JP5735509B2 - マルウェアがある状態でユーザが検証可能な信頼性のあるパスを得るための方法および機器 - Google Patents

マルウェアがある状態でユーザが検証可能な信頼性のあるパスを得るための方法および機器 Download PDF

Info

Publication number
JP5735509B2
JP5735509B2 JP2012523622A JP2012523622A JP5735509B2 JP 5735509 B2 JP5735509 B2 JP 5735509B2 JP 2012523622 A JP2012523622 A JP 2012523622A JP 2012523622 A JP2012523622 A JP 2012523622A JP 5735509 B2 JP5735509 B2 JP 5735509B2
Authority
JP
Japan
Prior art keywords
identity
hypervisor
policy
user interface
driver shim
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
JP2012523622A
Other languages
English (en)
Japanese (ja)
Other versions
JP2013501300A (ja
JP2013501300A5 (enExample
Inventor
エム. マキューン、ジョナサン
エム. マキューン、ジョナサン
エム. ペリグ、エイドリアン
エム. ペリグ、エイドリアン
ダッタ、アヌパム
ドリン ギルゴー、バージル
ドリン ギルゴー、バージル
ク、ニン
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Carnegie Mellon University
Original Assignee
Carnegie Mellon University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Carnegie Mellon University filed Critical Carnegie Mellon University
Publication of JP2013501300A publication Critical patent/JP2013501300A/ja
Publication of JP2013501300A5 publication Critical patent/JP2013501300A5/ja
Application granted granted Critical
Publication of JP5735509B2 publication Critical patent/JP5735509B2/ja
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/85Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
JP2012523622A 2009-08-04 2010-06-29 マルウェアがある状態でユーザが検証可能な信頼性のあるパスを得るための方法および機器 Expired - Fee Related JP5735509B2 (ja)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US27344809P 2009-08-04 2009-08-04
US61/273,448 2009-08-04
PCT/US2010/040334 WO2011037665A2 (en) 2009-08-04 2010-06-29 Methods and apparatuses for user-verifiable trusted path in the presence of malware

Publications (3)

Publication Number Publication Date
JP2013501300A JP2013501300A (ja) 2013-01-10
JP2013501300A5 JP2013501300A5 (enExample) 2013-08-15
JP5735509B2 true JP5735509B2 (ja) 2015-06-17

Family

ID=43796427

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2012523622A Expired - Fee Related JP5735509B2 (ja) 2009-08-04 2010-06-29 マルウェアがある状態でユーザが検証可能な信頼性のあるパスを得るための方法および機器

Country Status (5)

Country Link
US (1) US8832778B2 (enExample)
EP (1) EP2462507B1 (enExample)
JP (1) JP5735509B2 (enExample)
DK (1) DK2462507T3 (enExample)
WO (1) WO2011037665A2 (enExample)

