Article

Digital Security and Surveillance on 4th generation Intel® Core™ processors Using Intel® System Studio 2015

This article presents the advantages of developing embedded digital video surveillance systems to run on 4th generation Intel® Core™ processor with Intel® HD Graphics, in combination with the Intel® System Studio 2015 software development suite. While Intel® HD Graphics is useful for developing many types of computer vision functionalities in video management software; Intel® System Studio...
Authored by Last updated on 06/23/2019 - 18:50
Blog post

The Last Line Effect

Authored by Andrey Karpov (Blackbelt) Last updated on 05/30/2018 - 07:00
Article

Finding BIOS Vulnerabilities with Symbolic Execution and Virtual Platforms

Intel’s Excite project uses a combination of symbolic execution, fuzzing, and concrete testing to find vulnerabilities in sensitive code.
Authored by Engblom, Jakob (Intel) Last updated on 08/02/2019 - 15:51
Article

The DRNG Library and Manual

An introduction to the DRNG Library. Includes download links for the static binary libraries, source code, and documentation and a guide to getting started.
Authored by John M. (Intel) Last updated on 10/08/2019 - 18:20
Blog post

Detecting Ultrabook Sensors

With the recent launch of the 3rd Generation Intel Core Processors, Intel has introduced a new breed of Ultrabook and it’s a game-changer.  Ultrabooks and Convertibles based on the 3

Authored by Gael H. (Blackbelt) Last updated on 10/08/2019 - 18:20
Blog post

Utilizing AES New Instructions (AES-NI) in a Windows* 8 C# App

AES-NI is a new security feature available on the latest Intel® Atom™ Z3000 processors (codename Bay Trail).  AES-NI provides a set of hardware instructions onboard the processor that implement som

Authored by Rylee, Michael J (Intel) Last updated on 10/08/2019 - 18:20
Blog post

Overview of Intel® Software Guard Extension Enclaves

Enclaves are isolated memory regions of code and data that are highly secure. Application code can be put into an enclave via special instructions and software via the Intel® SGX SDK. SGX Enclaves are hardened by CPU-based security mechanisms and can be remotely provisioned and attested.
Authored by Last updated on 10/08/2019 - 18:20