Intel® Memory Protection Extensions Enabling Guide

This document describes Intel® Memory Protection Extensions (Intel® MPX), its motivation, and programming model. It also describes the enabling requirements and the current status of enabling in the supported OSs: Linux* and Windows* and compilers: Intel® C++ Compiler, GCC, and Visual C++*. Finally, the paper describes how ISVs can incrementally enable bounds checking in their Intel MPX...
Authored by Sundaram Ramakesavan (Intel) Last updated on 02/04/2016 - 16:32

Introduction to Intel® Memory Protection Extensions

The C and C++ languages provide for memory access via pointers, however, these languages do not ensure the safe use of pointers.

Authored by RB (Intel) Last updated on 11/13/2015 - 08:56
Blog post

Intel® Memory Protection Extensions (Intel® MPX) Runtime Support

Enabling an application to use Intel MPX will generally not require source code updates but there is some runtime code needed in order to make use of Intel MPX.  For most applications this runtime

Authored by Brian Vajda (Intel) Last updated on 10/29/2015 - 14:40

Intel® Software Guard Extensions Tutorial Series: Part 1, Intel® SGX Foundation

This first article in the Intel® Software Guard Extensions (Intel® SGX) tutorial series is a brief overview of the technology. Learn how Intel SGX can protect your application's private information, including passwords, account numbers, financial information, encryption keys, and health records.
Authored by John M. (Intel) Last updated on 07/27/2016 - 10:32

KINETIC: Intel® Edison Compute Module Powers Wearable Protection Against Lifting Injuries

Heavy lifting is best handled with the legs. Or better yet, someone else’s legs.

Authored by Last updated on 07/27/2016 - 13:36

Intel® SHA Extensions

Download PDF

Authored by admin Last updated on 07/23/2013 - 08:58
For more complete information about compiler optimizations, see our Optimization Notice.