JP2013501300A5 - - Google Patents

Download PDF

Info

Publication number
JP2013501300A5
JP2013501300A5 JP2012523622A JP2012523622A JP2013501300A5 JP 2013501300 A5 JP2013501300 A5 JP 2013501300A5 JP 2012523622 A JP2012523622 A JP 2012523622A JP 2012523622 A JP2012523622 A JP 2012523622A JP 2013501300 A5 JP2013501300 A5 JP 2013501300A5
Authority
JP
Japan
Prior art keywords
identity
hypervisor
policy
user interface
driver shim
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
JP2012523622A
Other languages
English (en)
Japanese (ja)
Other versions
JP2013501300A (ja
JP5735509B2 (ja
Filing date
Publication date
Application filed filed Critical
Priority claimed from PCT/US2010/040334 external-priority patent/WO2011037665A2/en
Publication of JP2013501300A publication Critical patent/JP2013501300A/ja
Publication of JP2013501300A5 publication Critical patent/JP2013501300A5/ja
Application granted granted Critical
Publication of JP5735509B2 publication Critical patent/JP5735509B2/ja
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

JP2012523622A 2009-08-04 2010-06-29 マルウェアがある状態でユーザが検証可能な信頼性のあるパスを得るための方法および機器 Expired - Fee Related JP5735509B2 (ja)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US27344809P 2009-08-04 2009-08-04
US61/273,448 2009-08-04
PCT/US2010/040334 WO2011037665A2 (en) 2009-08-04 2010-06-29 Methods and apparatuses for user-verifiable trusted path in the presence of malware

Publications (3)

Publication Number Publication Date
JP2013501300A JP2013501300A (ja) 2013-01-10
JP2013501300A5 true JP2013501300A5 (enExample) 2013-08-15
JP5735509B2 JP5735509B2 (ja) 2015-06-17

Family

ID=43796427

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2012523622A Expired - Fee Related JP5735509B2 (ja) 2009-08-04 2010-06-29 マルウェアがある状態でユーザが検証可能な信頼性のあるパスを得るための方法および機器

Country Status (5)

Country Link
US (1) US8832778B2 (enExample)
EP (1) EP2462507B1 (enExample)
JP (1) JP5735509B2 (enExample)
DK (1) DK2462507T3 (enExample)
WO (1) WO2011037665A2 (enExample)

