Skip To Main Content
Intel logo - Return to the home page
My Tools

Select Your Language

  • Bahasa Indonesia
  • Deutsch
  • English
  • Español
  • Français
  • Português
  • Tiếng Việt
  • ไทย
  • 한국어
  • 日本語
  • 简体中文
  • 繁體中文
Sign In to access restricted content

Using Intel.com Search

You can easily search the entire Intel.com site in several ways.

  • Brand Name: Core i9
  • Document Number: 123456
  • Code Name: Emerald Rapids
  • Special Operators: “Ice Lake”, Ice AND Lake, Ice OR Lake, Ice*

Quick Links

You can also try the quick links below to see results for most popular searches.

  • Product Information
  • Support
  • Drivers & Software

Recent Searches

Sign In to access restricted content

Advanced Search

Only search in

Sign in to access restricted content.
  1. INT31 Security Research

The browser version you are using is not recommended for this site.
Please consider upgrading to the latest version of your browser by clicking one of the following links.

  • Safari
  • Chrome
  • Edge
  • Firefox

Welcome to INT31

Pioneering security research into new vulnerabilities, sophisticated attack techniques, and innovative mitigations, as well as breakthroughs in automation, including AI for security.

About INT31: Ground Zero for Security Research at Intel

Intel's commitment to safeguarding billions of users worldwide is unwavering. We deliver robust security solutions our customers can count on, protecting what matters most. INT31 is our world class security research team that performs cutting-edge offensive security research and analysis across all stages of our product engineering lifecycle, fortifying those products against emerging threats.

This is where we'll share deeper insights into these efforts, from groundbreaking discoveries to the latest advancements. Dive into our growing collection of technical articles, thought leadership pieces, in-depth research papers, and tools. These resources cover pioneering research that unveils new vulnerabilities, sophisticated attack techniques, and innovative mitigations, as well as breakthroughs in automation, including the use of AI for security.

We actively collaborate with ecosystem partners to advance the field of security research, and occasionally, we even extend our research to industry products. Our findings from these collaborations—and our own independent explorations—will be shared right here.

Our publications are crafted for the sharpest minds in security. If you're a security researcher, academic, ethical hacker, industry leader, product owner, or manager, you'll find valuable insights. We cover a broad spectrum, from showcasing the latest in Intel® Trust Domain Extensions, Intel® Software Guard Extensions and Intel® Threat Detection Technology to strategizing the security of modern AI. You'll also get an exclusive look at how our company-wide red teams proactively identify and neutralize vulnerabilities before they can impact our users.

We invite you to explore our work, leave your comments, and reach out for a deeper conversation. Your feedback and input are invaluable as we collectively advance the state of product security.

 

Dhinesh Manoharan
Vice President, Product Security and General Manager, INT31
int31@intel.com

Blogs

Hardening Security of Hardware IPs by Verifying Negative Space Formally

Negative testing is a cornerstone of security assurance, checking the behavior of a Design Under Test against unexpected inputs. Software fuzzing is widely used for negative testing of software, but it is not as effective for hardware. This blog covers why Formal Verification (FV) can be used to effectively perform negative testing of hardware, development advantages and key considerations.
Posted: September 9, 2025

 

Static RTL Analysis for Pre-Silicon (Security) Validation

Static Register Transfer Level (RTL) analysis is a technique for inspecting RTL code without simulation/emulation, making it more efficient than dynamic validation methods that are time and compute-intensive and often fail after extended runtimes due to simple integration issues. Learn how Intel developed a next-generation static RTL analysis tool for pre-silicon validation and the impact it has on pre-silicon validation.
Posted: August 19, 2025

 

Who’s at Fault? A Look at Post-Quantum Cryptography and Fault Injection Attacks

With growing interest in post-quantum cryptography (PQC), powered by algorithms designed to withstand attacks by projected quantum computing advances, researcher Daniel Dinu examines the importance of secure implementations of PQC, with focus on fault injection attacks and countermeasures.
Posted July 15, 2025 

