladores do código de bios para etiquetar diversas variáveis dentro dos manipuladores. as etiquetas indicam quais variáveis devem ser protegidas no tempo de execução. o método inclui adicionalmente gerar um arquivo de realocação que compreende diversos endereços de realocação que identificam as localizações de diversas variáveis dinâmicas que mudam no tempo de execução. os endereços de realocação apontam para uma localização dentro dos manipuladores diferente de uma localização original. o método inclui adicionalmente, com um carregador, carregar o arquivo de realocação no tempo de execução como parte de uma imagem de firmware de bios e ajustar o acesso de dados às variáveis dinâmicas no código de manipulador para identificar a localização das variáveis dinâmicas com base no arquivo de realocação.
BR112018010437A 2016-01-25 2016-01-25 proteção do código básico de entrada/saída (bios) BR112018010437A8 (pt)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/US2016/014774 WO2017131621A1 (en) 2016-01-25 2016-01-25 Protecting basic input/output (bios) code

Publications (2)

Publication Number Publication Date
BR112018010437A2 BR112018010437A2 (pt) 2018-11-21
BR112018010437A8 true BR112018010437A8 (pt) 2019-02-26

Family

ID=59398328

Family Applications (1)

Application Number Title Priority Date Filing Date
BR112018010437A BR112018010437A8 (pt) 2016-01-25 2016-01-25 proteção do código básico de entrada/saída (bios)

Country Status (5)

Country Link
US (1) US10296353B2 (pt)
EP (1) EP3314514B1 (pt)
CN (1) CN108369520B (pt)
BR (1) BR112018010437A8 (pt)
WO (1) WO2017131621A1 (pt)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10528739B2 (en) * 2016-04-20 2020-01-07 Sophos Limited Boot security
US20190044809A1 (en) * 2017-08-30 2019-02-07 Intel Corporation Technologies for managing a flexible host interface of a network interface controller
GB2566296B (en) 2017-09-07 2019-11-27 Arm Ip Ltd Methods and apparatus for defending against memory-related attacks on devices
CN109714303B (zh) 2017-10-25 2022-05-27 阿里巴巴集团控股有限公司 Bios启动方法及数据处理方法
CN109710315B (zh) 2017-10-25 2022-05-10 阿里巴巴集团控股有限公司 Bios刷写方法及bios镜像文件的处理方法
JP7179482B2 (ja) * 2018-04-19 2022-11-29 キヤノン株式会社 情報処理装置、制御方法、およびそのプログラム
WO2021154297A1 (en) * 2020-01-31 2021-08-05 Hewlett-Packard Development Company, L.P. Access filter for bios variables
US20200257521A1 (en) * 2020-02-13 2020-08-13 Intel Corporation Update of boot code handlers
CN112463431B (zh) * 2020-12-11 2022-07-19 苏州浪潮智能科技有限公司 一种bios错误定位方法、装置、设备及存储介质
TWI758026B (zh) * 2020-12-23 2022-03-11 神雲科技股份有限公司 基本輸入輸出系統功能的設定方法
CN113127844A (zh) * 2021-03-24 2021-07-16 山东英信计算机技术有限公司 一种变量访问方法、装置、系统、设备和介质

Family Cites Families (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6122732A (en) * 1998-10-23 2000-09-19 Compaq Computer Corporation System management interrupt for a desktop management interface/system management basic input output system interface function
US6081890A (en) * 1998-11-30 2000-06-27 Intel Corporation Method of communication between firmware written for different instruction set architectures
US6928548B1 (en) * 2000-09-29 2005-08-09 Intel Corporation System and method for verifying the integrity of stored information within an electronic device
US6848046B2 (en) * 2001-05-11 2005-01-25 Intel Corporation SMM loader and execution mechanism for component software for multiple architectures
US6775728B2 (en) * 2001-11-15 2004-08-10 Intel Corporation Method and system for concurrent handler execution in an SMI and PMI-based dispatch-execution framework
US20040064712A1 (en) * 2002-09-27 2004-04-01 Intel Corporation Systems and methods for protecting media content
CN1940802A (zh) * 2005-09-30 2007-04-04 鸿富锦精密工业(深圳)有限公司 解除基本输入/输出系统写保护的系统及方法
US7584374B2 (en) * 2006-03-07 2009-09-01 Intel Corporation Driver/variable cache and batch reading system and method for fast resume
US7596648B2 (en) * 2007-03-08 2009-09-29 Dell Products L.P. System and method for information handling system error recovery
US8185353B2 (en) * 2008-04-08 2012-05-22 Microsoft Corporation Determining computer system usage from logged events
CN101373441B (zh) * 2008-09-19 2012-04-18 苏州壹世通科技有限公司 一种基于固件的虚拟化平台系统
US8151027B2 (en) * 2009-04-08 2012-04-03 Intel Corporation System management mode inter-processor interrupt redirection
JP5335634B2 (ja) 2009-09-29 2013-11-06 レノボ・シンガポール・プライベート・リミテッド システム管理モードの特権レベルを保護するコンピュータ
US8407322B1 (en) * 2010-08-24 2013-03-26 Adobe Systems Incorporated Runtime negotiation of execution blocks between computers
US9015455B2 (en) * 2011-07-07 2015-04-21 Intel Corporation Processsor integral technologies for BIOS flash attack protection and notification
WO2014175864A1 (en) * 2013-04-23 2014-10-30 Hewlett-Packard Development Company, L.P. Event data structure to store event data
CN104881611B (zh) * 2014-02-28 2017-11-24 国际商业机器公司 保护软件产品中的敏感数据的方法和装置
CN104572168B (zh) * 2014-09-10 2018-06-05 中电科技(北京)有限公司 一种bios自更新保护系统及方法