Families Citing this family (88)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011068996A1 (en) * 2009-12-04 2011-06-09 Cryptography Research, Inc. Verifiable, leak-resistant encryption and decryption
US8819225B2 (en) * 2010-11-15 2014-08-26 George Mason Research Foundation, Inc. Hardware-assisted integrity monitor
US9519600B2 (en) * 2011-03-04 2016-12-13 Microsoft Technology Licensing, Llc Driver shimming
WO2012122994A1 (en) * 2011-03-11 2012-09-20 Kreft Heinz Off-line transfer of electronic tokens between peer-devices
US9003363B2 (en) 2011-03-21 2015-04-07 Microsoft Technology Licensing, Llc Device flags
US8966642B2 (en) * 2011-04-05 2015-02-24 Assured Information Security, Inc. Trust verification of a computing platform using a peripheral device
US8983855B1 (en) 2011-05-16 2015-03-17 Mckesson Financial Holdings Systems and methods for evaluating adherence to a project control process
US8954747B2 (en) * 2011-07-01 2015-02-10 Intel Corporation Protecting keystrokes received from a keyboard in a platform containing embedded controllers
CN102231138B (zh) * 2011-07-08 2013-07-03 上海交通大学 计算机内存数据准确采集系统及获取方法
US8726337B1 (en) 2011-09-30 2014-05-13 Emc Corporation Computing with presentation layer for multiple virtual machines
US8683548B1 (en) 2011-09-30 2014-03-25 Emc Corporation Computing with policy engine for multiple virtual machines
US8953790B2 (en) * 2011-11-21 2015-02-10 Broadcom Corporation Secure generation of a device root key in the field
US8650645B1 (en) * 2012-03-29 2014-02-11 Mckesson Financial Holdings Systems and methods for protecting proprietary data
US20140281539A1 (en) * 2012-03-30 2014-09-18 Goldman, Sachs & Co. Secure Mobile Framework With Operating System Integrity Checking
EP2836968B1 (en) 2012-04-13 2020-05-06 OLogN Technologies AG Apparatuses, methods and systems for computer-based secure transactions
EP2836956B1 (en) 2012-04-13 2019-06-26 OLogN Technologies AG Secure zone for digital communications
TW201403375A (zh) 2012-04-20 2014-01-16 歐樂岡科技公司 用於安全購買之安全區
US9317687B2 (en) * 2012-05-21 2016-04-19 Mcafee, Inc. Identifying rootkits based on access permissions
US9152793B2 (en) * 2012-09-28 2015-10-06 Intel Corporation Methods, systems and apparatus to self authorize platform code
EP2973201A1 (en) * 2013-03-15 2016-01-20 Ologn Technologies AG Secure zone on a virtual machine for digital communications
EP2973180B1 (en) 2013-03-15 2020-01-15 OLogN Technologies AG Systems, methods and apparatuses for securely storing and providing payment information
CA2918596C (en) 2013-08-02 2023-03-07 Ologn Technologies Ag A secure server on a system with virtual machines
US9092631B2 (en) * 2013-10-16 2015-07-28 Battelle Memorial Institute Computer-implemented security evaluation methods, security evaluation systems, and articles of manufacture
US9998438B2 (en) 2013-10-23 2018-06-12 Microsoft Technology Licensing, Llc Verifying the security of a remote server
US9354818B2 (en) 2014-02-25 2016-05-31 Kabushiki Kaisha Toshiba Memory device and data storing method
US10002252B2 (en) 2014-07-01 2018-06-19 Fireeye, Inc. Verification of trusted threat-aware microvisor
US9680862B2 (en) * 2014-07-01 2017-06-13 Fireeye, Inc. Trusted threat-aware microvisor
US9678773B1 (en) 2014-09-30 2017-06-13 Amazon Technologies, Inc. Low latency computational capacity provisioning
US9600312B2 (en) 2014-09-30 2017-03-21 Amazon Technologies, Inc. Threading as a service
US9146764B1 (en) 2014-09-30 2015-09-29 Amazon Technologies, Inc. Processing event messages for user requests to execute program code
DE102014114899A1 (de) * 2014-10-14 2016-04-14 Infineon Technologies Ag Verfahren und Vorrichtung zur Nutzung in einem Datenverarbeitungssystem
US9507951B2 (en) * 2014-10-20 2016-11-29 Intel Corporation Technologies for secure input and display of virtual touch user interfaces
US9537788B2 (en) 2014-12-05 2017-01-03 Amazon Technologies, Inc. Automatic determination of resource sizing
US10230693B2 (en) 2015-01-29 2019-03-12 WebCloak, LLC Safechannel encrypted messaging system
US9733967B2 (en) 2015-02-04 2017-08-15 Amazon Technologies, Inc. Security protocols for low latency execution of program code
US9588790B1 (en) 2015-02-04 2017-03-07 Amazon Technologies, Inc. Stateful virtual compute system
US9613198B2 (en) * 2015-03-30 2017-04-04 Honeywell International Inc. Apparatus and method for intelligent video surveillance of industrial console operations
US10216927B1 (en) 2015-06-30 2019-02-26 Fireeye, Inc. System and method for protecting memory pages associated with a process using a virtualization layer
US10642753B1 (en) 2015-06-30 2020-05-05 Fireeye, Inc. System and method for protecting a software component running in virtual machine using a virtualization layer
US10726127B1 (en) 2015-06-30 2020-07-28 Fireeye, Inc. System and method for protecting a software component running in a virtual machine through virtual interrupts by the virtualization layer
US11113086B1 (en) 2015-06-30 2021-09-07 Fireeye, Inc. Virtual system and method for securing external network connectivity
US10395029B1 (en) 2015-06-30 2019-08-27 Fireeye, Inc. Virtual system and method with threat protection
US10110566B2 (en) 2015-07-21 2018-10-23 Baffle, Inc. Systems and processes for executing private programs on untrusted computers
US10033759B1 (en) 2015-09-28 2018-07-24 Fireeye, Inc. System and method of threat detection under hypervisor control
US10769312B2 (en) 2015-10-06 2020-09-08 Carnegie Mellon University Method and apparatus for trusted display on untrusted computing platforms to secure applications
JP2017107377A (ja) * 2015-12-09 2017-06-15 株式会社リコー 機器管理装置、機器管理システム、検証方法及びプログラム
KR20170091951A (ko) 2016-02-02 2017-08-10 에스프린팅솔루션 주식회사 전자 디바이스에게 보안을 제공하기 위한 방법 및 장치
