Scott Bair is a key voice at Intel Labs, sharing insights into innovative research for inventing tomorrow’s technology.
Highlights:
- Black Hat 2022 is hosted in Las Vegas and runs August 10-11th with in-person and virtual attendance options.
- Intel Labs is running exhibition booth #1460 on the show floor of the Business Hall.
- Labs engineers will present a session on Fault-Injection Detection Circuits: Design, Calibration, Validation, and Tuning on Wednesday, August 10th.
Intel is a Platinum sponsor of this year’s Black Hat. Hosted at the Mandalay Bay Convention Center in Las Vegas, the main conference runs from August 10-11th. Although the conference offers virtual attendance options, you will not want to miss the chance to stop by Intel’s exhibition booth. Come see us in the Business Hall of the Convention Center at booth #1460 to learn about some of Intel’s latest security innovations. Live demos, real-world use cases and theatre sessions will detail Intel’s Project Circuit Breaker, Intel® Software Guard Extensions, and Intel® Threat Detection Technology on the Intel vPro® platform powered by 12th Gen Intel® Core™. Intel Labs will also showcase security research in the following areas:
- Confidential Computing: an industry initiative focused on helping to protect data and code while they are being processed in hardware-based TEEs. Intel Labs’ pioneering research led to the productization of Intel® Software Guard Extensions (Intel® SGX), which helps secure data while in use using TEEs. Featured in Intel® Xeon® Scalable processors, Intel SGX helps protect data using unique application isolation technology.
- Federated Learning: a distributed machine learning (ML) approach that enables organizational collaboration without exposing sensitive data or ML algorithms. Industries such as retail, manufacturing, healthcare, and financial services can benefit from federated learning to gain valuable insights from data. Research in federated learning explores securely connecting multiple systems and datasets and removing the barriers that prevent the aggregation of data for analysis and insight.
- Post-Quantum Cryptography: Intel is working to help ensure a safe transition to a quantum-enabled world. From our participation in the development of post-quantum encryption standards to increasing the robustness of code signing applications, we are committed to mitigating the risks associated with this promising technology.
- Trusted Media: multiple research initiatives to help users restore trust in media by being able to distinguish between real and fake content. In partnership with Intel’s security research team and internal business units, Intel Labs is working on integrating detection technology and media provenance in Intel products and is looking at how customers can integrate new technologies into their platforms.
- Homomorphic Encryption: a new cryptography system that preserves the integrity of data between multiple parties by performing calculations on encrypted data without exposing it. The technology is emerging as a leading method to enable data privacy and is particularly useful for supply chain security, regulatory compliance, and for performing private data analytics. Intel Labs is investigating new hardware and software acceleration approaches to greatly reduce the computational overhead required for homomorphic encryption.
Stop by to learn more about security at the hardware level, and how Intel’s innovative technologies and research are propelling the industry forward. Intel Labs’ engineers will also present a session on Fault-Injection Detection Circuits: Design, Calibration, Validation and Tuning. The presentation is on Wednesday, August 10th, from 3:20-4:00 PM in Islander FG (Level 1), and covers the tunable replica circuit (TRC). The TRC is a fault-injection detection circuit that has been integrated into Intel® Converged Security and Management Engine (Intel® CSME) in the recent 12th Generation Intel® Core™ Processor. This is Intel's first foray into active fault-injection attack detection in high-volume products such as CPUs and chipsets.
The primary goal of fault-injection attacks is timing failure. Through explicit timing failure detection, the TRC is Intel’s defense mechanism within client security engines. Unlike traditional analog voltage and clock monitors, the TRC detects timing failures that result from voltage, clock, temperature, and other glitch attacks, such as electromagnetic radiation. The session will introduce the TRC technology, how the TRC was integrated into Intel CSME, the process for calibrating the TRC in high volume manufacturing (HVM), as well as the false-positive and fault-injection testing that occurred in our physical attack labs.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.