 

New Accordion Mode Improves Protection of Cloud-Scale Data

NIST has initiated a project named “cryptographic accordion” aimed at solving many of the traditional cipher mode shortcomings, utilizing decades of cryptologic research and practical application of the original standards. This blog discusses issues facing block ciphers and looks at how accordion mode implementation could help meet the challenges. With the challenges mounting, the cryptographic community is looking for ways to fix that. In that vein, NIST has initiated a project for developing a new construct they named “cryptographic accordion”. That construct is aimed at solving many of the traditional cipher mode shortcomings, utilizing decades of cryptologic research and practical application of those original 800-38-family standards.
Posted July 15, 2025 

 

Video: Proactive Security Assurance: Attacking Hardware Vulnerabilities

Intel Fellow Anders Fogh shares insight on how formal methods for security including a pre-silicon approach based on tracking and architectural hardening, which are helping demonstrate that a system is complying with prescribed security properties.  
Posted March 19, 2025

FAQs

Frequently Asked Questions

INT31 reflects our mission. Think you know what it means? Take your best guess and then check back for a future post where we will  reveal the meaning and backstory behind the name INT31 and how it guides our work.

We wanted to start this blog to highlight the wonderful work we do to secure Intel's products. We intend for this blog to foster collaboration, increase engagement with industrial and academic partners, and give our customers more of an understanding of the lengths we go to secure the products they purchase.

INT31 is comprised of world-class security researchers. We will feature members of the team in a series of posts highlighting our talent.

On average, you will see 1-2 new blog posts a month.

Please check out the Intel Careers portal for all open positions.

Security @ Intel

Product Security Assurance

Learn how investments in people, processes, and tools are helping Intel drive the highest levels of security across our product portfolio. Applying best-known methods to integrate security principles throughout product design, build, and support is why you can be trust that no matter what you get from Intel, it was developed with security in mind.

Learn more

Intel Labs: Ensuring Trust at Every Level

Maintaining data integrity, privacy, and accuracy is at the heart of Intel Labs security research. From innovations that help protect sensitive workloads to the development of AI methods that will help restore the public’s trust in media, we are at the forefront of security and privacy research and development.

Learn more

Resources

2024 Intel Product Security Report

This 6th annual report covers vulnerabilities Intel publicly disclosed and competitive details, enabling a look at the types of vulnerabilities and the foundational technologies they impact.

Read the full report

Intel Ranked #1 in Product Security Assurance

An independent study from ABI Research assessed top silicon vendors on the innovation and implementation of their security assurance practices. 

Learn more

Microsoft & Intel Security Review: Intel® TDX

Learn more about Microsoft's Confidential Compute strategies built on Intel® Trust Domain Extensions (Intel ® TDX) and the joint security review of Intel TDX 1.5 during development.

Learn more

Show more Show less
  • Overview
  • Blogs
  • FAQs
  • Security @ Intel
  • Company Overview
  • Contact Intel
  • Newsroom
  • Investors
  • Careers
  • Corporate Responsibility
  • Inclusion
  • Public Policy
  • © Intel Corporation
  • Terms of Use
  • *Trademarks
  • Cookies
  • Privacy
  • Supply Chain Transparency
  • Site Map
  • Recycling
  • Your Privacy Choices California Consumer Privacy Act (CCPA) Opt-Out Icon
  • Notice at Collection

Intel technologies may require enabled hardware, software or service activation. // No product or component can be absolutely secure. // Your costs and results may vary. // Performance varies by use, configuration, and other factors. Learn more at intel.com/performanceindex. // See our complete legal Notices and Disclaimers. // Intel is committed to respecting human rights and avoiding causing or contributing to adverse impacts on human rights. See Intel’s Global Human Rights Principles. Intel’s products and software are intended only to be used in applications that do not cause or contribute to adverse impacts on human rights.

Intel Footer Logo