This application generally relates to protecting computer resources using a privileged domain and multiple devices.
Computing devices, such as personal computers, smartphones, etc., are targets for malicious software, also known as malware. Different types of malware are designed to target different aspects of resources that are either present on, or accessible from, a given computing device. For example, ransomware encrypts and denies access to files or other system resources, often until payment is made by a user to restore access to the encrypted resources. Spyware invades user privacy by infiltrating a device's access to hardware (such as a microphone, a camera, a GPS unit, etc.) or by tracking a user's usage of a computing device. Other types of malware install programs that perform undesirable functionality, waste system resources, or corrupt existing software installed on the computing device.
Operating systems (OSes) and other programs implement various security measures to protect system resources from unauthorized access. For example, many operating systems associate different privileges with different users. For example, a typical user account may be granted less access to modify or access system resources (e.g., resources necessary to operate the operating system, confidential or sensitive resources, etc.), while a system administrator account (or the like) is granted full access to system resources and functionality. However, malicious software attacks often emulate a privileged user account or otherwise bypass these security controls, thereby effectively granting the malware unfettered access to any system resources that are accessible by the most privileged aspects of the operating system. Such system resources include files, folders, programs, and/or hardware (e.g., a microphone, camera, GPS chip, etc.). Likewise, while anti-virus or anti-malware programs executing on computing device may attempt to identify and remove or isolate malware, malware can avoid these security measure by gaining privileged access to the operating system and disabling the security measure or disguising the malware as a trusted system process.
In addition, many security controls, such as multi-factor authentication, are insufficient to protect against malware that obtains privileged access to an operating system. For example, multi-factor authentication may attempt to verify the identity of a user by transmitting an access request to a known account or device associated with the user. However, if the user authenticates their identity, then the user account (and associated OS resources) obtain access, and a comprised user account results in malware obtaining access to the system resources. In addition, malware that obtains OS-level privileges can bypass these account-based or identity-based controls, as privileged OS processes (e.g., at the kernel level) have access to all system resources that are accessible by the OS, and some malware emulates a privileged OS process.
The disclosure describes systems and methods that protect computing resources against malware even if the computing device is compromised by malware.
As illustrated in the example of
The privileged firmware manages rule policies 216 for securing resources 218 on the computing device (e.g., device 210, in the example of
As illustrated in
In particular embodiments, additions to the rule policies, such as by identifying specific files or folders to protect or by enhancing existing protections, may be made by a non-privileged user of the computing device. For example, a user may identify (e.g., by selecting in a user interface provided by the secure program or by the OS) one or more files or folders to protect with a rule. The requested protection will be passed to the privileged firmware, which accesses the rule policies and updates the rules by adding the requested protection.
In particular embodiments, changes other than additions to the rule policies, for example a removal of a rule or a change to rules (e.g., an increase in the amount of time access is granted to process) may require authorization by the privileged firmware. A user may implement such changes directly through the privileged firmware, in particular embodiments. For example, a user can login to an interface for managing a UEFI firmware using a password specific to that firmware, and the user can update the rule file directly using this interface (for example, by identifying the exact location of the resource to be protected and any corresponding protection options). As another example, a user can submit a request (e.g., via an interface of the secure program) to change the rule policies, and the user may be prompted for the authorization credentials to access the privileged firmware. The request and credentials may then be passed to the firmware, which authenticates the request, using the credentials, and honors the request if valid credentials are applied. As explained in this example, OS processes, including the kernel, have no control over changes to, or access to, the rule policies, and therefore malware infecting an OS cannot gain access to the rule policies.
Rules managed by the privileged firmware identify the specific resources to be protected by a rule. A rule can also identify additional information or policies associated with the rule. For example, a rule may identify an access type covered by the rule. For example, a request to modify, encrypt, move, or delete a file may be identified as subject to the rule (i.e., actions that require approval), while any access not identified (e.g., a read-only access, or a copy access, etc.) may not be subject to the rule. In particular embodiments, a rule may apply to any and all access types unless otherwise identified by the rule. In particular embodiments, a rule may identify an access duration associated with an access. For example, a rule may specify that if access is granted, then access may last for a predetermined time period (e.g., 5 minutes, 30 minutes, 1 hour, one day, etc.) or until some specified event (e.g., until the requesting process terminates access, until the computing device sleeps, shuts down, or reboots, etc.). In particular embodiments, a rule may identify one or more access options to present along with an access request to a companion device, as explained more fully below.
