Blog post

Not just 1, but 2 flavors of the Manageability DTK

I just learned something new today.
Authored by Gael H. (Blackbelt) Last updated on 06/14/2017 - 16:20
Blog post

Null Pointer Dereferencing Causes Undefined Behavior

I have unintentionally raised a large debate recently concerning the question if it is legal in C/C++ to use the &P->m_foo expression with P being a null pointer.

Authored by Andrey Karpov (Blackbelt) Last updated on 05/30/2018 - 07:08
Blog post

The Last Line Effect

Authored by Andrey Karpov (Blackbelt) Last updated on 05/30/2018 - 07:00
Blog post

Let's Play a Game - find bugs in popular open-source projects

Test your C/C++ skills - find bugs in popular open-source projects.
Authored by Andrey Karpov (Blackbelt) Last updated on 05/30/2018 - 07:08
Blog post
Article

Designing Firmware for an Open World

As a firmware developer, you can provide consistency across a variety of firmware solutions for Intel silicon.
Authored by Michael G. (Intel) Last updated on 05/27/2019 - 14:23
Article

Finding BIOS Vulnerabilities with Symbolic Execution and Virtual Platforms

Intel’s Excite project uses a combination of symbolic execution, fuzzing, and concrete testing to find vulnerabilities in sensitive code.
Authored by Engblom, Jakob (Intel) Last updated on 08/02/2019 - 15:51
Article

A Kerberos*-Based Big Data Security Solution

The Hadoop* Authentication Service helped Alibaba* improve the quality, performance and TCO of its cloud user identity information management system.
Authored by Jiajia Li (Intel) Last updated on 07/29/2019 - 09:24
Article

MeshCentral - Introduction & Overview

 
Authored by Ylian S. (Blackbelt) Last updated on 10/08/2019 - 18:20
Blog post

Tips and Tricks when working with Intel® TXT

I've recently started learning about Intel® Trusted Executio

Authored by Last updated on 10/08/2019 - 18:20