Фильтры

Article

Digital Security and Surveillance on 4th generation Intel® Core™ processors Using Intel® System Studio 2015

This article presents the advantages of developing embedded digital video surveillance systems to run on 4th generation Intel® Core™ processor with Intel® HD Graphics, in combination with the Intel® System Studio 2015 software development suite. While Intel® HD Graphics is useful for developing many types of computer vision functionalities in video management software; Intel® System Studio...
Автор: Последнее обновление: 23.06.2019 - 18:50
Article

Using Enclaves from .NET*: Make ECALLS with Callbacks via OCALLS

Intel® SGX Code Sample: Learn how to mix enclaves with managed code on Microsoft Windows* platforms using the C# language. There are multiple solutions for accomplishing these tasks, and this article and its accompanying code sample demonstrate one approach.
Автор: John M. (Intel) Последнее обновление: 23.06.2019 - 18:50
Article

How to Protect Apps from Buffer Overflow Attacks

Learn how to enhance security for software on Windows® 10 using Intel® Memory Protection Extensions.
Автор: Fanjiang Pei (Intel) Последнее обновление: 30.05.2018 - 07:08
Article

基于 Windows® 10 的英特尔® 内存保护扩展:教程

Intel has introduced Intel® Memory Protection Extensions, a new extension to the instruction set architecture that aims to enhance software security by helping to protect against buffer overflow attacks.In this article, we discuss buffer overflow, and then give step-by step details on how application developers can prevent their apps from suffering from buffer overflow attacks on Windows® 10
Автор: Fanjiang Pei (Intel) Последнее обновление: 20.12.2018 - 09:40
Блоги

Intel® Software Guard Extensions Tutorial Series change and delay

A high priority project combined with the holidays took me away from the Intel­® Software Guard Extensions Tutorial Series briefly, but it is moving ahead again and I expect Part 8 to come out in t

Автор: John M. (Intel) Последнее обновление: 23.06.2019 - 19:20
Блоги

What you don’t know about firmware might get you 0wn3d

Following firmware developers on social media during Black Hat & Def Con can be a bit bewildering. Firmware is becoming more important in the realm of cybersecurity research.

Автор: Brian Richardson (Intel) Последнее обновление: 30.05.2018 - 07:00
Блоги

Breaking Firmware for Fun and Profit… and Security

Attacks operating at the firmware level can be difficult to discover. There are methods for detecting and defending against attacks, which Intel shares through open source and training.
Автор: Brian Richardson (Intel) Последнее обновление: 30.05.2018 - 12:19
Article

Finding BIOS Vulnerabilities with Symbolic Execution and Virtual Platforms

Intel’s Excite project uses a combination of symbolic execution, fuzzing, and concrete testing to find vulnerabilities in sensitive code.
Автор: Engblom, Jakob (Intel) Последнее обновление: 02.08.2019 - 15:51