Step 120 of the example method of
Step 130 of the example method of
The second device decrypts the access request from the primary device, and then the secure program on the companion device surfaces an interface (e.g., via a notification such as a push notification, an SMS message, and in-app UI, etc.) on the second device that notifies a user of the second device of the access request and provides relevant information related to the request. For example, the interface may identify the specific resource (e.g., file name, program, hardware component, etc.) for which access is requested. The interface may also identify the process on the primary computing device that is requesting access to the computing resource. The interface may also identify the requested access type, i.e., whether the request is to read, write, move, delete, active, etc. The interface includes one or more interactive elements that lets the user respond to the request on the companion device. For example, the user can approve or deny the request. In particular embodiments, the user can request additional information about the request. In particular embodiments, the interface includes options that a user can specify for approving or denying a request. For example, a user may be able to specify a duration of approval (e.g., that one request is granted for 5 minutes, while another request may be granted for several hours, etc.). In particular embodiments, the set of options which a user can select from when responding to an access request may be specified by the rule policies on the primary computing device. In particular embodiments, the interface may provide related information, such as a summary of the implications of granting the request (e.g., that the file may be copied, deleted, or encrypted if access is granted, etc.). In particular embodiments, the user of the second computing device is the same as the user of the primary computing device. In particular embodiments, the users may be different (e.g., the companion device is associated with an IT administrator).
Step 140 of the example method of
Step 150 of the example method of
In particular embodiments, the secure program on a companion device may perform the functions for that device that the secure program on the primary device performs for the primary device. In other words, the secure program on a second device may secure access to computer resources on the second device, including by transmitting a request to another device for user authorization. From the perspective of the second device, the companion device may be the same computing device for which the second device serves as a companion device (e.g., device 210 may be the companion device for device 220 when the secure program on device 220 secures access to resources on that device), or may be a different device.
As explained above, the systems and methods of this disclosure protect computer resources from malware even if the computing device is already infected by malware, in part by including security features below the OS in connection with a secure program that operates as part of the OS, and in part by using a companion device with secure communications to authorize access to computer resources. This approach differs from other approaches, for example from multi-factor authentication, which focuses on authenticating the identity of users but does nothing to protect an infected system corrupting resources on that system. For example, two-factor authentication may require a user to authenticate their identity in order to login to a particular device, such as a laptop. However, once the user's identity is authenticated, an infected OS or other program associated with the user account has access to the computing device and associated resources, for example by spoofing administrative privileges and kernel-level processes on the computing device. In contrast, the system and methods of this disclosure operate downstream of any such authentication and prevent malware from corrupting or accessing computing resources on a device.
Particular embodiments may repeat one or more steps of the method of
This disclosure contemplates any suitable number of computer systems 500. This disclosure contemplates computer system 500 taking any suitable physical form. As example and not by way of limitation, computer system 500 may be an embedded computer system, a system-on-chip (SOC), a single-board computer system (SBC) (such as, for example, a computer-on-module (COM) or system-on-module (SOM)), a desktop computer system, a laptop or notebook computer system, an interactive kiosk, a mainframe, a mesh of computer systems, a mobile telephone, a personal digital assistant (PDA), a server, a tablet computer system, or a combination of two or more of these. Where appropriate, computer system 500 may include one or more computer systems 500; be unitary or distributed; span multiple locations; span multiple machines; span multiple data centers; or reside in a cloud, which may include one or more cloud components in one or more networks. Where appropriate, one or more computer systems 500 may perform without substantial spatial or temporal limitation one or more steps of one or more methods described or illustrated herein. As an example and not by way of limitation, one or more computer systems 500 may perform in real time or in batch mode one or more steps of one or more methods described or illustrated herein. One or more computer systems 500 may perform at different times or at different locations one or more steps of one or more methods described or illustrated herein, where appropriate.
In particular embodiments, computer system 500 includes a processor 502, memory 504, storage 506, an input/output (I/O) interface 508, a communication interface 510, and a bus 512. Although this disclosure describes and illustrates a particular computer system having a particular number of particular components in a particular arrangement, this disclosure contemplates any suitable computer system having any suitable number of any suitable components in any suitable arrangement.
