|
There may be additional results restricted from public access; sign in or register to ensure you are seeing all content available to you.
Title
Guidance on the Trusted Computing Base Recovery process for Intel technologies, enabling users to verify security updates have been deployed and establish platform trust.
Configuration guidance for General-Purpose Input/Output (GPIO) pins, uncommitted or shared function physical pins on an integrated circuit or electronic circuit board, controllable by software.
Image for: Trust Domain Security Guidance for Developers
Intel® Trust Domain Extensions (Intel® TDX) introduces new, architectural elements to help deploy hardware-isolated, virtual machines (VMs) called trust domains (TDs).
Model-specific registers (MSRs) are control registers that allow system software to interact with a variety of features. This brief article focuses on two of those utilities in the Linux OS.
In some situations a malicious attacker may be able to infer stale data using Gather Data Sampling (GDS). This article provides guidance to users to perform a threat analysis for GDS exposure.
This article describes how Intel identifies microcode updates that are suitable to load at runtime. OSes can use this information to make informed decisions about when to load microcode updates.
Image for: MKTME Side Channel Impact on Intel TDX
In certain configurations and circumstances, Intel processors are affected by some new variants of cache-based side channel attacks from untrusted VMMs when Intel TDX is enabled.
Intel’s strategy for mitigating potential covert channels or side channel attacks that use hardware-based incidental channels involves both hardware and software.
As an industry leader, Intel plays an outsized role in coordinating the industry response to security threats and has worked closely with the ecosystem to release mitigations in hardware and software.
Introducing a data operand independent timing processor mode and a list of instructions with data-independent timing that can be used with previous guidelines to mitigate timing side channels.
Learn how cryptographic implementations use constant time principles to help protect secret data from traditional side channel attacks
CPU frequency throttling is triggered when CPU power limits are reached. This article provides software guidance for mitigating timing side channels due to CPU frequency behavior.
Refined definitions and descriptions of transient execution attacks, such as Spectre and Meltdown, to more accurately classify speculative execution security vulnerabilities
Introduction to XuCode and usage instructions to implement the Intel SGX instruction set
Details and how-to instructions for spectre-meltdown-checker.sh, a tool used to detect a system's potential vulnerability to transient execution attacks and current mitigation status
Details, instructions, and debugging information for system administrators applying microcode updates to Intel® processors
Description of how the IA32_MCU_OPT_CTRL MSR affects the behavior of the RDRAND and RDSEED instructions to mitigate special register buffer data sampling
Learn how transient execution attacks work, how to assess your systems’ risk, what mitigations and configuration options are available, and what options are appropriate for different environments
Instructions and guidelines for Linux* developers to update and verify microcode for Intel® processors
Methodology and description of Intel's mitigation approach for Load Value Injection in LLVM/clang using LFENCE instructions
How to safely enable the FSGSBASE feature in experimental OS implementations
How to monitor and recover from performance impacts related to the JCC erratum fixed in the November 2019 microcode update
How to apply security principles and industry best practices to help protect your code and systems from potential transient execution attacks
Watch a video about how Intel has changed its organizations and industry engagements in response to transient execution attacks
Overview of security features and technologies in Intel® processors that can be used to help mitigate transient execution attacks