Article

Digital Security and Surveillance on 4th generation Intel® Core™ processors Using Intel® System Studio 2015

This article presents the advantages of developing embedded digital video surveillance systems to run on 4th generation Intel® Core™ processor with Intel® HD Graphics, in combination with the Intel® System Studio 2015 software development suite. While Intel® HD Graphics is useful for developing many types of computer vision functionalities in video management software; Intel® System Studio...
Authored by Last updated on 06/23/2019 - 18:50
Blog post

Null Pointer Dereferencing Causes Undefined Behavior

I have unintentionally raised a large debate recently concerning the question if it is legal in C/C++ to use the &P->m_foo expression with P being a null pointer.

Authored by Andrey Karpov (Blackbelt) Last updated on 05/30/2018 - 07:08
Blog post

The Last Line Effect

Authored by Andrey Karpov (Blackbelt) Last updated on 05/30/2018 - 07:00
Blog post

Let's Play a Game - find bugs in popular open-source projects

Test your C/C++ skills - find bugs in popular open-source projects.
Authored by Andrey Karpov (Blackbelt) Last updated on 05/30/2018 - 07:08
Article

Fast Computation of Huffman Codes

The generation of Huffman codes is used in many applications, among them the DEFLATE compression algorithm. The classical way to compute these codes uses a heap data structure. This approach is fairly efficient, but traditional software implementations contain lots of branches that are data-dependent and thus hard for general-purpose CPU hardware to predict. On modern processors with deep...
Authored by James Guilford (Intel) Last updated on 07/09/2019 - 16:09
Article

The DRNG Library and Manual

An introduction to the DRNG Library. Includes download links for the static binary libraries, source code, and documentation and a guide to getting started.
Authored by John M. (Intel) Last updated on 10/08/2019 - 18:20
Article

Libcryptorandom Library 2.0 from Intel

A cross-platform library for obtaining cryptographically secure random numbers from the best available entropy source in the underlying system.
Authored by Last updated on 10/08/2019 - 18:20
Article

C# Application with Intel® Software Guard Extensions

Enclaves must be 100 percent native code and the enclave bridge functions must be 100 percent native code with C (and not C++) linkages, it is possible, indirectly, to make an ECALL into an enclave

Authored by Last updated on 10/08/2019 - 18:20
Blog post

Utilizing AES New Instructions (AES-NI) in a Windows* 8 C# App

AES-NI is a new security feature available on the latest Intel® Atom™ Z3000 processors (codename Bay Trail).  AES-NI provides a set of hardware instructions onboard the processor that implement som

Authored by Rylee, Michael J (Intel) Last updated on 10/08/2019 - 18:20
Blog post

Overview of Intel® Software Guard Extension Enclaves

Enclaves are isolated memory regions of code and data that are highly secure. Application code can be put into an enclave via special instructions and software via the Intel® SGX SDK. SGX Enclaves are hardened by CPU-based security mechanisms and can be remotely provisioned and attested.
Authored by Last updated on 10/08/2019 - 18:20