Unlock instant, AI-driven research and patent intelligence for your innovation.

System and method for secure code execution in hypervisor mode

A technology for managing programs and programs, applied in memory systems, program control design, computer security devices, etc., and can solve problems such as impossible adoption and inefficient solutions

Active Publication Date: 2019-10-01
AO KASPERSKY LAB
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, current solutions are inefficient and in some cases impossible to employ

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for secure code execution in hypervisor mode
  • System and method for secure code execution in hypervisor mode
  • System and method for secure code execution in hypervisor mode

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] Exemplary aspects are described herein in the context of systems, methods, and computer program products for secure code execution in hypervisor mode. Those of ordinary skill in the art will appreciate that the following description is illustrative only and is not intended to be limiting in any way. Other aspects will readily suggest themselves to those skilled in the art who appreciate the advantages of the invention. Reference will now be made in detail to implementations of the exemplary aspects as illustrated in the accompanying drawings. Wherever possible, the same reference numbers will be used throughout the drawings and the following description to refer to the same or like items.

[0020] A hypervisor is a program capable of simultaneously executing several operating systems (OS) in parallel on the same computer. Hypervisors are divided into two types: the first type has its own built-in device drivers and schedulers, and thus is not tied to a specific OS; wh...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a system and method for safely executing codes in a hypervisor mode. An exemplary method includes: loading a hypervisor configured to check the integrity of protected virtual memory pages; loading a trusted program configured to make a hypercall to the hypervisor; The trusted program makes a first hypercall to the hypervisor; in response to the first hypercall, a token is generated by the hypervisor that is used by the hypervisor in subsequent hypercalls identifying the trusted program; allocating a memory page for storing the token and a memory address of the hypervisor; and returning the address of the allocated memory page to the trusted program.

Description

technical field [0001] The present invention relates generally to the field of computer security, and more particularly to systems and methods for securely executing code in hypervisor mode. Background technique [0002] Computer malware, such as Trojan horses, viruses, and worms, is evolving at an ever-increasing rate and uses a variety of methods to evade antivirus applications. One such method is to hide certain resources of the computer system (such as files or registry branches) from the antivirus application that is performing the antivirus check. According to the classification of anti-virus companies, malicious programs that use such methods are called stealth programs, or these malicious programs use stealth techniques. Stealth techniques become even more dangerous if vulnerabilities in components of the Operating System (OS) that work below the kernel level can be exploited. This does not allow today's antivirus applications to detect malicious programs that use ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/53G06F21/64
CPCG06F21/53G06F21/64G06F21/561G06F12/14G06F9/45558G06F9/45545G06F2212/1052G06F2009/45587G06F2009/45583G06F2221/034G06F21/44G06F21/554G06F21/57G06F2221/033
Inventor 尼古拉·N·艾戈蒂米哈伊尔·A·伊尔绍夫
Owner AO KASPERSKY LAB