Intel® Processor and Intel® Core™ i3 and Intel® Core™ 3 N-Series

Datasheet, Volume 1 of 2

ID Date Version Classification
759603 01/07/2025 Public
Document Table of Contents

Control-flow Enforcement Technology (Intel® CET)

Return-oriented Programming (ROP), and similarly CALL/JMP-oriented programming (COP/JOP), have been the prevalent attack methodology for stealth writers targeting vulnerabilities in programs.

CET provides the following components to defend against ROP/JOP style control-flow subversion attacks.