CN102859502B - 虚拟计算机系统、虚拟计算机控制方法、及半导体集成电路 - Google Patents
虚拟计算机系统、虚拟计算机控制方法、及半导体集成电路 Download PDFInfo
- Publication number
- CN102859502B CN102859502B CN201180020496.3A CN201180020496A CN102859502B CN 102859502 B CN102859502 B CN 102859502B CN 201180020496 A CN201180020496 A CN 201180020496A CN 102859502 B CN102859502 B CN 102859502B
- Authority
- CN
- China
- Prior art keywords
- virtual computer
- program
- storage area
- access
- virtual
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
- G06F9/5061—Partitioning or combining of resources
- G06F9/5077—Logical partitioning of resources; Management or configuration of virtualized resources
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1458—Protection against unauthorised use of memory or access to memory by checking the subject access rights
- G06F12/1491—Protection against unauthorised use of memory or access to memory by checking the subject access rights in a hierarchical protection system, e.g. privilege levels, memory rings
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2212/00—Indexing scheme relating to accessing, addressing or allocation within memory systems or architectures
- G06F2212/15—Use in a specific computing environment
- G06F2212/151—Emulated environment, e.g. virtual machine
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (14)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| JP2011-045323 | 2011-03-02 | ||
| JP2011045323 | 2011-03-02 | ||
| PCT/JP2011/005108 WO2012117465A1 (ja) | 2011-03-02 | 2011-09-12 | 仮想計算機システム、仮想計算機制御方法、仮想計算機制御プログラム、及び半導体集積回路 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN102859502A CN102859502A (zh) | 2013-01-02 |
| CN102859502B true CN102859502B (zh) | 2016-03-23 |
Family
ID=46757435
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201180020496.3A Active CN102859502B (zh) | 2011-03-02 | 2011-09-12 | 虚拟计算机系统、虚拟计算机控制方法、及半导体集成电路 |
Country Status (4)
| Country | Link |
|---|---|
| US (1) | US20120331465A1 (zh) |
| JP (1) | JP5981845B2 (zh) |
| CN (1) | CN102859502B (zh) |
| WO (1) | WO2012117465A1 (zh) |
Families Citing this family (37)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP5679190B2 (ja) * | 2011-03-25 | 2015-03-04 | 日本電気株式会社 | ホスト計算機、分散処理システム、及びi/o制御方法 |
| WO2013125222A1 (ja) * | 2012-02-22 | 2013-08-29 | パナソニック株式会社 | 仮想計算機システム、秘匿情報保護方法及び秘匿情報保護プログラム |
| US9262195B2 (en) * | 2012-02-28 | 2016-02-16 | Red Hat Israel, Ltd. | Manageable external wake of virtual machines |
| JP5914145B2 (ja) * | 2012-05-01 | 2016-05-11 | ルネサスエレクトロニクス株式会社 | メモリ保護回路、処理装置、およびメモリ保護方法 |
| US9009705B2 (en) | 2012-10-01 | 2015-04-14 | International Business Machines Corporation | Authenticated distribution of virtual machine images |
| US9672059B2 (en) * | 2013-02-21 | 2017-06-06 | Nec Corporation | Virtualization system |
| US8875295B2 (en) * | 2013-02-22 | 2014-10-28 | Bitdefender IPR Management Ltd. | Memory introspection engine for integrity protection of virtual machines |
| US9529612B2 (en) * | 2013-03-18 | 2016-12-27 | International Business Machines Corporation | Scalable policy assignment in an edge virtual bridging (EVB) environment |
| US9535728B2 (en) * | 2013-03-18 | 2017-01-03 | International Business Machines Corporation | Scalable policy management in an edge virtual bridging (EVB) environment |
