Article

Digital Security and Surveillance on 4th generation Intel® Core™ processors Using Intel® System Studio 2015

This article presents the advantages of developing embedded digital video surveillance systems to run on 4th generation Intel® Core™ processor with Intel® HD Graphics, in combination with the Intel® System Studio 2015 software development suite. While Intel® HD Graphics is useful for developing many types of computer vision functionalities in video management software; Intel® System Studio...
Criado por Última atualização em 23/06/2019 - 18:50
Mensagem de blog

The Last Line Effect

Criado por Andrey Karpov (Blackbelt) Última atualização em 30/05/2018 - 07:00
Offsite Link

A Practical Library Operating System for Unmodified Applications

This paper disproves assumptions that unmodified applications can cause poor performance and a larger trusted computing base while running on Intel® Software Guard Extensions.
Criado por administrar Última atualização em 27/03/2019 - 16:09
Offsite Link

Secure Linux* Containers Managed By Docker*

The Secure Linux* Container Environment (SCONE) is a mechanism for Docker* that uses the Intel® Software Guard Extensions trusted execution to protect container processes from outside attacks.
Criado por administrar Última atualização em 28/03/2019 - 11:24
Offsite Link

Panoply: Low-Trusted Computing Base (TCB) Linux* Applications with Intel® SGX Enclaves (PDF)

In this paper, we present a new system called Panoply which bridges the gap between the Intel® Software Guard Extensions (Intel® SGX)-native abstractions and the standard OS abstractions which feat

Criado por administrar Última atualização em 02/04/2019 - 11:35
Offsite Link

How to Secure System Logs

System logs are the greatest forensics assets that capture how an operating system or a program behaves.

Criado por administrar Última atualização em 01/02/2019 - 10:48
Offsite Link

Create a Nondisclosure Cryptographic Library

Enforcing integrity and confidentiality of users’ application code and data is a challenging mission that any software developer working on an online production grade service is facing.

Criado por administrar Última atualização em 01/02/2019 - 09:25
Offsite Link

Enhance the Security and Privacy of Tor's Ecosystem Using Trusted Execution Environments

A practical approach to effectively enhancing the security and privacy of Tor by utilizing Intel® SGX, a commodity trusted execution environment
Criado por administrar Última atualização em 01/02/2019 - 10:46
Article

Finding BIOS Vulnerabilities with Symbolic Execution and Virtual Platforms

Intel’s Excite project uses a combination of symbolic execution, fuzzing, and concrete testing to find vulnerabilities in sensitive code.
Criado por Engblom, Jakob (Intel) Última atualização em 02/08/2019 - 15:51