• Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io
No Result
View All Result
Converge Digest
Friday, April 10, 2026
  • Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io
No Result
View All Result
Converge Digest
No Result
View All Result

Home » Intel announces Control-Flow Enforcement Technology

Intel announces Control-Flow Enforcement Technology

June 15, 2020
in All
A A

Intel is introducing a new security capability in its silicon microarchitecture to help protect against common malware attack methods that have been a challenge to mitigate with software alone.

Intel’s new Control-Flow Enforcement Technology (Intel CET), which will be first available on Intel’s upcoming mobile processor code-named “Tiger Lake,” is designed to protect against the misuse of legitimate code through control-flow hijacking attacks – widely used techniques in large classes of malware.

Intel CET offers software developers two key capabilities to help defend against control-flow hijacking malware: indirect branch tracking and shadow stack. Indirect branch tracking delivers indirect branch protection to defend against jump/call-oriented programming (JOP/COP) attack methods. Shadow stack delivers return address protection to help defend against return-oriented programming (ROP) attack methods. These types of attack methods are part of a class of malware referred to as memory safety issues and include tactics such as the corruption of stack buffer overflow and use-after-free.

Microsoft’s support Intel CET in Windows 10 is called Hardware-enforced Stack Protection, and a preview of it is available today in Windows 10 Insider Previews. This new Hardware-enforced Stack Protection feature only works on chipsets with Intel CET instructions. It relies on a new CPU architecture that is compliant with Intel CET specifications. For applications running on an OS that supports Intel CET, users can expect detailed guidance from our partners on how applications “opt-in” for protection.

Tags: Blueprint columnsIntelSecuritySilicon
ShareTweetShare
Previous Post

Evoque Data Center Solutions appoints new CEO

Next Post

Broadcom joins Nokia’s ReefShark silicon program

Staff

Staff

Related Posts

Intel Q3 2025: AI Partnerships, Foundry Momentum, and U.S. Backing 
All

Intel Q3 2025: AI Partnerships, Foundry Momentum, and U.S. Backing 

October 23, 2025
Intel Ramps 18A Production at Fab 52
Semiconductors

Intel Ramps 18A Production at Fab 52

October 9, 2025
Intel Foundry Services forms USMAG Alliance
Semiconductors

NVIDIA and Intel Forge $5B Partnership to Build Data Center and PC Chips

September 18, 2025
Intel’s Q3 data center revenue dropped 27% yoy
Financials

Intel Names New Data Center, Client, and Foundry Leaders

September 8, 2025
Intel cites progress with U.S. fabs
Semiconductors

U.S. Takes 9.9% Stake in Intel with $8.9B Equity Investment

August 22, 2025
Intel breaks ground on its new fab in Ohio
Financials

Intel Posts Flat Revenue for Q2, Restructuring and Impairments

July 24, 2025
Next Post
Broadcom joins Nokia’s ReefShark silicon program

Broadcom joins Nokia's ReefShark silicon program

Please login to join discussion

Categories

  • 5G / 6G / Wi-Fi
  • AI Infrastructure
  • All
  • Automotive Networking
  • Blueprints
  • Clouds and Carriers
  • Data Centers
  • Enterprise
  • Explainer
  • Feature
  • Financials
  • Last Mile / Middle Mile
  • Legal / Regulatory
  • Optical
  • Quantum
  • Research
  • Security
  • Semiconductors
  • Space
  • Start-ups
  • Subsea
  • Sustainability
  • Video
  • Webinars

Archives

Tags

5G All AT&T Australia AWS Blueprint columns BroadbandWireless Broadcom China Ciena Cisco Data Centers Dell'Oro Ericsson FCC Financial Financials Huawei Infinera Intel Japan Juniper Last Mile Last Mille LTE Mergers and Acquisitions Mobile NFV Nokia Optical Packet Systems PacketVoice People Regulatory Satellite SDN Service Providers Silicon Silicon Valley StandardsWatch Storage TTP UK Verizon Wi-Fi
Converge Digest

A private dossier for networking and telecoms

Follow Us

  • Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io

© 2025 Converge Digest - A private dossier for networking and telecoms.

No Result
View All Result
  • Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io

© 2025 Converge Digest - A private dossier for networking and telecoms.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.
Go to mobile version