Families Citing this family (88)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5552541B2 (ja) * 2009-12-04 2014-07-16 クリプトグラフィ リサーチ, インコーポレイテッド 検証可能な耐漏洩性暗号化および復号化
US8819225B2 (en) * 2010-11-15 2014-08-26 George Mason Research Foundation, Inc. Hardware-assisted integrity monitor
US9519600B2 (en) * 2011-03-04 2016-12-13 Microsoft Technology Licensing, Llc Driver shimming
WO2012122994A1 (en) * 2011-03-11 2012-09-20 Kreft Heinz Off-line transfer of electronic tokens between peer-devices
US9003363B2 (en) 2011-03-21 2015-04-07 Microsoft Technology Licensing, Llc Device flags
WO2012138551A1 (en) * 2011-04-05 2012-10-11 Assured Information Security, Inc. Trust verification of a computing platform using a peripheral device
US8983855B1 (en) 2011-05-16 2015-03-17 Mckesson Financial Holdings Systems and methods for evaluating adherence to a project control process
US8954747B2 (en) * 2011-07-01 2015-02-10 Intel Corporation Protecting keystrokes received from a keyboard in a platform containing embedded controllers
CN102231138B (zh) * 2011-07-08 2013-07-03 上海交通大学 计算机内存数据准确采集系统及获取方法
US8683548B1 (en) 2011-09-30 2014-03-25 Emc Corporation Computing with policy engine for multiple virtual machines
US8726337B1 (en) 2011-09-30 2014-05-13 Emc Corporation Computing with presentation layer for multiple virtual machines
US8953790B2 (en) * 2011-11-21 2015-02-10 Broadcom Corporation Secure generation of a device root key in the field
US8650645B1 (en) * 2012-03-29 2014-02-11 Mckesson Financial Holdings Systems and methods for protecting proprietary data
US20140281539A1 (en) * 2012-03-30 2014-09-18 Goldman, Sachs & Co. Secure Mobile Framework With Operating System Integrity Checking
EP2836956B1 (en) 2012-04-13 2019-06-26 OLogN Technologies AG Secure zone for digital communications
TW201407412A (zh) 2012-04-13 2014-02-16 歐樂岡科技公司 基於電腦之安全交易之裝置、方法與系統
TW201403375A (zh) 2012-04-20 2014-01-16 歐樂岡科技公司 用於安全購買之安全區
US9317687B2 (en) * 2012-05-21 2016-04-19 Mcafee, Inc. Identifying rootkits based on access permissions
US9152793B2 (en) * 2012-09-28 2015-10-06 Intel Corporation Methods, systems and apparatus to self authorize platform code
EP2973180B1 (en) 2013-03-15 2020-01-15 OLogN Technologies AG Systems, methods and apparatuses for securely storing and providing payment information
EP2973201A1 (en) * 2013-03-15 2016-01-20 Ologn Technologies AG Secure zone on a virtual machine for digital communications
EP3028210B1 (en) 2013-08-02 2020-01-08 OLogN Technologies AG Secure server in a system with virtual machines
US9092631B2 (en) * 2013-10-16 2015-07-28 Battelle Memorial Institute Computer-implemented security evaluation methods, security evaluation systems, and articles of manufacture
US9998438B2 (en) 2013-10-23 2018-06-12 Microsoft Technology Licensing, Llc Verifying the security of a remote server
US9354818B2 (en) 2014-02-25 2016-05-31 Kabushiki Kaisha Toshiba Memory device and data storing method
US9680862B2 (en) * 2014-07-01 2017-06-13 Fireeye, Inc. Trusted threat-aware microvisor
US10002252B2 (en) * 2014-07-01 2018-06-19 Fireeye, Inc. Verification of trusted threat-aware microvisor
US9600312B2 (en) 2014-09-30 2017-03-21 Amazon Technologies, Inc. Threading as a service
US9678773B1 (en) 2014-09-30 2017-06-13 Amazon Technologies, Inc. Low latency computational capacity provisioning
US9146764B1 (en) 2014-09-30 2015-09-29 Amazon Technologies, Inc. Processing event messages for user requests to execute program code
DE102014114899A1 (de) * 2014-10-14 2016-04-14 Infineon Technologies Ag Verfahren und Vorrichtung zur Nutzung in einem Datenverarbeitungssystem
US9507951B2 (en) * 2014-10-20 2016-11-29 Intel Corporation Technologies for secure input and display of virtual touch user interfaces
US9413626B2 (en) 2014-12-05 2016-08-09 Amazon Technologies, Inc. Automatic management of resource sizing
US10230693B2 (en) 2015-01-29 2019-03-12 WebCloak, LLC Safechannel encrypted messaging system
US9733967B2 (en) 2015-02-04 2017-08-15 Amazon Technologies, Inc. Security protocols for low latency execution of program code
US9588790B1 (en) 2015-02-04 2017-03-07 Amazon Technologies, Inc. Stateful virtual compute system
US9613198B2 (en) * 2015-03-30 2017-04-04 Honeywell International Inc. Apparatus and method for intelligent video surveillance of industrial console operations
US10395029B1 (en) 2015-06-30 2019-08-27 Fireeye, Inc. Virtual system and method with threat protection
US10216927B1 (en) 2015-06-30 2019-02-26 Fireeye, Inc. System and method for protecting memory pages associated with a process using a virtualization layer
US11113086B1 (en) 2015-06-30 2021-09-07 Fireeye, Inc. Virtual system and method for securing external network connectivity
US10642753B1 (en) 2015-06-30 2020-05-05 Fireeye, Inc. System and method for protecting a software component running in virtual machine using a virtualization layer
US10726127B1 (en) 2015-06-30 2020-07-28 Fireeye, Inc. System and method for protecting a software component running in a virtual machine through virtual interrupts by the virtualization layer
US10110566B2 (en) * 2015-07-21 2018-10-23 Baffle, Inc. Systems and processes for executing private programs on untrusted computers
US10033759B1 (en) 2015-09-28 2018-07-24 Fireeye, Inc. System and method of threat detection under hypervisor control
WO2017062541A1 (en) 2015-10-06 2017-04-13 Carnegie Mellon University Method and apparatus for trusted display on untrusted computing platforms to secure applications
JP2017107377A (ja) * 2015-12-09 2017-06-15 株式会社リコー 機器管理装置、機器管理システム、検証方法及びプログラム
KR20170091951A (ko) 2016-02-02 2017-08-10 에스프린팅솔루션 주식회사 전자 디바이스에게 보안을 제공하기 위한 방법 및 장치
