Control-Flow Enforcement Technology (Intel CET) offers protection against malware using control-flow hijacking attack methods on devices with Intel’s future Tiger Lake processors. Return Oriented Programming (ROP) and Call Oriented programming (COP) are techniques used by adversaries to bypass software and operating systems’ built-in anti-malware protections. Intel CET also extends threat protection capabilities on Intel vPro platforms that come with Intel Hardware Shield tech designed to defend against firmware-level attacks, such as Call and Jump indirect attacks.
Source: https://www.bleepingcomputer.com/news/security/intel-adds-cpu-level-malware-protection-to-tiger-lake-processors/

