Intel Names {Hardware} Safety Award Winners | Information

SANTA CLARA, Calif.–(BUSINESS WIRE)–Aug 10, 2022–

What’s New: Right this moment, Intel introduced the winners of its second annual Intel Hardware Security Academic Award program, geared toward fostering progressive analysis into options, instruments and methodologies to deal with basic safety challenges and improve the trade’s capacity to ship safer and reliable foundational applied sciences.

“With the exponential development of information and synthetic intelligence (AI) throughout the compute spectrum, we’ve additionally seen elevated sophistication and frequency of assaults. As an trade, it’s crucial that we purpose to guard delicate datasets throughout all phases of the lifecycle – at relaxation, in transit and in use. Intel has a protracted historical past of working carefully with educational researchers to sort out massive challenges by means of applications like Intel Labs’ educational and college analysis grants, the Intel Bug Bounty program, and now by means of the {hardware} safety award. We worth their insights and dedication and, collectively, we’re making progress towards our shared imaginative and prescient of a protected and safe future.”

– Sridhar Iyengar, vice chairman of Intel Labs and director of Safety and Privateness Analysis

In regards to the Award Program: The {Hardware} Safety Educational Award program is a part of Intel’s dedication to collaborate with and foster developments within the safety analysis neighborhood. The award program invitations educational researchers to submit a just lately printed paper demonstrating novel analysis with a significant influence on the {hardware} safety ecosystem, together with however not restricted to Intel’s personal merchandise. Anand Rajan, senior director of Rising Safety Lab at Intel Labs, offered this yr’s awards throughout a reception in Boston that coincided with the USENIX Safety Symposium.

This yr’s program scope expanded to ask improvements in confidential manufacturing methodologies, instruments and capabilities, in assist of Intel’s IDM 2.0 vision for a trusted and safe provide chain ecosystem. A Take a look at of Time award was additionally added to this system to honor papers printed greater than 10 years in the past, which have demonstrated a major and lasting influence within the safety area.

For researchers who’re considering submitting a paper for subsequent yr’s program, the submission window shall be introduced on the program page.

In regards to the Prizes: A committee at Intel examined the viability, novelty, originality and relevance of all submissions with a deal with demonstrating vital contribution to and influence on the {hardware} safety trade. This yr’s candidates spanned 34 papers, that includes greater than 140 authors from educational and trade backgrounds throughout 11 international locations. One-time awards of $75,000 for first prize and $50,000 for second prize shall be granted to the winners’ educational establishment for use for additional analysis or curriculum growth. Along with the grant, successful authors will obtain entry to Intel’s digital pre-production take a look at setting to assist in future analysis and shall be invited to current their work on the invite-only Intel Security Conference (iSecCon) and shall be featured on Intel’s Cyber Safety Inside podcast.

About This 12 months’s Winners:

First place:A Formal Approach to Confidentiality Verification in SoCs at the Register Transfer Level

On this paper, researchers reveal how Distinctive Program Executing (UPEC) methodology can be utilized to purpose about confidentiality properties of a system-on-chip (SoC). UPEC methodology employs an environment friendly, induction-based formulation for data movement monitoring. Whereas the unique UPEC methodology was formulated for micro-architectural side-channel detection for CPUs, this work is demonstrating learn how to generalize and scale that methodology for confidentiality properties for SoCs. Their formulation works immediately on Register Switch Language (RTL) and has been built-in in a single industrial software backend, thus yielding a first-of-its-kind, virtually viable Pre-Si safety verification approach.

The successful group included:

  • Johannes Müller, Technische Universität Kaiserslautern
  • Mohammad R. Fadiheh, Technische Universität Kaiserslautern
  • Anna Lena Duque Antón, Technische Universität Kaiserslautern
  • Thomas Eisenbarth, Professor, Universität zu Lübeck
  • Dominik Stoffel, Apl. Professor, Technische Universität Kaiserslautern
  • Wolfgang Kunz, Professor, Technische Universität Kaiserslautern

Second place:Nyx: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types

This analysis demonstrates how trendy {hardware} options (Intel® Virtualization Know-how, prolonged web page tables [EPT], Intel® Processor Hint, and page-modification logging [PML]) can be utilized to construct efficient and progressive safety validation instruments. The analysis has significantly improved the flexibility to check crucial system software program, starting from embedded x86 firmware, to drivers, hypervisors and future confidential compute stacks. The truth is, inside Intel’s Safety Middle of Excellence, researchers have already begun to leverage and evolve the know-how, and the outcomes have contributed to a good stronger software program growth lifecycle.

The successful group included:

  • Sergej Schumilo, Ruhr-Universität Bochum
  • Cornelius Aschermann, Ruhr-Universität Bochum
  • Thorsten Holz, School, CISPA Helmholtz Middle for Data Safety

Take a look at of Time Award:AEGIS: Architecture for Tamper-Evident and Tamper-Resistant Processing

Revealed in 2003, this analysis describes a single-chip safe processor together with a configuration the place the underlying system software program is untrusted. The proposed structure included a number of novel concepts at the moment, corresponding to cryptographic measurement and attestation, reminiscence integrity verification and reminiscence encryption. This work helped encourage the broader area of reliable computing and the sensible realization of the novel options might be present in a variety of trusted execution environments (TEEs) deployed throughout the trade in the present day.

The successful group included:

  • G. Edward Suh, Professor, Cornell College, Analysis Scientist, Meta AI
  • Dwaine Clarke, Senior Lecturer, College of the West Indies
  • Blaise Gassend, Senior Employees Software program Engineer, Waymo
  • Marten van Dijk, Professor, Centrum Wiskunde & Informatica, Affiliated Professor, College of Connecticut
  • Srinivas Devadas, Webster Professor, Massachusetts Institute of Know-how

About Intel

Intel (Nasdaq: INTC) is an trade chief, creating world-changing know-how that allows international progress and enriches lives. Impressed by Moore’s Legislation, we constantly work to advance the design and manufacturing of semiconductors to assist deal with our clients’ biggest challenges. By embedding intelligence within the cloud, community, edge and each sort of computing gadget, we unleash the potential of information to rework enterprise and society for the higher. To be taught extra about Intel’s improvements, go to newsroom.intel.com and intel.com.

No product or element might be completely safe.

© Intel Company. Intel, the Intel emblem and different Intel marks are emblems of Intel Company or its subsidiaries. Different names and types could also be claimed because the property of others.

View supply model on businesswire.com:https://www.businesswire.com/news/home/20220810005757/en/

CONTACT: Jennifer Foss

1-425-765-3485

[email protected]

KEYWORD: CALIFORNIA UNITED STATES NORTH AMERICA

INDUSTRY KEYWORD: TECHNOLOGY SEMICONDUCTOR SECURITY SOFTWARE NETWORKS HARDWARE UNIVERSITY DATA MANAGEMENT EDUCATION ARTIFICIAL INTELLIGENCE

SOURCE: Intel

Copyright Enterprise Wire 2022.

PUB: 08/10/2022 06:30 PM/DISC: 08/10/2022 06:32 PM

http://www.businesswire.com/news/home/20220810005757/en

https://www.bakersfield.com/ap/information/intel-names-hardware-security-award-winners/article_f663a550-06fb-5a24-b332-f5e2019101da.html