申し訳ありませんが、この PDF はダウンロード形式でのみご提供しています。
Intel® Trusted Execution Technology Measured Launched Environment Programming GuideIntel’s technology for safer computing, Intel® Trusted Execution Technology (Intel® TXT), defines platform-level enhancements that provide the building blocks for creating trusted platforms.Whenever the word trust is used, there must be a definition of who is doing the trusting and what is being trusted. This enhanced platform helps to provide the authenticity of the controlling environment such that those wishing to rely on the platform can make an appropriate trust decision. The enhanced platform determines the identity of the controlling environment by accurately measuring the controlling software.Another aspect of the trust decision is the ability of the platform to resist attempts to change the controlling environment. The enhanced platform will resist attempts by software processes to change the controlling environment or bypass the bounds set by the controlling environment.What is the controlling environment for this enhanced platform? The platform is a set of extensions designed to provide a measured and controlled launch of system software that will then establish a protected environment for itself and any additional software that it may execute.These extensions enhance two areas:• The launching of the Measured Launched Environment (MLE)• The protection of the MLE from potential corruptionThe enhanced platform provides these launch and control interfaces using Safer Mode Extensions (SMX).Read the full Intel® Trusted Execution Technology Measured Launched Environment Programming Guide.
Managing privacy, data and application security
A conversation on stealth crimeware, why this malware is dangerous to customers and how to combat it.
What is Intel® Core™ vPro™ Technology Animation
Intel CISO, Malcolm Harkins shares his perspective on security and the cloud.
Hear how 3rd generation Intel® Core™ vPro™ processors deliver intelligent performance with embedded security and helps CompuCom reduce customers’ costs while increasing security and productivity.
Arm software with the visibility and tools it needs to prevent, find, freeze, and fix vulnerabilities.