Platform Embedded Security Technology Revealed

Safeguarding the Future of Computing with Intel Embedded Security and Management Engine

by Xiaoyu Ruan

DescriptionTable of ContentsDetailsHashtagsReport an issue

Book Description

Platform Embedded Security Technology Revealed is an in-depth introduction to Intel's platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects applications' secrets and users' privacy in a secure, light-weight, and inexpensive way. Besides native built-in features, it allows third-party software vendors to develop applications that take advantage of the security infrastructures offered by the engine.

Intel's security and management engine is technologically unique and significant, but is largely unknown to many members of the tech communities who could potentially benefit from it. Platform Embedded Security Technology Revealed reveals technical details of the engine. The engine provides a new way for the computer security industry to resolve critical problems resulting from booming mobile technologies, such as increasing threats against confidentiality and privacy. This book describes how this advanced level of protection is made possible by the engine, how it can improve users' security experience, and how third-party vendors can make use of it.

It's written for computer security professionals and researchers; embedded system engineers; and software engineers and vendors who are interested in developing new security applications on top of Intel's security and management engine.

It's also written for advanced users who are interested in understanding how the security features of Intel's platforms work.

This open book is licensed under a Creative Commons License (CC BY-NC-ND). You can download Platform Embedded Security Technology Revealed ebook for free in PDF format (4.3 MB).

Table of Contents

Chapter 1
Cyber Security in the Mobile Age
1
Chapter 2
Intel's Embedded Solutions: from Management to Security
27
Chapter 3
Building Blocks of the Security and Management Engine
57
Chapter 4
The Engine: Safeguarding Itself before Safeguarding Others
89
Chapter 5
Privacy at the Next Level: Intel's Enhanced Privacy Identification (EPID) Technology
117
Chapter 6
Boot with Integrity, or Don't Boot
143
Chapter 7
Trust Computing, Backed by the Intel Platform Trust Technology
165
Chapter 8
Unleashing Premium Entertainment with Hardware-Based Content Protection Technology
181
Chapter 9
Breaking the Boundaries with Dynamically Loaded Applications
199
Chapter 10
Intel Identity Protection Technology: the Robust, Convenient, and Cost-Effective Way to Deter Identity Theft
211
Chapter 11
Looking Ahead: Tomorrow's Innovations Built on Today's Foundation
227

Book Details

Subject
Computer Science
Publisher
Apress
Published
2014
Pages
263
Edition
1
Language
English
ISBN13
9781430265719
ISBN10
143026571X
ISBN13 Digital
9781430265726
ISBN10 Digital
1430265728
PDF Size
4.3 MB
License
CC BY-NC-ND

Related Books

Intel Trusted Execution Technology for Server Platforms
Intel Trusted Execution Technology (Intel TXT) is a new security technology that started appearing on Intel server platforms in 2010. This book explains Intel Trusted Execution Technology for Servers, its purpose, application, advantages, and limitations. This book guides the server administrator / datacenter manager in enabling the technology as w...
Demystifying Internet of Things Security
Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Inte...
A Practical Guide to TPM 2.0
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do co...
Building the Infrastructure for Cloud Security
For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components nece...
Managing Risk and Information Security
Examine the evolving enterprise security landscape and discover how to manage and survive risk. While based primarily on the author's experience and insights at major companies where he has served as CISO and CSPO, the book also includes many examples from other well-known companies and provides guidance for a management-level audience. Managing...
Security Infrastructure Technology for Integrated Utilization of Big Data
This open access book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical institutions, and user institutions in a circle of trust. It begins by discussing the most relevant technical issues involved in creating safe and privacy-preserving big data distribution platforms, and especia...