Article

Digital Security and Surveillance on 4th generation Intel® Core™ processors Using Intel® System Studio 2015

This article presents the advantages of developing embedded digital video surveillance systems to run on 4th generation Intel® Core™ processor with Intel® HD Graphics, in combination with the Intel® System Studio 2015 software development suite. While Intel® HD Graphics is useful for developing many types of computer vision functionalities in video management software; Intel® System Studio...
Autor Última actualización 23/06/2019 - 18:50
Mensajes en el blog

Null Pointer Dereferencing Causes Undefined Behavior

I have unintentionally raised a large debate recently concerning the question if it is legal in C/C++ to use the &P->m_foo expression with P being a null pointer.

Autor Andrey Karpov (Blackbelt) Última actualización 30/05/2018 - 07:08
Mensajes en el blog

The Last Line Effect

Autor Andrey Karpov (Blackbelt) Última actualización 30/05/2018 - 07:00
Mensajes en el blog

Let's Play a Game - find bugs in popular open-source projects

Test your C/C++ skills - find bugs in popular open-source projects.
Autor Andrey Karpov (Blackbelt) Última actualización 30/05/2018 - 07:08
Article

Optimizing Power for Interactions between Virus Scanners and Pre-bundled Software

Download PDF

Autor Última actualización 30/07/2019 - 13:27
Article

Fast Computation of Huffman Codes

The generation of Huffman codes is used in many applications, among them the DEFLATE compression algorithm. The classical way to compute these codes uses a heap data structure. This approach is fairly efficient, but traditional software implementations contain lots of branches that are data-dependent and thus hard for general-purpose CPU hardware to predict. On modern processors with deep...
Autor James Guilford (Intel) Última actualización 09/07/2019 - 16:09
Article

英特尔® Tamper Protection Toolkit 可帮助 Scrypt 加密实用程序抵御逆向工程

This paper discusses how Intel® Tamper Protection Toolkit helps protect critical code and valuable data against reverse-engineering and tampering attacks. It describes all components of the Intel Tamper Protection Toolkit and explains how to refactor relevant code and apply tamper protection to the Scrypt utility.
Autor Última actualización 30/05/2018 - 07:00
Mensajes en el blog
Article

The future of authentication and transactions over the web (Part 1)

Banks and the payment industry have realized long ago that knowledge is not enough to confirm money transactions through the web.

Autor Última actualización 08/10/2019 - 18:20
Article

Intel® Digital Random Number Generator (DRNG) Software Implementation Guide

In introduction to the Intel® Digital Random Number Generator (DRNG). Includes prerequisite downloads and related software as well as an overview of DRNG use.
Autor John M. (Intel) Última actualización 08/10/2019 - 18:20