Behind the Scenes of Intel Security and Manageability Engine

Behind the Scenes of Intel Security and Manageability Engine

Black Hat via YouTube Direct link

Auditing Mitigation

13 of 40

13 of 40

Auditing Mitigation

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Behind the Scenes of Intel Security and Manageability Engine

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Jen
  3. 3 Hardware
  4. 4 PCH
  5. 5 ROM
  6. 6 Key Generation
  7. 7 Secure Key Storage
  8. 8 Kernel
  9. 9 TCB
  10. 10 BringUp
  11. 11 Driver
  12. 12 Application
  13. 13 Auditing Mitigation
  14. 14 Micro Kernel Architecture
  15. 15 Micro Kernel Example
  16. 16 Ring Free Processes
  17. 17 ReadOnly Page
  18. 18 Secondary Protection
  19. 19 Nonlinear Buffer Overflow
  20. 20 Control for Integrity
  21. 21 Memory Corruption
  22. 22 End Branch
  23. 23 EnbridgeUp
  24. 24 Compare
  25. 25 Segmentation
  26. 26 Hardening
  27. 27 Security Lifecycle
  28. 28 GOpC
  29. 29 Error Flow
  30. 30 Changing the Address
  31. 31 Inflating the Code
  32. 32 Fuzzing
  33. 33 FL Instrumentation
  34. 34 FL Bit Sizes
  35. 35 Pipe Memory
  36. 36 Test Cycle
  37. 37 Test API
  38. 38 Manufacturing
  39. 39 Manageability
  40. 40 Summary

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.