Skip To Main Content
Intel logo - Return to the home page
My Tools

Select Your Language

  • Bahasa Indonesia
  • Deutsch
  • English
  • Español
  • Français
  • Português
  • Tiếng Việt
  • ไทย
  • 한국어
  • 日本語
  • 简体中文
  • 繁體中文
Sign In to access restricted content

Using Intel.com Search

You can easily search the entire Intel.com site in several ways.

  • Brand Name: Core i9
  • Document Number: 123456
  • Code Name: Emerald Rapids
  • Special Operators: “Ice Lake”, Ice AND Lake, Ice OR Lake, Ice*

Quick Links

You can also try the quick links below to see results for most popular searches.

  • Product Information
  • Support
  • Drivers & Software

Recent Searches

Sign In to access restricted content

Advanced Search

Only search in

Sign in to access restricted content.
  1. Hardware Security Academic Award

The browser version you are using is not recommended for this site.
Please consider upgrading to the latest version of your browser by clicking one of the following links.

  • Safari
  • Chrome
  • Edge
  • Firefox

Intel Hardware Security Academic Award

Rewarding Outstanding Innovation

The Intel Hardware Security Academic Award recognizes advancements in solutions, tools, and methodologies, which enhance the industry’s ability to deliver more secure and trustworthy foundational technologies. Launched in 2021, the program awards published papers that contain outstanding novel research with a meaningful impact on the hardware security ecosystem and industry, including technologies created by Intel.

The program also awards a Test of Time honor for research published more than 10 years ago that has demonstrated a significant and lasting impact in the security field.

Research Focus Areas

While we welcome all recently published papers demonstrating innovative research that advances product security in architecture, design, development, and validation, we highly encourage research in the following focus areas:

  • Use of AI to accelerate or enhance security and security developed to protect AI technologies from a hardware standpoint.
  • Use of analytics and machine learning to improve product security capabilities and robustness.
  • Groundbreaking advancements in foundational security capabilities, including next-generation cryptographic techniques, safety-critical systems verification, and resilience against adversarial behavior.
  • Innovations in scalable, automated tools and methodologies for hardware design and verification that are effective in addressing common security weaknesses, significantly improving product quality and assurance efficiency.
  • Emerging usages, threat analysis, systemic mitigations, and security enhancements that strengthen cloud-to-edge computing, accelerant, and communication solutions.
  • Architectural, micro-architecture, and circuit innovations that improve resiliency and reliability of silicon and electronics against transient faults.
  • Innovations in Confidential Manufacturing methodologies, tools, and capabilities to support Intel’s IDM 2.0 vision, offering assurance, transparency, and a trusted supply chain to the ecosystem.

2024 Award Winners

Test of Time Award Winner: “Flicker: An Execution Infrastructure for TCB Minimization”

Originally published in 2008 at the ACM European Conference on Computer Systems (EuroSys), this influential paper introduced a novel scheme for securely hosting mutually distrusting code on the same platform and has garnered nearly 1,000 citations to date. This approach marked a significant departure from the traditional hierarchical view of system security, offering a novel on-demand, isolated execution scheme that ensures end-to-end secure communication even in untrustworthy environments. By minimizing the Trusted Computing Base (TCB), Flicker provides a robust solution for secure code execution in diverse and potentially hostile settings. The paper's pioneering work has had lasting impact in the security field, influencing subsequent research work and practical applications that led to the confidential computing era.

 

Recent Publication Winner: “There’s Always a Bigger Fish: A Clarifying Analysis of a Machine-Learning-Assisted Side-Channel Attack”

This paper highlights the possibility of misinterpreting machine learning assisted side channel attacks that lead to incorrect conclusions regarding the root cause. Without proper attribution, mitigations and countermeasures may be incomplete. Their use of machine-learning experiments to rule out the cache-occupancy hypothesis appears to be a promising method to analyze sources of leakage in other side-channel attacks.

 

2024 winner announcement

2022 winner announcement

2021 winner announcement

Test of Time Award Winner: “Flicker: An Execution Infrastructure for TCB Minimization”
 
Originally published in 2008 at the ACM European Conference on Computer Systems (EuroSys), this influential paper introduced a novel scheme for securely hosting mutually distrusting code on the same platform and has garnered nearly 1,000 citations to date. This approach marked a significant departure from the traditional hierarchical view of system security, offering a novel on-demand, isolated execution scheme that ensures end-to-end secure communication even in untrustworthy environments. By minimizing the Trusted Computing Base (TCB), Flicker provides a robust solution for secure code execution in diverse and potentially hostile settings. The paper's pioneering work has had lasting impact in the security field, influencing subsequent research work and practical applications that led to the confidential computing era.
 
 
 
Recent Publication Winner: “There’s Always a Bigger Fish: A Clarifying Analysis of a Machine-Learning-Assisted Side-Channel Attack”
 
This paper highlights the possibility of misinterpreting machine learning assisted side channel attacks that lead to incorrect conclusions regarding the root cause. Without proper attribution, mitigations and countermeasures may be incomplete. Their use of machine-learning experiments to rule out the cache-occupancy hypothesis appears to be a promising method to analyze sources of leakage in other side-channel attacks.
 

More Information

Security research overview

Offensive security research

Defensive security research

Culture and capabilities research

Security practices overview

  • Company Overview
  • Contact Intel
  • Newsroom
  • Investors
  • Careers
  • Corporate Responsibility
  • Inclusion
  • Public Policy
  • © Intel Corporation
  • Terms of Use
  • *Trademarks
  • Cookies
  • Privacy
  • Supply Chain Transparency
  • Site Map
  • Recycling
  • Your Privacy Choices California Consumer Privacy Act (CCPA) Opt-Out Icon
  • Notice at Collection

Intel technologies may require enabled hardware, software or service activation. // No product or component can be absolutely secure. // Your costs and results may vary. // Performance varies by use, configuration, and other factors. Learn more at intel.com/performanceindex. // See our complete legal Notices and Disclaimers. // Intel is committed to respecting human rights and avoiding causing or contributing to adverse impacts on human rights. See Intel’s Global Human Rights Principles. Intel’s products and software are intended only to be used in applications that do not cause or contribute to adverse impacts on human rights.

Intel Footer Logo