How to Protect Apps from Buffer Overflow Attacks

Learn how to enhance security for software on Windows® 10 using Intel® Memory Protection Extensions.
作者: Fanjiang Pei (Intel) 最后更新时间: 2018/05/30 - 07:08

基于 Windows® 10 的英特尔® 内存保护扩展:教程

Intel has introduced Intel® Memory Protection Extensions, a new extension to the instruction set architecture that aims to enhance software security by helping to protect against buffer overflow attacks.In this article, we discuss buffer overflow, and then give step-by step details on how application developers can prevent their apps from suffering from buffer overflow attacks on Windows® 10
作者: Fanjiang Pei (Intel) 最后更新时间: 2018/12/20 - 09:40
File Wrapper
File Wrapper

Speculative Execution Side Channel Mitigations

作者: 管理 最后更新时间: 2018/05/23 - 16:36
File Wrapper

5-Level Paging and 5-Level EPT White Paper

作者: 管理 最后更新时间: 2019/05/08 - 17:27

Intel® Intrinsics Guide

作者: 管理 最后更新时间: 2019/09/10 - 08:15

Using the Intel® Software Development Emulator Chip-Check Feature

The Intel® Software Development Emulator (Intel® SDE) includes a software validation mechanism

作者: Mark Charney (Intel) 最后更新时间: 2019/09/10 - 08:21

Intel® Memory Protection Extensions Support in GCC* 5.0

You can download the latest Intel® Memory Protection Extensions (Intel® MPX) Runtime library sources for Linux* here:

作者: Evgeny Stupachenko (Intel) 最后更新时间: 2019/09/10 - 08:26

Intel® Software Development Emulator

Product overview for the Intel® Software Development Emulator or Intel® SDE
作者: Ady Tal (Intel) 最后更新时间: 2019/10/14 - 16:16