Defense in Depth Against Exploits on 11th Gen Intel® Core™ Processors

May 28, 2021

Whitepaper


Defense in Depth Against Exploits on 11th Gen Intel® Core™ ProcessorsFirmware is the new frontier for platform security. It is safe to say that if your firmware is compromised, then your platform is compromised. The firmware sets up and maintains the platform’s hardware security capabilities and hands off control to the operating system securely. 

In this paper, we look at a few ways you can use Insyde Software’s UEFI firmware and the Intel® System Resource Defense feature of the Intel Runtime BIOS Protection found in the 11th Gen Intel® Core™ Processor (codename Tiger Lake) when the firmware has been compromised. Either an attacker’s unauthorized code is executing in the firmware or authorized code in the firmware is executing badly under the attacker’s control. How can the user or IT administrator limit the damage and respond?

First, we’ll look at two types of firmware attacks that are a serious threat to computing platforms today. Second, we’ll look at how the defense-in-depth strategy deals with these attacks. Third, we’ll show how 11th Gen Intel Core Processors and Insyde’s InsydeH2O firmware are uniquely equipped to help end-users and IT administrators thwart these attacks.

Ready to view and download this whitepaper?













Read our Privacy Policy to understand what data we collect, why we collect it, and what we do with it. You may receive a request for your feedback from OpenSystems Media.

Featured Companies

Insyde Software

200 Friberg Parkway, Suite 3030
Westborough, MA 01581