| US9495180B2 (en) * | 2013-05-10 | 2016-11-15 | Fireeye, Inc. | Optimized resource allocation for virtual machines within a malware content detection system |
| CN104657193B (zh) | 2013-11-21 | 2018-07-20 | 华为技术有限公司 | 一种访问物理资源的方法和装置 |
| US9323565B2 (en) | 2013-12-20 | 2016-04-26 | Vmware, Inc. | Provisioning customized virtual machines without rebooting |
| US10977063B2 (en) | 2013-12-20 | 2021-04-13 | Vmware, Inc. | Elastic compute fabric using virtual machine templates |
| US9935959B2 (en) * | 2014-02-07 | 2018-04-03 | Oracle International Corporation | Cloud service custom execution environment |
| KR20150101683A (ko) * | 2014-02-27 | 2015-09-04 | 삼성전자주식회사 | 자기 암호화 드라이브 및 그것을 포함한 유저 장치 |
| US9626212B2 (en) * | 2014-06-28 | 2017-04-18 | Vmware, Inc. | Live migration of virtual machines with memory state sharing |
| US9619268B2 (en) | 2014-08-23 | 2017-04-11 | Vmware, Inc. | Rapid suspend/resume for virtual machines via resource sharing |
| US9578032B2 (en) * | 2014-08-23 | 2017-02-21 | Vmware, Inc. | Application publishing using memory state sharing |
| CN104573421B (zh) * | 2014-12-30 | 2017-12-22 | 北京兆易创新科技股份有限公司 | 一种基于若干分区的mcu芯片信息保护方法和装置 |
| DE102015210539A1 (de) * | 2015-06-09 | 2016-12-15 | Robert Bosch Gmbh | Speicherschutzeinheit, Speicherverwaltungseinheit und Mikrocontroller |
| GB2539433B8 (en) | 2015-06-16 | 2018-02-21 | Advanced Risc Mach Ltd | Protected exception handling |
| GB2539428B (en) | 2015-06-16 | 2020-09-09 | Advanced Risc Mach Ltd | Data processing apparatus and method with ownership table |
| GB2539429B (en) | 2015-06-16 | 2017-09-06 | Advanced Risc Mach Ltd | Address translation |
| GB2539435B8 (en) | 2015-06-16 | 2018-02-21 | Advanced Risc Mach Ltd | Data processing memory access control, in which an owning process for a region of memory is specified independently of privilege level |
| GB2539436B (en) * | 2015-06-16 | 2019-02-06 | Advanced Risc Mach Ltd | Secure initialisation |
| GB201513039D0 (en) * | 2015-07-23 | 2015-09-09 | Eaton Ind France Sas | Shutting down of a virtual system |
| JP6504984B2 (ja) * | 2015-09-28 | 2019-04-24 | ルネサスエレクトロニクス株式会社 | データ処理装置 |
| CN108139982B (zh) | 2016-05-31 | 2022-04-08 | 安华高科技股份有限公司 | 多信道输入/输出虚拟化 |
| US10241931B2 (en) * | 2016-07-29 | 2019-03-26 | Advanced Micro Devices, Inc. | Controlling access to pages in a memory in a computing device |
| US10261821B2 (en) * | 2016-12-02 | 2019-04-16 | Dell Products L.P. | System and method to expose remote virtual media partitions to virtual machines |
| JP6841703B2 (ja) * | 2017-03-29 | 2021-03-10 | アドソル日進株式会社 | コンピュータ装置 |
| US10534730B1 (en) * | 2018-12-20 | 2020-01-14 | Ati Technologies Ulc | Storing microcode for a virtual function in a trusted memory region |
| JP2020149597A (ja) * | 2019-03-15 | 2020-09-17 | 株式会社デンソーテン | 制御装置および制御方法 |
| JP2020149526A (ja) * | 2019-03-15 | 2020-09-17 | 株式会社東芝 | 処理装置、処理方法及びプログラム |
| JP7138230B2 (ja) * | 2019-09-25 | 2022-09-15 | 株式会社日立製作所 | 計算機システム、データ制御方法及び記憶媒体 |
| DE102022205137A1 (de) | 2022-05-23 | 2023-11-23 | Robert Bosch Gesellschaft mit beschränkter Haftung | Verfahren zum Überwachen von Zugriffsanfragen für sicherheitskritische Zugriffe in einer Recheneinheit |
