指令集架构扩展

英特尔的指令集架构 (ISA) 继续在发展,其功能不断扩展,用户体验不断丰富,并不断产生跨行业的协同效益。

英特尔® 内存保护扩展(英特尔® MPX)

计算机系统正面临越来越复杂的的恶意攻击,其中一个较常见的形式是造成应用软件的缓冲区超越(即溢出)。

英特尔® MPX 是旨在增强软件牢固性的英特尔® 架构扩展之名称。 英特尔内存保护扩展提供的硬件功能可与编译器更改合用,确保在编译时的内存参照不致在运行时成为不安全。 英特尔内存保护扩展的两个最重要目的是:以低开销为新编译的代码提供此种能力,以及提供与现有软件组件的兼容性机制。 英特尔® MPX 将在未来的英特尔® 处理器中实现。

基于 Windows® 10 的英特尔® 内存保护扩展:教程 Intel has introduced Intel® Memory Protection Extensions, a new extension to the instruction set architecture that aims to enhance software security by helping to protect against buffer overflow attacks.In this article, we discuss buffer overflow, and then give step-by step details on how...
How to Protect Apps from Buffer Overflow Attacks Learn how to enhance security for software on Windows® 10 using Intel® Memory Protection Extensions.
Storing and loading bounds
Intel® Memory Protection Extensions Enabling Guide This document describes Intel® Memory Protection Extensions (Intel® MPX), its motivation, and programming model. It also describes the enabling requirements and the current status of enabling in the supported OSs: Linux* and Windows* and compilers: Intel® C++ Compiler, GCC, and Visual C++*. Finally...
Exposing Processor Features to Dynamic Languages Intel® for its part invests countless hours and billions of transistors to add features in our silicon products which will speed up people's lives. If only they knew how to take advantage of it! Part of our job in dynamic languages is what I call "putting the cookies on the bottom shelf". Make this...
Pointer Checker in ICC: requires dynamic linking of runtime libraries
2014/07/10
The -check-pointers switch, which enables the Pointer Checker feature available in Intel® Parallel Studio XE 2016, cannot be used with the -static flag on Linux* (/MT on Windows*) which forces all Intel libraries to be linked statically. The reason is that, by design, the Pointer Checker library “...
Using Intel® SDE's chip-check feature Intel® SDE includes a software validation mechanism to restrict executed instructions to a particular microprocessor. This is intended to be a helpful diagnostic tool for use when deploying new software. Use chip check when you want to make sure that your program is not using instruction features...
Using Intel® MPX with the Intel® Software Development Emulator Intel has announced a new technology called Intel® Memory Protection Extensions (Intel® MPX). To find out more, check out the Instruction Set Extensions web pages.  Once you know about Intel MPX, you may want to experiment with Intel® SDE. This article explains how to run Intel MPX with Intel SDE...
Intel® Memory Protection Extensions (Intel® MPX) Design Considerations   My very first exposure to buffer overflow was with Morris worm in 80’s and since then, we collectively have tried to get a good handle on buffer overflow as it impacts both security and robustness of C/C++ software. Needless to say, we have made significant progress with addressing buffer...
Intel® Memory Protection Extensions (Intel® MPX) Runtime Support Enabling an application to use Intel MPX will generally not require source code updates but there is some runtime code needed in order to make use of Intel MPX.  For most applications this runtime support will be available by linking to a library supplied by the compiler or possibly it will come...