Secure Coding

Access training and how-to guidance for developing software with security in mind.

Applied Filters

Introduction to XuCode and usage instructions to implement the Intel SGX instruction set

How to apply security principles and industry best practices to help protect your code and systems from potential transient execution attacks

Guidelines on how to assess the risk of transient execution attacks to your application and how to plan an appropriate mitigation strategy

Learn how cryptographic implementations use constant time principles to help protect secret data from traditional side channel attacks

Loading Microcode from the OS

Instructions and guidelines for Linux* developers to update and verify microcode for Intel® processors

Details and how-to instructions for spectre-meltdown-checker.sh, a tool used to detect a system's potential vulnerability to transient execution attacks and current mitigation status

Product and Performance Information

1

Performance varies by use, configuration and other factors. Learn more at www.Intel.com/PerformanceIndex.

2

Features and benefits in Intel® technologies depend on system configuration and may require enabled hardware, software or service activation. Performance varies depending on system configuration. No product or component can be absolutely secure. Check with your system manufacturer or retailer or learn more at Intel.com.

3

Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors.

Performance tests, such as SYSmark and MobileMark, are measured using specific computer systems, components, software, operations and functions. Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with other products. For more complete information visit www.intel.com/benchmarks.

Performance results are based on testing as of dates shown in configurations and may not reflect all publicly available updates.

The products and services described may contain defects or errors known as errata which may cause deviations from published specifications. Current characterized errata are available on request.

Intel provides these materials as-is, with no express or implied warranties.