跳转至主要内容
英特尔标志 - 返回主页
我的工具

选择您的语言

  • Bahasa Indonesia
  • Deutsch
  • English
  • Español
  • Français
  • Português
  • Tiếng Việt
  • ไทย
  • 한국어
  • 日本語
  • 简体中文
  • 繁體中文
登录 以访问受限制的内容

使用 Intel.com 搜索

您可以使用几种方式轻松搜索整个 Intel.com 网站。

  • 品牌名称: 酷睿 i9
  • 文件号: 123456
  • Code Name: Emerald Rapids
  • 特殊操作符: “Ice Lake”、Ice AND Lake、Ice OR Lake、Ice*

快速链接

您也可以尝试使用以下快速链接查看最受欢迎搜索的结果。

  • 产品信息
  • 支持
  • 驱动程序和软件

最近搜索

登录 以访问受限制的内容

高级搜索

仅搜索

Sign in to access restricted content.

不建议本网站使用您正在使用的浏览器版本。
请考虑通过单击以下链接之一升级到最新版本的浏览器。

  • Safari
  • Chrome
  • Edge
  • Firefox

Software Security Guidance

This information is designed for developers and systems experts looking to understand potential vulnerabilities and assess risk, with resources and recommendations for building more secure solutions.

 

  • Overview
  • Advisory Guidance
  • Best Practices
  • Disclosure Documentation
  • Feature Documentation
  • More Information
  • Affected Processors

Your Source for Software and Hardware Security Information

Explore in-depth guidance related to the latest security vulnerabilities, as well as the Intel security features and best practices designed to help protect systems and code from those vulnerabilities. This information helps enable developers and system administrators to better understand how software and hardware can work together to create more secure computing environments in an evolving security landscape.

Learn More about Intel’s Security Guidance

Featured Security Guidance

View All
CVSS  Issue Overview CVE INTEL-SA Disclosure Date Technical Documentation (If Applicable)
5.6 Indirect Branch Predictor Delayed Updates CVE-2024-45332 INTEL-SA-01247 2025-05-13 n/a
4.7 Indirect Target Selection CVE-2024-28956 INTEL-SA-01153 2025-05-12 n/a
6.5 Register File Data Sampling CVE-2023-28746 INTEL-SA-00898 2024-03-12 n/a
 8.8 Redundant Prefix Issue CVE-2023-23583 INTEL-SA-00950 2023-11-14 n/a
 6.5 Gather Data Sampling CVE-2022-40982 INTEL-SA-00828 2023-08-08 Gather Data Sampling
 4.7

Branch History Injection

CVE-2022-0001

INTEL-SA-00598

2022-03-08

Branch History Injection
查看全部 显示较少

Check Affected Processors

Evaluate the impact of transient execution attacks from 2018 through today on Intel® CPUs to determine the recommended way to stay protected from potential attacks.

View Full Table

Trusted Computing Base Recovery Attestation

Get attestation guidance for Trusted Computing Base Recovery (TCB-R), which helps you deploy the latest security updates for confidential computing technologies, including Intel® Software Guard Extensions (Intel® SGX) and Intel® Trust Domain Extensions (Intel® TDX).

Learn More

Proactively Secure Software for Intel® Processors

To develop for system security and performance, developers must understand how software works with hardware. To balance both priorities:

  • Adhere to security best practices and secure coding principles as a first line of defense.
  • Download the latest microcode and follow the recommended mitigation guidance for known issues.
  • Learn Intel hardware behavior and how software can best use that behavior and associated features.

The following documents show how to develop and secure software running on Intel processors, as well as details and options for fine-tuned control of software and hardware features according to the most up-to-date guidance.

Latest Feature Documentation

Learn more about how to optimize your software using Intel's security features, platform controls, and performance enhancements. Always keep your systems up-to-date to ensure access to the latest features.

 

Data-Dependent Prefetcher

Some newer Intel processors support a new hardware prefetcher feature classified as a Data-Dependent Prefetcher (DDP), which exhibits properties designed to restrict side channel attacks.

 

Frequency Throttling Side Channel Software Guidance for Cryptography Implementations

For developers implementing cryptographic algorithms, to mitigate timing side channels due to cycle differences, Intel recommends selecting instructions whose execution time is data-independent.

 

Fast Store Forwarding Predictor

Learn about the Fast Store Forwarding Predictor performance feature and how its properties can be used to help prevent potential exploitation of transient execution disclosure gadgets.

 

MONITOR and UMONITOR Performance Guidance

Some Intel processors provide developers with the option to configure the behavior of MONITOR and UMONITOR instructions to improve performance. 

 

View Security Advisories

Visit the Intel Security Center to review a comprehensive list of fixes, workarounds, and recommendations for vulnerabilities identified with Intel products.

View All Advisories

Frequent References

Find guidance for common questions when assessing risk.

  • Threat Analysis Guidance for Gather Data Sampling
  • Intel's Research on Disclosure Gadgets at Indirect Branch Targets in the Linux* Kernel
  • Get Microcode Update Guidance
  • Runtime Microcode Update Guidance
  • Spectre and Meltdown Checker Script
  • Refined Speculative Execution Terminology

Security Information

Learn more about Intel's commitment to security.

  • Intel Security Newsroom
  • Security Center
  • Intel® Bug Bounty Program

Vulnerability Management at Intel

Intel has sophisticated systems to address security vulnerabilities in Intel products, led by the Product Security & Incident Response Team (PSIRT). Learn more about vulnerability handling and disclosure processes.

  • PSIRT Mission
  • Vulnerability Handling Processes

Report a Security Vulnerability

If you believe you've found a security vulnerability in an Intel product or solution, notify us through the Intel Bug Bounty Program, and work with Intel to mitigate and coordinate disclosure of the vulnerability.

Learn More

So You Found a Vulnerability

Watch this video to find out what you can expect when participating in the Intel Bug Bounty Program.

Glossary

FAQ

Contact

产品和性能信息

1

性能因用途、配置和其他因素而异。请访问 www.Intel.cn/PerformanceIndex 了解更多信息。

2

英特尔® 技术的功能和优势取决于系统配置,并且可能需要启用硬件、软件或服务才能激活。实际性能可能因系统配置的不同而有所差异。没有任何产品或组件能够做到绝对安全。请咨询您的系统制造商或零售商,或者访问 Intel.cn 了解更多信息。

  • 公司信息
  • 英特尔资本
  • 企业责任部
  • 投资者关系
  • 联系我们
  • 新闻发布室
  • 网站地图
  • 招贤纳士 (英文)
  • © 英特尔公司
  • 沪 ICP 备 18006294 号-1
  • 使用条款
  • *商标
  • Cookie
  • 隐私条款
  • 请勿分享我的个人信息 California Consumer Privacy Act (CCPA) Opt-Out Icon

英特尔技术可能需要支持的硬件、软件或服务激活。// 没有任何产品或组件能够做到绝对安全。// 您的成本和结果可能会有所不同。// 性能因用途、配置和其他因素而异。请访问 intel.cn/performanceindex 了解更多信息。// 请参阅我们的完整法律声明和免责声明。// 英特尔致力于尊重人权,并避免成为侵犯人权行为的同谋。请参阅英特尔的《全球人权原则》。英特尔产品和软件仅可用于不会导致或有助于任何国际公认的侵犯人权行为的应用。

英特尔页脚标志