Intel has come up with a chip-level plan to defeat attacks that use return-oriented programming to exploit memory vulnerabilities. The new measures are outlined in a preview specification from Intel ...
ROP, JOP, and COP attacks Intel CET (tech spec available here) provides two new key capabilities to help guard against control-flow hijacking malware: Shadow Stack (SS) and Indirect Branch Tracking ...
Researchers at Endgame are expected at Black Hat to introduce Hardware Assisted Control Flow Integrity (HA-CFI), which leverages features in the micro-architecture of Intel processors for security.