Introduction to Intel® Memory Protection Extensions

The C and C++ languages provide for memory access via pointers, however, these languages do not ensure the safe use of pointers.

作者: RB (Intel) 最后更新时间: 2017/06/07 - 09:40

Linux* ABI

by Milind Girkar, Hongjiu Lu, David Kreitzer, and Vyacheslav Zakharin (Intel)

作者: Milind Girkar (Intel) 最后更新时间: 2017/06/14 - 13:05

Intel® Memory Protection Extensions (Intel® MPX) support in the GNU toolchain

作者: 最后更新时间: 2017/06/14 - 13:26

Using Intel® MPX with the Intel® Software Development Emulator

Intel has announced a new technology called Intel® Memory Protection Extensions (Intel® MPX).

作者: Ady Tal (Intel) 最后更新时间: 2018/05/22 - 05:09

Intel® Memory Protection Extensions (Intel® MPX) Runtime Support

Enabling an application to use Intel MPX will generally not require source code updates but there is some runtime code needed in order to make use of Intel MPX.  For most applications this runtime

作者: Brian Vajda (Intel) 最后更新时间: 2017/06/14 - 15:44

Pointer Checker in ICC: requires dynamic linking of runtime libraries

The -check-pointers switch, which enables the Pointer Checker feature available in Intel® Parallel Studio XE 2016, cannot be used with the -static flag on Linux* (/MT on Windows*) which force

作者: 管理 最后更新时间: 2019/01/03 - 13:30

Intel® Memory Protection Extensions Support in GCC 5.0

You can download the latest Intel® Memory Protection Extensions (Intel® MPX) Runtime library sources for Linux* here:

作者: Evgeny Stupachenko (Intel) 最后更新时间: 2019/03/25 - 08:37

How to Protect Apps from Buffer Overflow Attacks

Learn how to enhance security for software on Windows® 10 using Intel® Memory Protection Extensions.
作者: Fanjiang Pei (Intel) 最后更新时间: 2018/05/30 - 07:08
File Wrapper

Speculative Execution Side Channel Mitigations

作者: 管理 最后更新时间: 2018/05/23 - 16:36