Also Published As

Publication number Publication date
CN108369520A (zh) 2018-08-03
US10296353B2 (en) 2019-05-21
BR112018010437A2 (pt) 2018-11-21
EP3314514A4 (en) 2019-01-16
CN108369520B (zh) 2022-03-08
EP3314514A1 (en) 2018-05-02
WO2017131621A1 (en) 2017-08-03
US20180321947A1 (en) 2018-11-08
EP3314514B1 (en) 2020-01-22

Similar Documents

Publication Publication Date Title
BR112018010437A8 (pt) proteção do código básico de entrada/saída (bios)
BR112020023410A2 (pt) Gerenciamento de objetos de dados para estruturas de dados com base em grafo
BRPI1013789A8 (pt) Sistema de computador compreendendo um sistema de arquivo e método de nomear e armazenar um arquivo em um ou mais dispositivos de armazenamento de computador
BR112019001479A2 (pt) detecção baseada em núcleo de funcionalidade de aplicação alvo utilizando mapeamento de endereços virtuais
BR112021026765A2 (pt) Interface multimodal de usuário
BR112016024774A2 (pt) sistema de criação de website implementável em um dispositivo de computação, e método implementável em um dispositivo de computação
BR112017011046A2 (pt) geração de sugestões de navega¬dor com base em dados de dispositvo da internet das coisas
BR112017021986A2 (pt) sistema e método para extrair e compartilhar dados de usuário relacionados com aplicativo
BR112016024522A2 (pt) meio de armazenamento legível por computador não transitório, e, método
BRPI0503688A (pt) método para proporcionar remendos para software
BR112015004684A2 (pt) geração de código nativo a partir de código de linguagem intermediária para um aplicativo
JP2015524126A5 (pt)
BR112016021725A2 (pt) Apoio de comportamento dinâmico em programas estatisticamente compilados
BR112017022902A2 (pt) técnicas para gerenciar marcadores para arquivos de mídia
BR112022000200A2 (pt) Preservação de dados usando ordem de liberação de abertura de memória
BR112014026747A2 (pt) identificação de conjuntos de parâmetro em arquivos de vídeo
BR112015029955A2 (pt) carga de largura parcial dependente de modo para pro-cessadores registradores mais amplos, métodos e siste-mas
WO2014194237A3 (en) Systems and methods for remote analysis of software applications
US20160378679A1 (en) Technologies for position-independent persistent memory pointers
US20200125378A1 (en) Applying security mitigation measures for stack corruption exploitation in intermediate code files
Sabanal Hiding behind ART
US10685298B2 (en) Mobile application compatibility testing
GB2603444A (en) Enhancing memory safe programming using page frame tag mechanism
BR112017014399A2 (pt) aparelhos, métodos e sistemas de processamento de cubo de criptografia de múltiplas partes
US9678886B2 (en) Processing page fault exceptions in supervisory software when accessing strings and similar data structures using normal load instructions

Legal Events

Date Code Title Description
B06U Preliminary requirement: requests with searches performed by other patent offices: procedure suspended [chapter 6.21 patent gazette]
B25G Requested change of headquarter approved

Owner name: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. (US)

B350 Update of information on the portal [chapter 15.35 patent gazette]
B07A Application suspended after technical examination (opinion) [chapter 7.1 patent gazette]
B09B Patent application refused [chapter 9.2 patent gazette]