| CN116107668B (zh) * | 2023-04-13 | 2023-08-15 | 紫光同芯微电子有限公司 | 一种应用程序运行方法及其系统 |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20040181682A1 (en) * | 2002-11-18 | 2004-09-16 | Arm Limited | Diagnostic data capture control for multi-domain processors |
| US20090125902A1 (en) * | 2007-03-01 | 2009-05-14 | Ghosh Anup K | On-demand disposable virtual work system |
| US20090300599A1 (en) * | 2008-05-30 | 2009-12-03 | Matthew Thomas Piotrowski | Systems and methods of utilizing virtual machines to protect computer systems |
Family Cites Families (11)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6275938B1 (en) * | 1997-08-28 | 2001-08-14 | Microsoft Corporation | Security enhancement for untrusted executable code |
| JP2002073358A (ja) * | 2000-09-04 | 2002-03-12 | Hitachi Ltd | 仮想計算機主記憶のアクセス制御方法 |
| US7647589B1 (en) * | 2005-02-07 | 2010-01-12 | Parallels Software International, Inc. | Methods and systems for safe execution of guest code in virtual machine context |
| US7984438B2 (en) * | 2006-02-08 | 2011-07-19 | Microsoft Corporation | Virtual machine transitioning from emulating mode to enlightened mode |
| US8112527B2 (en) * | 2006-05-24 | 2012-02-07 | Nec Corporation | Virtual machine management apparatus, and virtual machine management method and program |
| US8336046B2 (en) * | 2006-12-29 | 2012-12-18 | Intel Corporation | Dynamic VM cloning on request from application based on mapping of virtual hardware configuration to the identified physical hardware resources |
| JP4557178B2 (ja) * | 2007-03-02 | 2010-10-06 | 日本電気株式会社 | 仮想マシン管理システム、その方法及びそのプログラム |
| JP5166169B2 (ja) * | 2008-08-27 | 2013-03-21 | 株式会社日立製作所 | ハイパバイザを有する計算機システム |
| JP4787341B2 (ja) * | 2009-02-18 | 2011-10-05 | 株式会社エヌ・ティ・ティ・ドコモ | データ処理装置、データ処理方法、データ処理プログラム |
| US8627456B2 (en) * | 2009-12-14 | 2014-01-07 | Citrix Systems, Inc. | Methods and systems for preventing access to display graphics generated by a trusted virtual machine |
| US8689349B2 (en) * | 2010-05-05 | 2014-04-01 | Intel Corporation | Information flow tracking and protection |
-
2011
- 2011-09-12 WO PCT/JP2011/005108 patent/WO2012117465A1/ja not_active Ceased
- 2011-09-12 JP JP2012539103A patent/JP5981845B2/ja active Active
- 2011-09-12 CN CN201180020496.3A patent/CN102859502B/zh active Active
- 2011-09-12 US US13/583,151 patent/US20120331465A1/en not_active Abandoned
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20040181682A1 (en) * | 2002-11-18 | 2004-09-16 | Arm Limited | Diagnostic data capture control for multi-domain processors |
| US20090125902A1 (en) * | 2007-03-01 | 2009-05-14 | Ghosh Anup K | On-demand disposable virtual work system |
| US20090300599A1 (en) * | 2008-05-30 | 2009-12-03 | Matthew Thomas Piotrowski | Systems and methods of utilizing virtual machines to protect computer systems |
Also Published As
| Publication number | Publication date |
|---|---|
| WO2012117465A1 (ja) | 2012-09-07 |
| US20120331465A1 (en) | 2012-12-27 |
| CN102859502A (zh) | 2013-01-02 |
| JPWO2012117465A1 (ja) | 2014-07-07 |
| JP5981845B2 (ja) | 2016-08-31 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN102859502B (zh) | 虚拟计算机系统、虚拟计算机控制方法、及半导体集成电路 | |
| US20250225079A1 (en) | GPU Virtualisation | |
