Intel has launched a new technology, Control-flow Enforcement Technology (CET), which will be capable of fighting ROP/JOP/COP malware. CET will be first available on the latest Tiger Lake mobile CPUs. The technology will implement a “control-flow” order for operation execution within the CPU. It intends to prevent malware attacks by using the security mechanisms called indirect branch tracking and shadow stack.
CET’s shadow track implements Return Oriented Programming (RET) to secure the data. Indirect branch tracking ensures data security by using CPU “jump tables”.