US10037201B2 (en) * 2016-02-26 2018-07-31 Dell Products L.P. Secure live media boot system
US11132213B1 (en) 2016-03-30 2021-09-28 Amazon Technologies, Inc. Dependency-based process of pre-existing data sets at an on demand code execution environment
US10528739B2 (en) * 2016-04-20 2020-01-07 Sophos Limited Boot security
US10135622B2 (en) * 2016-06-03 2018-11-20 Intel Corporation Flexible provisioning of attestation keys in secure enclaves
US10102040B2 (en) 2016-06-29 2018-10-16 Amazon Technologies, Inc Adjusting variable limit on concurrent code executions
US10025691B1 (en) 2016-09-09 2018-07-17 Fireeye, Inc. Verification of complex software code using a modularized architecture
US10592678B1 (en) 2016-09-09 2020-03-17 Fireeye, Inc. Secure communications between peers using a verified virtual trusted platform module
US10621351B2 (en) 2016-11-01 2020-04-14 Raptor Engineering, LLC. Systems and methods for tamper-resistant verification of firmware with a trusted platform module
US10467082B2 (en) * 2016-12-09 2019-11-05 Microsoft Technology Licensing, Llc Device driver verification
US10839080B2 (en) * 2017-09-01 2020-11-17 Microsoft Technology Licensing, Llc Hardware-enforced firmware security
US10719604B2 (en) * 2018-01-30 2020-07-21 Hewlett Packard Enterprise Development Lp Baseboard management controller to perform security action based on digital signature comparison in response to trigger
US10853115B2 (en) 2018-06-25 2020-12-01 Amazon Technologies, Inc. Execution of auxiliary functions in an on-demand network code execution system
US11146569B1 (en) * 2018-06-28 2021-10-12 Amazon Technologies, Inc. Escalation-resistant secure network services using request-scoped authentication information
US11099870B1 (en) 2018-07-25 2021-08-24 Amazon Technologies, Inc. Reducing execution times in an on-demand network code execution system using saved machine states
US11243953B2 (en) 2018-09-27 2022-02-08 Amazon Technologies, Inc. Mapreduce implementation in an on-demand network code execution system and stream data processing system
US11099917B2 (en) 2018-09-27 2021-08-24 Amazon Technologies, Inc. Efficient state maintenance for execution environments in an on-demand code execution system
US11943093B1 (en) 2018-11-20 2024-03-26 Amazon Technologies, Inc. Network connection recovery after virtual machine transition in an on-demand network code execution system
US11010188B1 (en) 2019-02-05 2021-05-18 Amazon Technologies, Inc. Simulated data object storage using on-demand computation of data objects
US20220156390A1 (en) * 2019-03-06 2022-05-19 NEC Laboratories Europe GmbH Method and system for performing remote attestation with a gateway in the context of a trusted execution environment (tee)
US12327133B1 (en) 2019-03-22 2025-06-10 Amazon Technologies, Inc. Application gateways in an on-demand network code execution system
US11861386B1 (en) 2019-03-22 2024-01-02 Amazon Technologies, Inc. Application gateways in an on-demand network code execution system
US11119809B1 (en) 2019-06-20 2021-09-14 Amazon Technologies, Inc. Virtualization-based transaction handling in an on-demand network code execution system
US11190609B2 (en) 2019-06-28 2021-11-30 Amazon Technologies, Inc. Connection pooling for scalable network services
US11159528B2 (en) 2019-06-28 2021-10-26 Amazon Technologies, Inc. Authentication to network-services using hosted authentication information
US11714895B2 (en) * 2019-07-18 2023-08-01 Anjuna Security, Inc. Secure runtime systems and methods
AU2020352532B2 (en) * 2019-09-25 2023-06-01 Shift5, Inc. Passive monitoring and prevention of unauthorized firmware or software upgrades between computing devices
US11119826B2 (en) 2019-11-27 2021-09-14 Amazon Technologies, Inc. Serverless call distribution to implement spillover while avoiding cold starts
US11714682B1 (en) 2020-03-03 2023-08-01 Amazon Technologies, Inc. Reclaiming computing resources in an on-demand code execution system
US11754858B2 (en) 2020-04-30 2023-09-12 Coopervision International Limited Multifocal ophthalmic lens and related methods
US11269637B2 (en) * 2020-07-23 2022-03-08 Hewlett Packard Enterprise Development Lp Validating machine-readable instructions using an iterative validation process
US11550713B1 (en) 2020-11-25 2023-01-10 Amazon Technologies, Inc. Garbage collection in distributed systems using life cycled storage roots
US11593270B1 (en) 2020-11-25 2023-02-28 Amazon Technologies, Inc. Fast distributed caching using erasure coded object parts
US11089051B1 (en) * 2021-02-15 2021-08-10 Theta Labs, Inc. Preventing denial-of-service attacks in decentralized edge networks using verifiable delay functions (VDFs)
US11388210B1 (en) 2021-06-30 2022-07-12 Amazon Technologies, Inc. Streaming analytics using a serverless compute system
WO2023027687A1 (en) * 2021-08-23 2023-03-02 Hewlett-Packard Development Company, L.P. Hashes to control code execution
US11968280B1 (en) 2021-11-24 2024-04-23 Amazon Technologies, Inc. Controlling ingestion of streaming data to serverless function executions
US12015603B2 (en) 2021-12-10 2024-06-18 Amazon Technologies, Inc. Multi-tenant mode for serverless code execution
US12463972B2 (en) 2023-04-17 2025-11-04 Bank Of America Corporation System and method to identify and reverse tampering of virtual images
US12381878B1 (en) 2023-06-27 2025-08-05 Amazon Technologies, Inc. Architecture for selective use of private paths between cloud services
US12476978B2 (en) 2023-09-29 2025-11-18 Amazon Technologies, Inc. Management of computing services for applications composed of service virtual computing components
CN120196092B (zh) * 2025-05-26 2025-07-29 西安热工研究院有限公司 用于可信控制器的静态可信验证功能测试方法及相关装置

