|
可能会有其他限制公共访问的结果; 登录 注册 以确保您看到所有向您提供的内容。
标题
图像:Trusted Computing Base Recovery
Guidance on the Trusted Computing Base Recovery process for Intel technologies, enabling users to verify security updates have been deployed and establish platform trust.
图像:GPIO Configuration Best Practices
Configuration guidance for General-Purpose Input/Output (GPIO) pins, uncommitted or shared function physical pins on an integrated circuit or electronic circuit board, controllable by software.
图像:Trust Domain Security Guidance for Developers
Intel® Trust Domain Extensions (Intel® TDX) introduces new, architectural elements to help deploy hardware-isolated, virtual machines (VMs) called trust domains (TDs).
图像:Reading and Writing Model Specific Registers in Linux
Model-specific registers (MSRs) are control registers that allow system software to interact with a variety of features. This brief article focuses on two of those utilities in the Linux OS.
图像:Threat Analysis Guidance for Gather Data Sampling
In some situations a malicious attacker may be able to infer stale data using Gather Data Sampling (GDS). This article provides guidance to users to perform a threat analysis for GDS exposure.
图像:MKTME Side Channel Impact on Intel TDX
In certain configurations and circumstances, Intel processors are affected by some new variants of cache-based side channel attacks from untrusted VMMs when Intel TDX is enabled.
图像:Configuring Workloads for Microarchitectural and Side Channel Security
Intel’s strategy for mitigating potential covert channels or side channel attacks that use hardware-based incidental channels involves both hardware and software.
图像:How Intel Guidance Enhances Industry Security
As an industry leader, Intel plays an outsized role in coordinating the industry response to security threats and has worked closely with the ecosystem to release mitigations in hardware and software.
图像:Data Operand Independent Timing ISA Guidance
Introducing a data operand independent timing processor mode and a list of instructions with data-independent timing that can be used with previous guidelines to mitigate timing side channels.
图像:Frequency Throttling Side Channel Guidance
CPU frequency throttling is triggered when CPU power limits are reached. This article provides software guidance for mitigating timing side channels due to CPU frequency behavior.
图像:Refined Speculative Execution Terminology
Refined definitions and descriptions of transient execution attacks, such as Spectre and Meltdown, to more accurately classify speculative execution security vulnerabilities
图像:Microcode Update Guidance
Details, instructions, and debugging information for system administrators applying microcode updates to Intel® processors
图像:SRBDS Mitigation Impact on Intel® Secure Key
Description of how the IA32_MCU_OPT_CTRL MSR affects the behavior of the RDRAND and RDSEED instructions to mitigate special register buffer data sampling
图像:Guidance for System Administrators to Mitigate Transient Execution...
Learn how transient execution attacks work, how to assess your systems’ risk, what mitigations and configuration options are available, and what options are appropriate for different environments
图像:An Optimized Mitigation Approach for Load Value Injection
Methodology and description of Intel's mitigation approach for Load Value Injection in LLVM/clang using LFENCE instructions
图像:Guidance for Enabling FSGSBASE
How to safely enable the FSGSBASE feature in experimental OS implementations
图像:Mitigation Strategies for JCC Microcode
How to monitor and recover from performance impacts related to the JCC erratum fixed in the November 2019 microcode update
图像:Evolving for Today’s Security First Mindset
Watch a video about how Intel has changed its organizations and industry engagements in response to transient execution attacks
图像:Intel Security Features and Technologies Related to Transient...
Overview of security features and technologies in Intel® processors that can be used to help mitigate transient execution attacks