Blog post

How to Enable an Intel® Trusted Execution Technology Capable Server

Intel® Trusted Execution Technology (Intel® TXT) is a collection of hardware-based security technologies built into Intel’s silicon.  They address the security threats across physical and virtual i

Authored by Thai Le (Intel) Last updated on 03/26/2019 - 12:20
Article

Digital Security and Surveillance on 4th generation Intel® Core™ processors Using Intel® System Studio 2015

This article presents the advantages of developing embedded digital video surveillance systems to run on 4th generation Intel® Core™ processor with Intel® HD Graphics, in combination with the Intel® System Studio 2015 software development suite. While Intel® HD Graphics is useful for developing many types of computer vision functionalities in video management software; Intel® System Studio...
Authored by Last updated on 06/23/2019 - 18:50
Blog post

Using Whitelists to Improve Firmware Security

Firmware-based attacks typically attempt to add or modify system firmware modules stored in NVRAM. Tools provided by the open source CHIPSEC project can be used to generate and verify hashes of these modules, so users can detect unauthorized changes.
Authored by Brian Richardson (Intel) Last updated on 05/30/2018 - 07:00
Article

Finding BIOS Vulnerabilities with Symbolic Execution and Virtual Platforms

Intel’s Excite project uses a combination of symbolic execution, fuzzing, and concrete testing to find vulnerabilities in sensitive code.
Authored by Engblom, Jakob (Intel) Last updated on 08/02/2019 - 15:51