ISA Extensions

Intel’s Instruction Set Architecture (ISA) continues to evolve and expand in functionality, enrich user experience, and create synergy across industries.

Intel® Memory Protection Extensions (Intel® MPX)

Computer systems face malicious attacks of increasing sophistication, and one of the more commonly observed forms is to cause or exploit buffer overruns (or overflows) in software applications.

Intel® MPX is a name for Intel® Architecture extensions designed to increase robustness of software. It will provide hardware features that can be used in conjunction with compiler changes to check that memory references intended at compile time do not become unsafe at runtime. Two of the most important goals are to provide this capability at low overhead for newly compiled code, and to provide compatibility mechanisms with legacy software components. Intel® MPX will be available in a future Intel® processor.

基于 Windows® 10 的英特尔® 内存保护扩展:教程 Intel has introduced Intel® Memory Protection Extensions, a new extension to the instruction set architecture that aims to enhance software security by helping to protect against buffer overflow attacks.In this article, we discuss buffer overflow, and then give step-by step details on how...
How to Protect Apps from Buffer Overflow Attacks Learn how to enhance security for software on Windows® 10 using Intel® Memory Protection Extensions.
Storing and loading bounds
Intel® Memory Protection Extensions Enabling Guide This document describes Intel® Memory Protection Extensions (Intel® MPX), its motivation, and programming model. It also describes the enabling requirements and the current status of enabling in the supported OSs: Linux* and Windows* and compilers: Intel® C++ Compiler, GCC, and Visual C++*. Finally...
Exposing Processor Features to Dynamic Languages Intel® for its part invests countless hours and billions of transistors to add features in our silicon products which will speed up people's lives. If only they knew how to take advantage of it! Part of our job in dynamic languages is what I call "putting the cookies on the bottom shelf". Make this...
Pointer Checker in ICC: requires dynamic linking of runtime libraries
07/10/14
The -check-pointers switch, which enables the Pointer Checker feature available in Intel® Parallel Studio XE 2016, cannot be used with the -static flag on Linux* (/MT on Windows*) which forces all Intel libraries to be linked statically. The reason is that, by design, the Pointer Checker library “...
Using Intel® SDE's chip-check feature Intel® SDE includes a software validation mechanism to restrict executed instructions to a particular microprocessor. This is intended to be a helpful diagnostic tool for use when deploying new software. Use chip check when you want to make sure that your program is not using instruction features...