US10037201B2 (en) * 2016-02-26 2018-07-31 Dell Products L.P. Secure live media boot system
US11132213B1 (en) 2016-03-30 2021-09-28 Amazon Technologies, Inc. Dependency-based process of pre-existing data sets at an on demand code execution environment
US10528739B2 (en) * 2016-04-20 2020-01-07 Sophos Limited Boot security
US10135622B2 (en) * 2016-06-03 2018-11-20 Intel Corporation Flexible provisioning of attestation keys in secure enclaves
US10102040B2 (en) 2016-06-29 2018-10-16 Amazon Technologies, Inc Adjusting variable limit on concurrent code executions
US10025691B1 (en) 2016-09-09 2018-07-17 Fireeye, Inc. Verification of complex software code using a modularized architecture
US10592678B1 (en) 2016-09-09 2020-03-17 Fireeye, Inc. Secure communications between peers using a verified virtual trusted platform module
US10621351B2 (en) 2016-11-01 2020-04-14 Raptor Engineering, LLC. Systems and methods for tamper-resistant verification of firmware with a trusted platform module
US10467082B2 (en) * 2016-12-09 2019-11-05 Microsoft Technology Licensing, Llc Device driver verification
US10839080B2 (en) * 2017-09-01 2020-11-17 Microsoft Technology Licensing, Llc Hardware-enforced firmware security
US10719604B2 (en) * 2018-01-30 2020-07-21 Hewlett Packard Enterprise Development Lp Baseboard management controller to perform security action based on digital signature comparison in response to trigger
US10853115B2 (en) 2018-06-25 2020-12-01 Amazon Technologies, Inc. Execution of auxiliary functions in an on-demand network code execution system
US11146569B1 (en) * 2018-06-28 2021-10-12 Amazon Technologies, Inc. Escalation-resistant secure network services using request-scoped authentication information
US11099870B1 (en) 2018-07-25 2021-08-24 Amazon Technologies, Inc. Reducing execution times in an on-demand network code execution system using saved machine states
US11099917B2 (en) 2018-09-27 2021-08-24 Amazon Technologies, Inc. Efficient state maintenance for execution environments in an on-demand code execution system
US11243953B2 (en) 2018-09-27 2022-02-08 Amazon Technologies, Inc. Mapreduce implementation in an on-demand network code execution system and stream data processing system
US11943093B1 (en) 2018-11-20 2024-03-26 Amazon Technologies, Inc. Network connection recovery after virtual machine transition in an on-demand network code execution system
US11010188B1 (en) 2019-02-05 2021-05-18 Amazon Technologies, Inc. Simulated data object storage using on-demand computation of data objects
JP7224485B2 (ja) * 2019-03-06 2023-02-17 エヌイーシー ラボラトリーズ ヨーロッパ ゲーエムベーハー ゲートウェイを用いてTrusted Execution Environment(TEE)におけるリモート認証を実行するための方法及びシステム
US11861386B1 (en) 2019-03-22 2024-01-02 Amazon Technologies, Inc. Application gateways in an on-demand network code execution system
US12327133B1 (en) 2019-03-22 2025-06-10 Amazon Technologies, Inc. Application gateways in an on-demand network code execution system
US11119809B1 (en) 2019-06-20 2021-09-14 Amazon Technologies, Inc. Virtualization-based transaction handling in an on-demand network code execution system
US11159528B2 (en) 2019-06-28 2021-10-26 Amazon Technologies, Inc. Authentication to network-services using hosted authentication information
US11190609B2 (en) 2019-06-28 2021-11-30 Amazon Technologies, Inc. Connection pooling for scalable network services
US11714895B2 (en) * 2019-07-18 2023-08-01 Anjuna Security, Inc. Secure runtime systems and methods
JP7185098B2 (ja) * 2019-09-25 2022-12-06 シフトファイブ・インコーポレーテッド コンピューティングデバイス間の不正なファームウェアまたはソフトウェアアップグレードの受動的な監視および防止
US11119826B2 (en) 2019-11-27 2021-09-14 Amazon Technologies, Inc. Serverless call distribution to implement spillover while avoiding cold starts
US11714682B1 (en) 2020-03-03 2023-08-01 Amazon Technologies, Inc. Reclaiming computing resources in an on-demand code execution system
US11754858B2 (en) 2020-04-30 2023-09-12 Coopervision International Limited Multifocal ophthalmic lens and related methods
US11269637B2 (en) * 2020-07-23 2022-03-08 Hewlett Packard Enterprise Development Lp Validating machine-readable instructions using an iterative validation process
US11550713B1 (en) 2020-11-25 2023-01-10 Amazon Technologies, Inc. Garbage collection in distributed systems using life cycled storage roots
US11593270B1 (en) 2020-11-25 2023-02-28 Amazon Technologies, Inc. Fast distributed caching using erasure coded object parts
US11089051B1 (en) * 2021-02-15 2021-08-10 Theta Labs, Inc. Preventing denial-of-service attacks in decentralized edge networks using verifiable delay functions (VDFs)
US11388210B1 (en) 2021-06-30 2022-07-12 Amazon Technologies, Inc. Streaming analytics using a serverless compute system
WO2023027687A1 (en) * 2021-08-23 2023-03-02 Hewlett-Packard Development Company, L.P. Hashes to control code execution
US11968280B1 (en) 2021-11-24 2024-04-23 Amazon Technologies, Inc. Controlling ingestion of streaming data to serverless function executions
US12015603B2 (en) 2021-12-10 2024-06-18 Amazon Technologies, Inc. Multi-tenant mode for serverless code execution
US12463972B2 (en) 2023-04-17 2025-11-04 Bank Of America Corporation System and method to identify and reverse tampering of virtual images
US12381878B1 (en) 2023-06-27 2025-08-05 Amazon Technologies, Inc. Architecture for selective use of private paths between cloud services
US12476978B2 (en) 2023-09-29 2025-11-18 Amazon Technologies, Inc. Management of computing services for applications composed of service virtual computing components
CN120196092B (zh) * 2025-05-26 2025-07-29 西安热工研究院有限公司 用于可信控制器的静态可信验证功能测试方法及相关装置

