Skip To Main Content
Intel logo - Return to the home page

Sign In

Your username is missing
Your password is missing

By signing in, you agree to our Terms of Service.

Forgot your Intelusername orpassword?

Frequently Asked Questions

Do you work for Intel? Sign in here.

Don’t have an Intel account? Sign up here for a basic account.

My Tools

Select Your Region

Asia Pacific

  • Asia Pacific (English)
  • Australia (English)
  • India (English)
  • Indonesia (Bahasa Indonesia)
  • Japan (日本語)
  • Korea (한국어)
  • Mainland China (简体中文)
  • Taiwan (繁體中文)
  • Thailand (ไทย)
  • Vietnam (Tiếng Việt)

Europe

  • France (Français)
  • Germany (Deutsch)
  • Ireland (English)
  • Italy (Italiano)
  • Poland (Polski)
  • Spain (Español)
  • Turkey (Türkçe)
  • United Kingdom (English)

Latin America

  • Argentina (Español)
  • Brazil (Português)
  • Chile (Español)
  • Colombia (Español)
  • Latin America (Español)
  • Mexico (Español)
  • Peru (Español)

Middle East/Africa

  • Israel (עברית)

North America

  • United States (English)
  • Canada (English)
  • Canada (Français)
Sign In to access restricted content

Using Intel.com Search

You can easily search the entire Intel.com site in several ways.

  • Brand Name: Core i9
  • Document Number: 123456
  • Code Name: Alder Lake
  • Special Operators: “Ice Lake”, Ice AND Lake, Ice OR Lake, Ice*

Quick Links

You can also try the quick links below to see results for most popular searches.

  • Product Information
  • Support
  • Drivers & Software

Recent Searches

Sign In to access restricted content

Advanced Search

Only search in

Sign in to access restricted content.
  1. Intel Security Research Expertise and Practices
Introducing 4th Gen Intel® Xeon® Scalable Processors Introducing 4th Gen Intel® Xeon® Scalable Processors
Introducing 4th Gen Intel® Xeon® Scalable Processors

The browser version you are using is not recommended for this site.
Please consider upgrading to the latest version of your browser by clicking one of the following links.

  • Safari
  • Chrome
  • Edge
  • Firefox

 

 

 

 

Research Fuels Continuous Improvement

Security Means You Never Stop Looking

Attacks are growing more complex and threats continue to evolve. It’s crucial that you have a way to keep ahead.

Intel employs dedicated teams of security research experts who are always examining ways to make our products more secure.

From researching known attacks to identifying what’s next, before it impacts you, Intel is always looking to break what we build to make our technology even stronger.

   

Offensive Research

Researchers investigate products for known and emerging threats, vulnerabilities, and attacks, including physical attacks. The focus is system-wide targets from transistor level to hardware design, system firmware, drivers, operating systems, and application software.

 

Learn more

    

Defensive Research

Threat landscape and intelligence detection of new  vulnerabilities and exploits that require systemic mitigations,  and evaluating response effectiveness. The focus includes industry-wide edge hardware and software mitigations for emerging and future vulnerabilities.

 

Learn more

    

Culture and Capabilities

Focused on getting our architects, developers, designers, and validators to think like a hacker, through tools, training, and immersive mentoring including hands-on research.

 

Learn more

Examples of Research Focus

  • Novel mitigation methodologies for transient execution (side channel) attacks
  • CPU microcode security threat research
  • Cryptographic hardware mitigations for side channel and fault injection resiliency
  • Vulnerability and mitigation research for telemetry leakage
  • Trusted Execution Engine security
  • Graphics hardware and kernel mode drivers
  • Security of AI accelerator solutions
  • Thermal and voltage attacks
  • Virtualization technology security
  • FPGA security
  • 5G end-to-end solutions
  • System firmware technologies
  • Pathfinding and research on hardware security analysis tools

Inside the Lab Where Intel Tries to Hack Its Own Chips

This WIRED article details the importance of research against physical attacks and why iSTARE’s proactive approach to reverse engineering weaknesses is vital to developing the next generation of attacks and defenses.

View on wired.com

Academic Research & Community Outreach


Intel invests in programs to engage the global security research community and better understand researcher perspectives. Programs include sponsored research, awards and recognition, community outreach, and mentorship/internship opportunities with the common goal to continually strengthen the global security research community that’s critical to accelerate the pace of innovation.

Learn more

Technology Designed for Defense in Depth

System-level security that starts in hardware, activated by software. Intel delivers technology that improves foundational security, data and workload protection, and software reliability.

Learn more
  • Company Overview
  • Contact Intel
  • Newsroom
  • Investors
  • Careers
  • Corporate Responsibility
  • Diversity & Inclusion
  • Public Policy
  • © Intel Corporation
  • Terms of Use
  • *Trademarks
  • Cookies
  • Privacy
  • Supply Chain Transparency
  • Site Map
  • Do Not Share My Personal Information

Intel technologies may require enabled hardware, software or service activation. // No product or component can be absolutely secure. // Your costs and results may vary. // Performance varies by use, configuration and other factors. // See our complete legal Notices and Disclaimers. // Intel is committed to respecting human rights and avoiding complicity in human rights abuses. See Intel’s Global Human Rights Principles. Intel’s products and software are intended only to be used in applications that do not cause or contribute to a violation of an internationally recognized human right.

Intel Footer Logo