Skip To Main Content
Intel logo - Return to the home page
My Tools

Select Your Language

  • Bahasa Indonesia
  • Deutsch
  • English
  • Español
  • Français
  • Português
  • Tiếng Việt
  • ไทย
  • 한국어
  • 日本語
  • 简体中文
  • 繁體中文
Sign In to access restricted content

Using Intel.com Search

You can easily search the entire Intel.com site in several ways.

  • Brand Name: Core i9
  • Document Number: 123456
  • Code Name: Emerald Rapids
  • Special Operators: “Ice Lake”, Ice AND Lake, Ice OR Lake, Ice*

Quick Links

You can also try the quick links below to see results for most popular searches.

  • Product Information
  • Support
  • Drivers & Software

Recent Searches

Sign In to access restricted content

Advanced Search

Only search in

Sign in to access restricted content.
  1. Intel Advanced Security Development Practices
  2. Intel Security Research Expertise and Practices
  3. Intel Defensive Security Research Practices

The browser version you are using is not recommended for this site.
Please consider upgrading to the latest version of your browser by clicking one of the following links.

  • Safari
  • Chrome
  • Edge
  • Firefox

 

 

 

 

Defensive Research

Countering Known and Emerging Threats

Defensive research efforts focus on developing hardware and software mitigations for new and emerging threats to protect Intel platforms and customer data on our platforms.

Research is driven by today’s threat landscape and discovery of new vulnerabilities and exploits that require mitigation strategies. Defensive research leads to new mitigation methods, helping improve product resiliency. This work aids the Product Security Incident Response Team (PSIRT) efforts through:

  • Developing new features to accelerate mitigations
  • Helping triage incoming reports to verify researcher findings and assess risk
  • Evaluating effectiveness of mitigations to measure robustness of fixes and how well they address root causes

Research also helps in the development of new security capabilities that enable our customers to create new usages. Security technologies that research contributed to include:

  • Intel® Software Guard Extensions (Intel® SGX)
  • Intel® Control-Flow Enforcement Technology (Intel® CET)
  • Intel® Total Memory Encryption (Intel® TME)

Intel® SGX illustrates our commitment to continuous adoption of research learnings, having evolved from a client to cloud solution. Intel SGX has been battle-hardened and our research has strengthened the posture and capabilities to protect user data in the cloud.

Advanced Cybersecurity Research

Collaborating with the Defense Advanced Research Projects Agency (DARPA), we’re conducting research to advance capabilities for hardening machine learning against adversary attacks and protecting the confidentiality, privacy, and security of big data.

  • Intel Joins Georgia Tech in DARPA Program to Mitigate Machine Learning Deception Attacks
  • Intel to Collaborate with Microsoft on DARPA Program

Academic Partnerships

We fund research in academia worldwide to help foster development of future technologies:

  • Newly Launched Private AI Collaborative Research Institute Funds First 9 Research Projects
  • Intel® Labs Establishes Crypto Frontiers Research Center

More Information

Security Research Overview

Offensive Security Research

Culture & Capabilities Research

Security Practices Overview

  • Company Overview
  • Contact Intel
  • Newsroom
  • Investors
  • Careers
  • Corporate Responsibility
  • Inclusion
  • Public Policy
  • © Intel Corporation
  • Terms of Use
  • *Trademarks
  • Cookies
  • Privacy
  • Supply Chain Transparency
  • Site Map
  • Recycling
  • Your Privacy Choices California Consumer Privacy Act (CCPA) Opt-Out Icon
  • Notice at Collection

Intel technologies may require enabled hardware, software or service activation. // No product or component can be absolutely secure. // Your costs and results may vary. // Performance varies by use, configuration, and other factors. Learn more at intel.com/performanceindex. // See our complete legal Notices and Disclaimers. // Intel is committed to respecting human rights and avoiding causing or contributing to adverse impacts on human rights. See Intel’s Global Human Rights Principles. Intel’s products and software are intended only to be used in applications that do not cause or contribute to adverse impacts on human rights.

Intel Footer Logo