Intel® Intrinsics Guide

Authored by admin Last updated on 06/14/2017 - 13:09

Introduction to Intel® Memory Protection Extensions

The C and C++ languages provide for memory access via pointers, however, these languages do not ensure the safe use of pointers.

Authored by RB (Intel) Last updated on 06/07/2017 - 09:40

Linux* ABI

by Milind Girkar, Hongjiu Lu, David Kreitzer, and Vyacheslav Zakharin (Intel)

Authored by Milind Girkar (Intel) Last updated on 06/14/2017 - 13:05

Using Intel® MPX with the Intel® Software Development Emulator

Intel has announced a new technology called Intel® Memory Protection Extensions (Intel® MPX).

Authored by Ady Tal (Intel) Last updated on 06/14/2017 - 13:15

Using Intel® SDE's chip-check feature

Intel® SDE includes a software validation mechanism to restrict executed instructions to a part

Authored by Mark Charney (Intel) Last updated on 06/07/2017 - 10:36

Pointer Checker in ICC: requires dynamic linking of runtime libraries

The -check-pointers switch, which enables the Pointer Checker feature available in Intel® Parallel Studio XE 2016, cannot be used with the -static flag on Linux* (/MT on Windows*) which force

Authored by admin Last updated on 06/07/2017 - 12:00

Intel® Memory Protection Extensions Enabling Guide

This document describes Intel® Memory Protection Extensions (Intel® MPX), its motivation, and programming model. It also describes the enabling requirements and the current status of enabling in the supported OSs: Linux* and Windows* and compilers: Intel® C++ Compiler, GCC, and Visual C++*. Finally, the paper describes how ISVs can incrementally enable bounds checking in their Intel MPX...
Authored by Sundaram Ramakesavan (Intel) Last updated on 06/07/2017 - 09:36

How to Protect Apps from Buffer Overflow Attacks

Learn how to enhance security for software on Windows® 10 using Intel® Memory Protection Extensions.
Authored by Fanjiang Pei (Intel) Last updated on 06/06/2017 - 14:30

基于 Windows® 10 的英特尔® 内存保护扩展:教程

Intel has introduced Intel® Memory Protection Extensions, a new extension to the instruction set architecture that aims to enhance software security by helping to protect against buffer overflow attacks.In this article, we discuss buffer overflow, and then give step-by step details on how application developers can prevent their apps from suffering from buffer overflow attacks on Windows® 10
Authored by Fanjiang Pei (Intel) Last updated on 06/01/2017 - 11:19

Intel® Software Development Emulator Download

Intel® Software Development Emulator (released Jan 30, 2018)

Authored by Ady Tal (Intel) Last updated on 02/06/2018 - 00:55
For more complete information about compiler optimizations, see our Optimization Notice.