Блоги

Intel® Memory Protection Extensions (Intel® MPX) Design Considerations

 

Автор: Baiju Patel. (Intel) Последнее обновление: 29.05.2018 - 09:28
Блоги

Exposing Processor Features to Dynamic Languages

Intel® for its part invests countless hours and billions of transistors to add features in our silicon products which will speed up people's lives. If only they knew how to take advantage of it! Part of our job in dynamic languages is what I call "putting the cookies on the bottom shelf". Make this advanced technology easily consumable, and show you the value of it so you can be sure to use it.
Автор: David S. (Blackbelt) Последнее обновление: 04.07.2019 - 19:43
Article

How to Protect Apps from Buffer Overflow Attacks

Learn how to enhance security for software on Windows® 10 using Intel® Memory Protection Extensions.
Автор: Fanjiang Pei (Intel) Последнее обновление: 30.05.2018 - 07:08
Article

基于 Windows® 10 的英特尔® 内存保护扩展:教程

Intel has introduced Intel® Memory Protection Extensions, a new extension to the instruction set architecture that aims to enhance software security by helping to protect against buffer overflow attacks.In this article, we discuss buffer overflow, and then give step-by step details on how application developers can prevent their apps from suffering from buffer overflow attacks on Windows® 10
Автор: Fanjiang Pei (Intel) Последнее обновление: 20.12.2018 - 09:40
Блоги

How Simics* found a Xen* Bug – Why Target Variation Matters

Автор: Engblom, Jakob (Intel) Последнее обновление: 04.07.2019 - 18:49