Family Cites Families (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4945468A (en) * 1988-02-01 1990-07-31 International Business Machines Corporation Trusted path mechanism for virtual terminal environments
US7350204B2 (en) * 2000-07-24 2008-03-25 Microsoft Corporation Policies for secure software execution
US7529754B2 (en) * 2003-03-14 2009-05-05 Websense, Inc. System and method of monitoring and controlling application files
JP2007226277A (ja) * 2004-04-02 2007-09-06 Matsushita Electric Ind Co Ltd 仮想マシン改ざん検査方法、および仮想マシン改ざん検査装置
US7721094B2 (en) 2005-05-06 2010-05-18 Microsoft Corporation Systems and methods for determining if applications executing on a computer system are trusted
US7565535B2 (en) 2005-05-06 2009-07-21 Microsoft Corporation Systems and methods for demonstrating authenticity of a virtual machine using a security image
CN100437502C (zh) * 2005-12-30 2008-11-26 联想(北京)有限公司 基于安全芯片的防病毒方法
US7712143B2 (en) * 2006-09-27 2010-05-04 Blue Ridge Networks, Inc. Trusted enclave for a computer system
US7913292B2 (en) * 2006-10-18 2011-03-22 Microsoft Corporation Identification and visualization of trusted user interface objects
JP4998019B2 (ja) * 2007-03-06 2012-08-15 富士通株式会社 状態表示制御装置
GB0707150D0 (en) * 2007-04-13 2007-05-23 Hewlett Packard Development Co Dynamic trust management
JP2009003853A (ja) * 2007-06-25 2009-01-08 Panasonic Corp 複数のソフトウェアを正しい順番で起動する情報端末およびセキュリティモジュール
US8204225B2 (en) * 2007-07-23 2012-06-19 Savi Technology, Inc. Method and apparatus for providing security in a radio frequency identification system
US8374354B2 (en) * 2007-09-27 2013-02-12 Verizon Data Services Llc System and method to pass a private encryption key
US8819676B2 (en) * 2007-10-30 2014-08-26 Vmware, Inc. Transparent memory-mapped emulation of I/O calls
US20090133097A1 (en) * 2007-11-15 2009-05-21 Ned Smith Device, system, and method for provisioning trusted platform module policies to a virtual machine monitor
US8321931B2 (en) * 2008-03-31 2012-11-27 Intel Corporation Method and apparatus for sequential hypervisor invocation
US8578374B2 (en) * 2009-07-16 2013-11-05 Ca, Inc. System and method for managing virtual machines

