Finding BIOS Vulnerabilities with Symbolic Execution and Virtual Platforms

Intel’s Excite project uses a combination of symbolic execution, fuzzing, and concrete testing to find vulnerabilities in sensitive code.
Authored by Engblom, Jakob (Intel) Last updated on 08/02/2019 - 15:51
Blog post

Track Reconstruction with Deep Learning at the CERN CMS Experiment

This blog post is part of a series that describes my summer school project at CERN openlab.

Authored by Last updated on 09/30/2019 - 16:50

Case Study: Optimized Code for Neural Cell Simulations

One of the Intel® Modern Code Developer Challenge winners, Daniel Falguera, describes many of the optimizations he implemented and why some didn't work.
Authored by Last updated on 10/03/2019 - 07:55

Hybrid Parallelism: A MiniFE* Case Study

This case study examines the situation where the problem decomposition is the same for threading as it is for Message Passing Interface* (MPI); that is, the threading parallelism is elevated to the same level as MPI parallelism.
Authored by David M. Last updated on 10/15/2019 - 16:40