Determine security ramifications to protect personal data and information
100 Discussions

Chips & Salsa Episode 7 - Hardware CWEs

0 0 1,407

Hi everyone,

In this episode, CRob and I talk to Intel's Jason Fung about the new Hardware Common Weakness Enumeration (HW CWE) 2021 Most Important Hardware Weaknesses list recently published at Listen as Jason explains what HW CWE is and why it's important for the industry as well as for academic research. 

About our guest:

Jason M. Fung is the Director of Offensive Security Research and Academic Research Engagement at Intel.  He oversees offensive security research of key technologies that power Intel’s edge, communication and data center products.  In addition, he leads academic and industry collaborations that advance product security assurance best practices for the semiconductor industry. Recent contributions include the creation of the community-driven Hardware Common Weakness Enumeration (CWE), and the industry-first Hardware Capture-the-Flag Competitions ( that inspire researchers to address some of the toughest challenges in Hardware Security.  He is a founding member of the CAPEC/CWE Advisory Board.  He has over two decades of industry experience in SoC architecture and performance, verification automation, product security consultation, penetration testing, path-finding, risk management, and engineering management.


About the Chips & Salsa video series:

Chips and Salsa is a regular video series with hosts Jerry Bryant and Christopher “CRob” Robinson.  The videos cover such topics as vulnerability disclosures, security incident response, security assurance practices, security technologies with thought-provoking interviews with subject matter experts from Intel and across the security technology spectrum.



Jerry Bryant

Sr. Director

Intel Product Assurance and Security

About the Author
Intel Product Assurance and Security (IPAS) is designed to serve as a security center of excellence – a sort of mission control – that looks across all of Intel. Beyond addressing the security issues of today, we are looking longer-term at the evolving threat landscape and continuously improving product security in the years ahead.