An email has been sent to your address with instructions for changing your password.
There is no user registered with this email.
Sign Up
To create a free account, please fill out the form below.
Thank you for signing up!
A confirmation email has been sent to your email address. Please check your email and follow the instructions in the message to complete the registration process. If you do not receive the email, please check your spam folder or contact us for assistance.
Welcome to our platform!
Oops!
Something went wrong while trying to create your new account. Please try again and if the problem persist, Email Us to receive support.
Intel will showcase its security innovations at Black Hat USA 2022 from August 6-11 in Las Vegas. The company will host a booth (#1460) featuring live demos and theatre sessions on topics like Project Circuit Breaker and Intel® Software Guard Extensions. Additionally, Intel will participate in The Diana Initiative 2022, focusing on diversity in information security. Keynote speaker Miki Demeter will discuss career initiatives on August 11.
Positive
Participation in high-profile industry events like Black Hat USA and The Diana Initiative enhances Intel's visibility and reputation.
Intel's focus on security innovations, including Project Circuit Breaker, may attract interest from potential customers and partners.
Negative
None.
Intel experts present briefings, theatre sessions and more at Black Hat USA 2022 and The Diana Initiative 2022.
SANTA CLARA, Calif.--(BUSINESS WIRE)--
Join Intel experts on-site at Intel’s booth and for presented sessions at this year’s Black Hat USA 2022 and The Diana Initiative 2022, taking place in Las Vegas and virtually starting August 6.
Join Intel experts on-site at Intel’s booth and for presented sessions at this year’s Black Hat USA 2022, taking place in Las Vegas and virtually starting August 6. (Credit: Intel Corporation)
Intel will host an exhibition at Black Hat in the Business Hall at the Mandalay Bay Convention Center, booth #1460. Intel’s booth on the show floor will feature some of Intel’s security innovations, plus live demos, real-world use cases and theatre sessions on Intel’s Project Circuit Breaker, research from Intel Labs on security and privacy, confidential computing with Intel® Software Guard Extensions (Intel® SGX), Intel® Threat Detection Technology (Intel® TDT) on the Intel vPro® platform powered by 12th Gen Intel® Core™ and more. Anjuna, Eclypsium, Fortanix, Grip Security and JupiterOne will also participate in theatre sessions on-site.
For a full look at Intel’s theatre session schedule at booth #1460, see below (all times PDT; schedule subject to change).
Project Circuit Breaker: A Community of Elite Hackers
Presented by Intel
Wed., Aug. 10 | 10:15 – 10:30 a.m.
Security First Culture: Security is a Mindset, Not Just a Feature
Presented by Intel
Wed., Aug. 10 | 10:45 – 11 a.m.
Thu., Aug. 11 | 1:45 – 2 p.m.
Firmware Security: Detecting Vulnerabilities Below the OS
Presented by Intel and Eclypsium
Wed., Aug. 10 | 11:15 – 11:30 a.m.
Wed., Aug. 10 | 4:45 – 5 p.m.
Thu., Aug. 11 | 2:15 – 2:30 p.m.
Introduction to Hardware-based Threat Detection
Presented by Intel
Wed., Aug. 10 | 11:45 a.m. – noon
Wed., Aug. 10 | 3:45 – 4 p.m.
Thu., Aug. 11 | 2:45 – 3 p.m.
Lists vs. Graphs: Looking Beneath the Attack Surface
Presented by Intel and JupiterOne
Wed., Aug. 10 | 1:15 – 1:30 p.m.
Wed., Aug. 10 | 5:15 – 5:30 p.m.
Fortanix Confidential AI & Intel SGX: Accelerating the Use of AI/ML
Presented by Intel and Fortanix
Wed., Aug. 10 | 1:45 – 2 p.m.
Thu., Aug. 11 | 10:15 – 10:30 a.m.
Thu., Aug. 11 | 3:15 – 4 p.m.
Accelerating Adherence to Industry Security Standards
Presented by Intel
Wed., Aug. 10 | 2:45 – 3 p.m.