Family Cites Families (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4945468A (en) * 1988-02-01 1990-07-31 International Business Machines Corporation Trusted path mechanism for virtual terminal environments
US7350204B2 (en) * 2000-07-24 2008-03-25 Microsoft Corporation Policies for secure software execution
US7529754B2 (en) * 2003-03-14 2009-05-05 Websense, Inc. System and method of monitoring and controlling application files
JP2007226277A (ja) * 2004-04-02 2007-09-06 Matsushita Electric Ind Co Ltd 仮想マシン改ざん検査方法、および仮想マシン改ざん検査装置
US7721094B2 (en) 2005-05-06 2010-05-18 Microsoft Corporation Systems and methods for determining if applications executing on a computer system are trusted
US7565535B2 (en) * 2005-05-06 2009-07-21 Microsoft Corporation Systems and methods for demonstrating authenticity of a virtual machine using a security image
CN100437502C (zh) * 2005-12-30 2008-11-26 联想(北京)有限公司 基于安全芯片的防病毒方法
US7712143B2 (en) * 2006-09-27 2010-05-04 Blue Ridge Networks, Inc. Trusted enclave for a computer system
US7913292B2 (en) * 2006-10-18 2011-03-22 Microsoft Corporation Identification and visualization of trusted user interface objects
JP4998019B2 (ja) * 2007-03-06 2012-08-15 富士通株式会社 状態表示制御装置
GB0707150D0 (en) * 2007-04-13 2007-05-23 Hewlett Packard Development Co Dynamic trust management
JP2009003853A (ja) * 2007-06-25 2009-01-08 Panasonic Corp 複数のソフトウェアを正しい順番で起動する情報端末およびセキュリティモジュール
US20090028329A1 (en) * 2007-07-23 2009-01-29 Savi Technology, Inc. Method and Apparatus for Providing Security in a Radio Frequency Identification System
US8374354B2 (en) * 2007-09-27 2013-02-12 Verizon Data Services Llc System and method to pass a private encryption key
US8555081B2 (en) * 2007-10-30 2013-10-08 Vmware, Inc. Cryptographic multi-shadowing with integrity verification
US20090133097A1 (en) * 2007-11-15 2009-05-21 Ned Smith Device, system, and method for provisioning trusted platform module policies to a virtual machine monitor
US8321931B2 (en) * 2008-03-31 2012-11-27 Intel Corporation Method and apparatus for sequential hypervisor invocation
US8578374B2 (en) * 2009-07-16 2013-11-05 Ca, Inc. System and method for managing virtual machines

