Page from 2010
Updated Jan 2015
EDB - Execute Disable Bit functionality
An Enterprise Security technology from Intel
What Intel say about EDB:
... can help
prevent certain classes of malicious buffer overflow attacks when combined
with a supporting operating system.
Windows is supposed to use this feature, however, if you search for: "execute disable bit vista" you get mostly
references to XP and SP2. If the feature were to one that is widely used you would think that Microsoft would promote its
No clear indication whether the Linux kernel can use it.
Below is a screen-shot from an HP Support Forum:
Conspiracy theories aside - I think that it is more a case of incompetence on the part of Intel and Insyde (and
the computer manufacturers) for not explaining things very well.
From another responder to the post:
"..... the recommendation to the industry was to disable the bit.
Because of the security issues with "Blue Pill Attacks".......
Like the Intel "Virtualization Technology", the operation of this feature depends on too
much "sleeping with the enemy"!
- usb s3 wake-up - 29 July 2013, Istanbul
- when was Execute Disable Bit (EDB) invented - 16 Feb 2011, sandiego.nmci.navy.mil - I take issue with the word "invented". However EDB was
introduced as a feature by Intel probably around the time of Windows NT development.
- INTEL EXECUTE DISABLE UTILITY XD BIT - 15 July 2010 google.com.tw - finally a recorded
instance of someone looking for information on this feature. I admit that I haven't been tracking specifically for this
until now. Also the relevance to Windows 7 and 64 bit operating systems is added with this comment.
- xd bit functionality - 13/Jun/2011, HK