The peril of data races. Shows how even the most innocent ones can break badly.
Digital Security and Surveillance on 4th generation Intel® Core™ processors Using Intel® System Studio 2015This article presents the advantages of developing embedded digital video surveillance systems to run on 4th generation Intel® Core™ processor with Intel® HD Graphics, in combination with the Intel® System Studio 2015 software development suite. While Intel® HD Graphics is useful for developing many types of computer vision functionalities in video management software; Intel® System Studio...
The generation of Huffman codes is used in many applications, among them the DEFLATE compression algorithm. The classical way to compute these codes uses a heap data structure. This approach is fairly efficient, but traditional software implementations contain lots of branches that are data-dependent and thus hard for general-purpose CPU hardware to predict. On modern processors with deep...
Intel’s Excite project uses a combination of symbolic execution, fuzzing, and concrete testing to find vulnerabilities in sensitive code.
How to adapt the GNU Multiple Precision Arithmetic Library (GMP) to work in Intel SGX enclaves.
Learn more about an in-depth analysis of code modernization performance conducted by optimizing original CPU code and re-running tests on the latest GPU/CPU hardware.
Download the static binary libraries, source code, and documentation from the link below:
A cross-platform library for obtaining cryptographically secure random numbers from the best available entropy source in the underlying system.
An introduction to the DRNG Library. Includes download links for the static binary libraries, source code, and documentation and a guide to getting started.