Platform Embedded Security Technology Revealed

Safeguarding the Future of Computing with Intel Embedded Security and Management Engine

By Xiaoyu Ruan

Platform Embedded Security Technology Revealed Cover Image

Platform Embedded Security Technology Revealed is an in-depth introduction to Intel’s security and management engine, with details on the security features and the steps for configuring and invoking them. It's written for security professionals and researchers; embedded-system engineers; and software engineers and vendors.


Full Description

  • ISBN13: 978-1-4302-6571-9
  • 250 Pages
  • User Level: Beginner to Advanced
  • Publishing August 19, 2014, but available now as part of the Alpha Program
  • Available eBook Formats: EPUB, MOBI
  • Print Book Price: $39.99
  • eBook Price: $0.00

Related Titles

Full Description

Platform Embedded Security Technology Revealed is an in-depth introduction to Intel’s platform embedded solution: the security and management engine.  The engine is shipped inside most Intel chipsets for computers, tablets, and smartphones.  The engine realizes advanced security and management functionalities and protects applications’ secrets and users’ privacy in a secure, light-weight, and inexpensive way.  More importantly, it allows third-party vendors to develop applications that take advantage of the security features offered by the engine.

It's written for computer security professionals and researchers; embedded system engineers; and software engineers and vendors who are interested in developing new security applications on top of Intel’s security and management engine.

It’s also written for advanced users who are interested in understanding more details about the security features and the steps for configuring and invoking them.

Intel’s security and management engine is technologically unique and significant, but is largely unknown to many members of the tech communities who could potentially benefit from it.  Platform Embedded Security Technology Revealed reveals technical details of the engine. The engine provides a new way for the computer security industry to resolve critical problems resulting from booming mobile technologies, such as increasing threats against confidentiality and privacy.  This book describes how this advanced level of protection is made possible by the engine, how it can improve users’ security experience, and how third-party vendors can make use of it.

What you’ll learn

  • How to configure the engine and enable its applications
  • The pros and cons of doing security in the embedded engine
  • Handling dynamically loaded applications
  • How anonymous authentication works within the engine
  • DRM-scheme capabilities
  • The cyber security challenges behind the creation of the embedded security and management engine, and the solutions it presents
  • Basic cryptography and security infrastructural functions of the engine
  • Security hardening features of the engine



Who this book is for

Computer security professionals and researchers; embedded system engineers; software engineers and vendors who are interested in developing new security applications on top of Intel’s security and management engine; OEM (such as Lenovo, HP, etc.) marketing and R&D staff.

Table of Contents

Table of Contents

  1. Cyber Security in the Mobile Age
  2. Intel’s Embedded Solutions: from Management to Security
  3. Building Blocks of the Security and Management Engine
  4. The Engine: Safeguarding Itself before Safeguarding Others
  5. Your Privacy at the Next Level with Intel's Enhanced Privacy Identification (EPID) Technology
  6. Boot with Integrity, or Don’t Boot
  7. Trust Computing, Backed by Intel's Firmware-Based TPM
  8. Unleashing Premium Entertainment with Hardware-Based Content Protection Technology
  9. Breaking the Boundaries with Dynamically Loaded Applications
  10. Intel Identity Protection Technology: the Robust, Convenient, and Cost-Effective Way to Deter Identity Theft
  11. Looking Ahead: Tomorrow's Innovations Built on Today's Foundation

Errata

Please Login to submit errata.

No errata are currently published