Intel Corporation
Binary translation for hardened software security

Last updated:

Abstract:

Processors in computerized systems can be targeted by hostile actors seeking to bypass security policies and may employ published or otherwise known vulnerabilities. Embodiments may include security subsystems and methods of operation that identify known vulnerabilities during execution and implement countermeasures or enforce security policies.

Status:
Grant
Type:

Utility

Filling date:

28 Dec 2018

Issue date:

19 Apr 2022