Thu., Aug. 11 | 10:45 – 11 a.m.
Confidential Computing 101
Presented by Intel and Anjuna
Wed., Aug. 10 | 2:15 – 2:30 p.m.
Thu., Aug. 11 | 11:15 – 11:30 a.m.
SaaS Security Control Plane Leveraging NLP-Based Discovery
Presented by Intel and Grip Security
Wed., Aug. 10 | 3:15 – 3:30 p.m.
Thu., Aug. 11 | 11:45 a.m. – noon
At The Diana Initiative 2022, a diversity-driven conference committed to helping all underrepresented people in information security, Intel will present a talk on fuzzing and Miki Demeter, security researcher at Intel, will close the conference as the final keynote speaker. The keynote is focused on how to take the initiative in one’s career journey and is scheduled to start at 4:30 p.m. PDT, Thursday, Aug. 11.
Find out why security begins at the hardware level and how Intel’s innovative technologies and research are moving the industry forward.
Project Circuit Breaker, A Community of Elite Hackers
Presented by Katie Trimble-Noble, director of Product Security and Bug Bounty at Intel. Project Circuit Breaker is a community of elite hackers – fixers and breakers – who hunt bugs in firmware, hypervisors, GPUs, compromising chipsets, pwning processors and other equipment. Missions include live hacking events on the latest Intel products, and even some pre-release opportunities, immersive training, and capture the flag events. Game Masters, Intel engineers, work closely with participants, and the community is encouraged to learn from each other. This isn’t your usual Bug Bounty program. Challenges focus on some of the biggest hurdles, and bounties are multiplied.
Fault-Injection Detection Circuits: Design, Calibration, Validation and Tuning
This session, presented by Daniel Nemiroff, senior principal Engineer at Intel and Carlos Tokunaga, principal engineer at Intel Labs, covers the tunable replica circuit (TRC), a fault-injection detection circuit that has been integrated into Intel® Converged Security and Management Engine (Intel® CSME) in the recent 12th Gen Intel Core processor. This is Intel's first foray into active fault-injection attack detection in high-volume products like CPUs and chipsets.
Since a timing failure is the primary goal of fault-injection attacks and has been shown as the vehicle to cause unsigned code to run on other security engines, using the TRC to explicitly detect timing failures is Intel's current approach to fault-injection detection in client security engines. Unlike traditional analog voltage and clock monitors, the TRC detects timing failures that result from voltage, clock, temperature and other glitch attacks, like electromagnetic radiation. This session will introduce the TRC technology, how the TRC was integrated into Intel CSME, the process for calibrating the TRC in high volume manufacturing (HVM), as well as the false-positive and fault-injection testing that occurred in our physical attack labs.
Fuzzing: A Must Have in Your Bug-Hunting Arsenal Fuzz testing, aka fuzzing, is a dynamic software testing mechanism designed to detect a wide spectrum of bugs and potential security vulnerabilities from memory corruption to deadlocks, from undefined behavior to exception handling. In combination with appropriate program instrumentation, fuzzing has proven its effectiveness to software developers, security validators as well as security researchers. Although fuzzing can greatly assist in bug finding, it has its own sets of challenges, such as coverage wall and effective input generation. This talk, presented by Priyam Biswas, offensive security researcher at Intel, will explore the common roadblocks in fuzzing and some of the best practices to overcome these challenges as well as how to best utilize the potential of fuzzing to find bugs and security. In addition, this talk will highlight how fuzzing can be adopted in the firmware domain despite the tight coupling with the target hardware platform.
Intel (Nasdaq: INTC) is an industry leader, creating world-changing technology that enables global progress and enriches lives. Inspired by Moore’s Law, we continuously work to advance the design and manufacturing of semiconductors to help address our customers’ greatest challenges. By embedding intelligence in the cloud, network, edge and every kind of computing device, we unleash the potential of data to transform business and society for the better. To learn more about Intel’s innovations, go to newsroom.intel.com and intel.com.