Intel Corporation
Binary translation for hardened software security
Last updated:
Abstract:
Processors in computerized systems can be targeted by hostile actors seeking to bypass security policies and may employ published or otherwise known vulnerabilities. Embodiments may include security subsystems and methods of operation that identify known vulnerabilities during execution and implement countermeasures or enforce security policies.
Status:
Grant
Type:
Utility
Filling date:
28 Dec 2018
Issue date:
19 Apr 2022