Similar Documents

Publication Publication Date Title
JP2013501300A5 (enExample)
CN107113284B (zh) 针对可迁移虚拟机的可信计算基证据绑定
JP6044362B2 (ja) 仮想マシン内でトラストチェーンを構築する方法
US8516481B2 (en) Virtual machine manager system and methods
CN103270518B (zh) 虚拟机验证系统及其方法
US9280659B2 (en) Methods and apparatus for remeasuring a virtual machine monitor
CN103927490A (zh) 操作系统安全启动方法及装置
US20150135311A1 (en) Virtual machine validation
US20090172378A1 (en) Method and system for using a trusted disk drive and alternate master boot record for integrity services during the boot of a computing platform
US11663017B2 (en) Kernel space measurement
JP6029553B2 (ja) 車両制御装置
US11068275B2 (en) Providing a trustworthy indication of the current state of a multi-processor data processing apparatus
CN111523112A (zh) 一种服务器安全启动方法、装置、设备及介质
EP3588355B1 (en) Information processing apparatus for detecting tampering with software executed at boot time, method for rebooting information processing apparatus, storage medium, and program
JP2016057969A (ja) プログラム検査装置、ソフトウェア検査装置、sat制約条件データ、記憶媒体
CN104268461B (zh) 一种可信度量方法及装置
US10025925B2 (en) Dynamically measuring the integrity of a computing apparatus
US9104863B2 (en) Method and apparatus to harden a software execution in random access memory
US10686812B2 (en) Device and method for detecting manipulation of a program code
Kyte et al. Enhanced side-channel analysis method to detect hardware virtualization based rootkits
JP2014038613A5 (enExample)
JP6094387B2 (ja) 制御装置
CN108132828B (zh) 基于libvirt实现的虚拟机构建方法、装置及设备
LeMay Compact integrity-aware architectures
Tian et al. A dynamic trusted measuring model based on optimum cycle