In particular embodiments, processor 502 includes hardware for executing instructions, such as those making up a computer program. As an example and not by way of limitation, to execute instructions, processor 502 may retrieve (or fetch) the instructions from an internal register, an internal cache, memory 504, or storage 506; decode and execute them; and then write one or more results to an internal register, an internal cache, memory 504, or storage 506. In particular embodiments, processor 502 may include one or more internal caches for data, instructions, or addresses. This disclosure contemplates processor 502 including any suitable number of any suitable internal caches, where appropriate. As an example and not by way of limitation, processor 502 may include one or more instruction caches, one or more data caches, and one or more translation lookaside buffers (TLBs). Instructions in the instruction caches may be copies of instructions in memory 504 or storage 506, and the instruction caches may speed up retrieval of those instructions by processor 502. Data in the data caches may be copies of data in memory 504 or storage 506 for instructions executing at processor 502 to operate on; the results of previous instructions executed at processor 502 for access by subsequent instructions executing at processor 502 or for writing to memory 504 or storage 506; or other suitable data. The data caches may speed up read or write operations by processor 502. The TLBs may speed up virtual-address translation for processor 502. In particular embodiments, processor 502 may include one or more internal registers for data, instructions, or addresses. This disclosure contemplates processor 502 including any suitable number of any suitable internal registers, where appropriate. Where appropriate, processor 502 may include one or more arithmetic logic units (ALUs); be a multi-core processor; or include one or more processors 502. Although this disclosure describes and illustrates a particular processor, this disclosure contemplates any suitable processor.
In particular embodiments, memory 504 includes main memory for storing instructions for processor 502 to execute or data for processor 502 to operate on. As an example and not by way of limitation, computer system 500 may load instructions from storage 506 or another source (such as, for example, another computer system 500) to memory 504. Processor 502 may then load the instructions from memory 504 to an internal register or internal cache. To execute the instructions, processor 502 may retrieve the instructions from the internal register or internal cache and decode them. During or after execution of the instructions, processor 502 may write one or more results (which may be intermediate or final results) to the internal register or internal cache. Processor 502 may then write one or more of those results to memory 504. In particular embodiments, processor 502 executes only instructions in one or more internal registers or internal caches or in memory 504 (as opposed to storage 506 or elsewhere) and operates only on data in one or more internal registers or internal caches or in memory 504 (as opposed to storage 506 or elsewhere). One or more memory buses (which may each include an address bus and a data bus) may couple processor 502 to memory 504. Bus 512 may include one or more memory buses, as described below. In particular embodiments, one or more memory management units (MMUs) reside between processor 502 and memory 504 and facilitate accesses to memory 504 requested by processor 502. In particular embodiments, memory 504 includes random access memory (RAM). This RAM may be volatile memory, where appropriate Where appropriate, this RAM may be dynamic RAM (DRAM) or static RAM (SRAM). Moreover, where appropriate, this RAM may be single-ported or multi-ported RAM. This disclosure contemplates any suitable RAM. Memory 504 may include one or more memories 504, where appropriate. Although this disclosure describes and illustrates particular memory, this disclosure contemplates any suitable memory.
In particular embodiments, storage 506 includes mass storage for data or instructions. As an example and not by way of limitation, storage 506 may include a hard disk drive (HDD), a floppy disk drive, flash memory, an optical disc, a magneto-optical disc, magnetic tape, or a Universal Serial Bus (USB) drive or a combination of two or more of these. Storage 506 may include removable or non-removable (or fixed) media, where appropriate. Storage 506 may be internal or external to computer system 500, where appropriate. In particular embodiments, storage 506 is non-volatile, solid-state memory. In particular embodiments, storage 506 includes read-only memory (ROM). Where appropriate, this ROM may be mask-programmed ROM, programmable ROM (PROM), erasable PROM (EPROM), electrically erasable PROM (EEPROM), electrically alterable ROM (EAROM), or flash memory or a combination of two or more of these. This disclosure contemplates mass storage 506 taking any suitable physical form. Storage 506 may include one or more storage control units facilitating communication between processor 502 and storage 506, where appropriate. Where appropriate, storage 506 may include one or more storages 506. Although this disclosure describes and illustrates particular storage, this disclosure contemplates any suitable storage.
In particular embodiments, I/O interface 508 includes hardware, software, or both, providing one or more interfaces for communication between computer system 500 and one or more I/O devices. Computer system 500 may include one or more of these I/O devices, where appropriate. One or more of these I/O devices may enable communication between a person and computer system 500. As an example and not by way of limitation, an I/O device may include a keyboard, keypad, microphone, monitor, mouse, printer, scanner, speaker, still camera, stylus, tablet, touch screen, trackball, video camera, another suitable I/O device or a combination of two or more of these. An I/O device may include one or more sensors. This disclosure contemplates any suitable I/O devices and any suitable I/O interfaces 508 for them. Where appropriate, I/O interface 508 may include one or more device or software drivers enabling processor 502 to drive one or more of these I/O devices. I/O interface 508 may include one or more I/O interfaces 508, where appropriate. Although this disclosure describes and illustrates a particular I/O interface, this disclosure contemplates any suitable I/O interface.
