Offensive Security Research
Focused on What’s Known and What’s Next
Facing relentless security threats, researchers continually monitor and probe Intel technologies with one goal in mind: Figure out what we haven’t thought about previously to get ahead of new attack vectors in the logical and physical attack space.
These research experts conduct in-depth adversarial analysis of technology architecture, focusing on system level security spanning hardware and software layers, and have dedicated specialists looking at physical and fault injection attacks to resolve vulnerabilities and weaknesses. Their work supports the following areas:
- Intelligence Insights: New industry and academia security results
- Architecture Review: Assess against Security Objectives
- Threat Model ++: Continue to align with evolving threats
- Vulnerability & Exploitation: Find novel vulnerabilities, develop Proof of Concept exploits
- Systemic Mitigations: Looking to eliminate classes of vulnerabilities
Offensive research is driven by distinct teams: the Strategic Threats Offensive Research and Mitigations (STORM), Intel Security Threat Analysis and Reverse Engineering (iSTARE) and Offensive Security Research (OSR) teams. The teams hold deep experience in logical and physical attacks and run a state-of-the-art lab focusing on fault injection, side channels, reverse-engineering, crypto/Post Quantum Cryptography (PQC), and artificial intelligence/machine learning.
Research findings go beyond product quality. Intel follows a closed-loop process and what our researchers learn is continually fed back into future roadmaps as well as shared with industry collaborators.