Also Published As

Publication number Publication date
JP2013501300A (ja) 2013-01-10
US8832778B2 (en) 2014-09-09
US20120198514A1 (en) 2012-08-02
DK2462507T3 (da) 2019-09-23
EP2462507A4 (en) 2013-04-03
EP2462507B1 (en) 2019-07-24
WO2011037665A3 (en) 2011-05-19
WO2011037665A2 (en) 2011-03-31
EP2462507A2 (en) 2012-06-13

Similar Documents

Publication Publication Date Title
JP5735509B2 (ja) マルウェアがある状態でユーザが検証可能な信頼性のあるパスを得るための方法および機器
US10516533B2 (en) Password triggered trusted encryption key deletion
US7380136B2 (en) Methods and apparatus for secure collection and display of user interface information in a pre-boot environment
US8850212B2 (en) Extending an integrity measurement
Parno et al. Bootstrapping trust in modern computers
US8335931B2 (en) Interconnectable personal computer architectures that provide secure, portable, and persistent computing environments
US8627414B1 (en) Methods and apparatuses for user-verifiable execution of security-sensitive code
TWI584152B (zh) 用於電腦安全的系統及其方法
US9015454B2 (en) Binding data to computers using cryptographic co-processor and machine-specific and platform-specific keys
US20100161998A1 (en) Associating a Signing key with a Software Component of a Computing Platform
TWI745629B (zh) 電腦系統以及初始化電腦系統的方法
Futral et al. Intel Trusted Execution Technology for Server Platforms: A Guide to More Secure Datacenters
EP3188067B1 (en) Security control method and network device
Götzfried et al. Mutual authentication and trust bootstrapping towards secure disk encryption
Zhao et al. Gracewipe: Secure and Verifiable Deletion under Coercion.
Sisinni Verification of software integrity in distributed systems
Mannan et al. Unicorn: Two-factor attestation for data security
Stewin Detecting peripheral-based attacks on the host memory
McCune Reducing the trusted computing base for applications on commodity systems
Müller et al. Stark: Tamperproof Authentication to Resist Keylogging
Bugiel et al. Implementing an application-specific credential platform using late-launched mobile trusted module
Zhao Authentication and Data Protection under Strong Adversarial Model
vor starken Angreifern et al. Trusted Systems in Untrusted Environments: Protecting against Strong Attackers
Reid Towards practical trusted computing
Müller et al. Tamperproof Authentication to Resist Keylogging

Legal Events

Date Code Title Description
A521 Request for written amendment filed

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20130626

A621 Written request for application examination

Free format text: JAPANESE INTERMEDIATE CODE: A621

Effective date: 20130626

A977 Report on retrieval

Free format text: JAPANESE INTERMEDIATE CODE: A971007

Effective date: 20140319

A131 Notification of reasons for refusal

Free format text: JAPANESE INTERMEDIATE CODE: A131

Effective date: 20140408

A601 Written request for extension of time

Free format text: JAPANESE INTERMEDIATE CODE: A601

Effective date: 20140707

A602 Written permission of extension of time

Free format text: JAPANESE INTERMEDIATE CODE: A602

Effective date: 20140714

A521 Request for written amendment filed

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20140808

A131 Notification of reasons for refusal

Free format text: JAPANESE INTERMEDIATE CODE: A131

Effective date: 20150120

A521 Request for written amendment filed

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20150223

TRDD Decision of grant or rejection written
A01 Written decision to grant a patent or to grant a registration (utility model)

Free format text: JAPANESE INTERMEDIATE CODE: A01

Effective date: 20150317

A61 First payment of annual fees (during grant procedure)

Free format text: JAPANESE INTERMEDIATE CODE: A61

Effective date: 20150416

R150 Certificate of patent or registration of utility model

Ref document number: 5735509

Country of ref document: JP

Free format text: JAPANESE INTERMEDIATE CODE: R150

LAPS Cancellation because of no payment of annual fees