In particular embodiments, communication interface 510 includes hardware, software, or both providing one or more interfaces for communication (such as, for example, packet-based communication) between computer system 500 and one or more other computer systems 500 or one or more networks. As an example and not by way of limitation, communication interface 510 may include a network interface controller (NIC) or network adapter for communicating with an Ethernet or other wire-based network or a wireless NIC (WNIC) or wireless adapter for communicating with a wireless network, such as a WI-FI network. This disclosure contemplates any suitable network and any suitable communication interface 510 for it. As an example and not by way of limitation, computer system 500 may communicate with an ad hoc network, a personal area network (PAN), a local area network (LAN), a wide area network (WAN), a metropolitan area network (MAN), or one or more portions of the Internet or a combination of two or more of these. One or more portions of one or more of these networks may be wired or wireless. As an example, computer system 500 may communicate with a wireless PAN (WPAN) (such as, for example, a BLUETOOTH WPAN), a WI-FI network, a WI-MAX network, a cellular telephone network (such as, for example, a Global System for Mobile Communications (GSM) network), or other suitable wireless network or a combination of two or more of these. Computer system 500 may include any suitable communication interface 510 for any of these networks, where appropriate. Communication interface 510 may include one or more communication interfaces 510, where appropriate. Although this disclosure describes and illustrates a particular communication interface, this disclosure contemplates any suitable communication interface.
In particular embodiments, bus 512 includes hardware, software, or both coupling components of computer system 500 to each other. As an example and not by way of limitation, bus 512 may include an Accelerated Graphics Port (AGP) or other graphics bus, an Enhanced Industry Standard Architecture (EISA) bus, a front-side bus (FSB), a HYPERTRANSPORT (HT) interconnect, an Industry Standard Architecture (ISA) bus, an INFINIBAND interconnect, a low-pin-count (LPC) bus, a memory bus, a Micro Channel Architecture (MCA) bus, a Peripheral Component Interconnect (PCI) bus, a PCI-Express (PCIe) bus, a serial advanced technology attachment (SATA) bus, a Video Electronics Standards Association local (VLB) bus, or another suitable bus or a combination of two or more of these. Bus 512 may include one or more buses 512, where appropriate. Although this disclosure describes and illustrates a particular bus, this disclosure contemplates any suitable bus or interconnect.
Herein, a computer-readable non-transitory storage medium or media may include one or more semiconductor-based or other integrated circuits (ICs) (such, as for example, field-programmable gate arrays (FPGAs) or application-specific ICs (ASICs)), hard disk drives (HDDs), hybrid hard drives (HHDs), optical discs, optical disc drives (ODDs), magneto-optical discs, magneto-optical drives, floppy diskettes, floppy disk drives (FDDs), magnetic tapes, solid-state drives (SSDs), RAM-drives, SECURE DIGITAL cards or drives, any other suitable computer-readable non-transitory storage media, or any suitable combination of two or more of these, where appropriate. A computer-readable non-transitory storage medium may be volatile, non-volatile, or a combination of volatile and non-volatile, where appropriate.
Herein, “or” is inclusive and not exclusive, unless expressly indicated otherwise or indicated otherwise by context. Therefore, herein, “A or B” means “A, B, or both,” unless expressly indicated otherwise or indicated otherwise by context. Moreover, “and” is both joint and several, unless expressly indicated otherwise or indicated otherwise by context. Therefore, herein, “A and B” means “A and B, jointly or severally,” unless expressly indicated otherwise or indicated otherwise by context.
The scope of this disclosure encompasses all changes, substitutions, variations, alterations, and modifications to the example embodiments described or illustrated herein that a person having ordinary skill in the art would comprehend. The scope of this disclosure is not limited to the example embodiments described or illustrated herein. Moreover, although this disclosure describes and illustrates respective embodiments herein as including particular components, elements, feature, functions, operations, or steps, any of these embodiments may include any combination or permutation of any of the components, elements, features, functions, operations, or steps described or illustrated anywhere herein that a person having ordinary skill in the art would comprehend.
This application claims the benefit under 35 U.S.C. § 119 of U.S. Provisional Patent Application 63/465,459 filed May 10, 2023.
| Number | Date | Country | |
|---|---|---|---|
| 63465459 | May 2023 | US |