Article

How to Protect Apps from Buffer Overflow Attacks

Learn how to enhance security for software on Windows® 10 using Intel® Memory Protection Extensions.
Autor Fanjiang Pei (Intel) Última actualización 06/06/2017 - 14:30
Article

基于 Windows® 10 的英特尔® 内存保护扩展:教程

Intel has introduced Intel® Memory Protection Extensions, a new extension to the instruction set architecture that aims to enhance software security by helping to protect against buffer overflow attacks.In this article, we discuss buffer overflow, and then give step-by step details on how application developers can prevent their apps from suffering from buffer overflow attacks on Windows® 10
Autor Fanjiang Pei (Intel) Última actualización 01/06/2017 - 11:19
Mensajes en el blog
Article

Intel® Intrinsics Guide

Overview
Autor admin Última actualización 14/06/2017 - 13:09
Article

Introduction to Intel® Memory Protection Extensions

The C and C++ languages provide for memory access via pointers, however, these languages do not ensure the safe use of pointers.

Autor RB (Intel) Última actualización 07/06/2017 - 09:40
Article

Linux* ABI

by Milind Girkar, Hongjiu Lu, David Kreitzer, and Vyacheslav Zakharin (Intel)

Autor Milind Girkar (Intel) Última actualización 14/06/2017 - 13:05
Mensajes en el blog
Article

Using Intel® MPX with the Intel® Software Development Emulator

Intel has announced a new technology called Intel® Memory Protection Extensions (Intel® MPX).

Autor Ady Tal (Intel) Última actualización 14/06/2017 - 13:15
Mensajes en el blog
Mensajes en el blog

Intel® Memory Protection Extensions (Intel® MPX) Runtime Support

Enabling an application to use Intel MPX will generally not require source code updates but there is some runtime code needed in order to make use of Intel MPX.  For most applications this runtime

Autor Brian Vajda (Intel) Última actualización 14/06/2017 - 15:44
Para obtener información más completa sobre las optimizaciones del compilador, consulte nuestro Aviso de optimización.