Filters

Article

Intel® Memory Protection Extensions Enabling Guide

This document describes Intel® Memory Protection Extensions (Intel® MPX), its motivation, and programming model. It also describes the enabling requirements and the current status of enabling in the supported OSs: Linux* and Windows* and compilers: Intel® C++ Compiler, GCC, and Visual C++*. Finally, the paper describes how ISVs can incrementally enable bounds checking in their Intel MPX...
Authored by Sundaram Ramakesavan (Intel) Last updated on 06/07/2017 - 09:36
Article

Introduction to Intel® Memory Protection Extensions

The C and C++ languages provide for memory access via pointers, however, these languages do not ensure the safe use of pointers.

Authored by RB (Intel) Last updated on 06/07/2017 - 09:40
Blog post

Intel® Memory Protection Extensions (Intel® MPX) Runtime Support

Enabling an application to use Intel MPX will generally not require source code updates but there is some runtime code needed in order to make use of Intel MPX.  For most applications this runtime

Authored by Brian Vajda (Intel) Last updated on 06/14/2017 - 15:44
Blog post
Article

Intel® SHA Extensions

Download PDF

Authored by admin Last updated on 06/14/2017 - 13:08
Article

How to Protect Apps from Buffer Overflow Attacks

Learn how to enhance security for software on Windows® 10 using Intel® Memory Protection Extensions.
Authored by Fanjiang Pei (Intel) Last updated on 06/06/2017 - 14:30
Blog post

Overview of Intel® Software Guard Extension Enclaves

Enclaves are isolated memory regions of code and data that are highly secure. Application code can be put into an enclave via special instructions and software via the Intel® SGX SDK. SGX Enclaves are hardened by CPU-based security mechanisms and can be remotely provisioned and attested.
Authored by Selvaraj, Surenthar (Intel) Last updated on 06/14/2017 - 16:43
For more complete information about compiler optimizations, see our Optimization Notice.