≡ Menu

Intel’s Tiger Lake processors will feature on-chip malware protections

Intel’s Tiger Lake processors will feature on-chip malware protections

Intel CET offers software developers two main ways to help defend against control-flow hijacking malware: indirect branch tracking and shadow stack. Indirect branch tracking delivers indirect branch …

Read More