| Peinado et al. | NGSCB: A trusted open system | |
| KR102355213B1 (ko) | 운영 체제 공격으로부터 애플리케이션 기밀사항을 보호하는 기법 | |
| KR102255767B1 (ko) | 가상 머신 감사를 위한 시스템 및 방법들 | |
| CN109918919B (zh) | 认证变量的管理 | |
| KR102189296B1 (ko) | 가상 머신 보안 어플리케이션을 위한 이벤트 필터링 | |
| CN113094700B (zh) | 执行安全操作的系统以及系统执行安全操作的方法 | |
| TWI697805B (zh) | 載入和虛擬化密碼金鑰 | |
| US9454676B2 (en) | Technologies for preventing hook-skipping attacks using processor virtualization features | |
| CN103607279B (zh) | 基于多核处理器的密钥保护方法及系统 | |
| US20210279334A1 (en) | System on chip and operation method thereof | |
| US10311252B2 (en) | Technologies for protecting dynamically generated managed code with protection domains | |
| US10565130B2 (en) | Technologies for a memory encryption engine for multiple processor usages | |
| CN104424034A (zh) | 硬件资源访问方法及装置 | |
| EP2973154B1 (en) | Method, apparatus, system, and computer readable medium to provide secure operation | |
| US20170255416A1 (en) | Technologies to defeat secure enclave side-channel attacks using fault-oriented programming | |
| CN117349870B (zh) | 基于异构计算的透明加解密计算系统、方法、设备和介质 | |
| CN113449292B (zh) | 一种可信应用的运行方法、装置及设备 | |
| US10140148B1 (en) | Copy based IOMMU emulation for out-of-process emulated devices | |
| US10248785B2 (en) | Application memory protection using a host page table switching virtual machine function | |
| Haas et al. | Enabling Confidential I/O on RISC-V Without Hardware Modifications | |
| TWI902296B (zh) | 虛擬機操作系統的設備指派系統及相關方法和非瞬態機器可讀介質 | |
| HK1254084B (zh) | 用於审计虚拟机的系统及方法 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| ASS | Succession or assignment of patent right |
Owner name: MATSUSHITA ELECTRIC (AMERICA) INTELLECTUAL PROPERT Free format text: FORMER OWNER: MATSUSHITA ELECTRIC INDUSTRIAL CO, LTD. Effective date: 20141009 |
|
| C41 | Transfer of patent application or patent right or utility model | ||
| TA01 | Transfer of patent application right |
Effective date of registration: 20141009 Address after: Seaman Avenue Torrance in the United States of California No. 2000 room 200 Applicant after: PANASONIC INTELLECTUAL PROPERTY CORPORATION OF AMERICA Address before: Osaka Japan Applicant before: Matsushita Electric Industrial Co.,Ltd. |
|
| C53 | Correction of patent of invention or patent application | ||
| CB02 | Change of applicant information |
Address after: Seaman Avenue Torrance in the United States of California No. 20000 room 200 Applicant after: PANASONIC INTELLECTUAL PROPERTY CORPORATION OF AMERICA Address before: Seaman Avenue Torrance in the United States of California No. 2000 room 200, Applicant before: PANASONIC INTELLECTUAL PROPERTY CORPORATION OF AMERICA |
|
| COR | Change of bibliographic data |
Free format text: CORRECT: ADDRESS; FROM: |
|
| C14 | Grant of patent or utility model | ||
| GR01 | Patent grant | ||
| C41 | Transfer of patent application or patent right or utility model | ||
| TR01 | Transfer of patent right |
Effective date of registration: 20170302 Address after: American New York Patentee after: Sun patent hosting Co. Address before: Seaman Avenue Torrance in the United States of California No. 20000 room 200 Patentee before: PANASONIC INTELLECTUAL PROPERTY CORPORATION OF AMERICA |