US 11,876,900 B2
System and method for trusted control flow enforcement using derived encryption keys
Nicholas D. Grobelny, Austin, TX (US); Richard M. Tonry, Austin, TX (US); and Balasingh P. Samuel, Round Rock, TX (US)
Assigned to Dell Products L.P., Round Rock, TX (US)
Filed by DELL PRODUCTS L.P., Round Rock, TX (US)
Filed on May 18, 2022, as Appl. No. 17/747,160.
Application 17/747,160 is a division of application No. 16/739,515, filed on Jan. 10, 2020, granted, now 11,418,333.
Prior Publication US 2022/0278837 A1, Sep. 1, 2022
Int. Cl. H04L 9/08 (2006.01); H04L 9/06 (2006.01); G06F 21/52 (2013.01); G06F 21/54 (2013.01); G06F 21/64 (2013.01); G06F 21/12 (2013.01)
CPC H04L 9/0869 (2013.01) [G06F 21/12 (2013.01); G06F 21/52 (2013.01); G06F 21/54 (2013.01); G06F 21/64 (2013.01); H04L 9/0643 (2013.01); H04L 9/0877 (2013.01); H04L 9/0897 (2013.01)] 18 Claims
OG exemplary drawing
 
1. A method to enforce control flow integrity, the method comprising:
receiving a first encryption key, wherein the first encryption key is a randomly generated seed key;
retrieving a first one of a plurality of code segments ordered according to a sequence of execution;
encrypting the first code segment with the first encryption key;
measuring the first encrypted code segment resulting in a hash value;
applying a key derivation function to generate a second encryption key based on the hash value;
retrieving a second one of the code segments, wherein the second code segment is a next code segment in the sequence of execution; and
encrypting the second code segment with the second encryption key.