Security
Determine security ramifications to protect personal data and information
106 Discussions

IPAS: Intel Debug Technology

IPAS_Security
Employee
0 0 1,163
Hi everyone,

In a previous post, we provided some high level information about Intel debugging tools. Today we are going deeper with the publication of the Intel Debug Technology technical paper that focuses on Intel® Debug Protection Technology and debug capabilities within Intel hardware.

Debug is a critical capability, not just in Intel hardware, but of any system in order to get it from manufacturing, to production, to deployment.  As the paper describes, where Intel differentiates itself in the industry is not only in our willingness to be transparent about these technologies, but also in our efforts to help define and adopt industry standards.

Enrico Carrieri, one of the authors of the paper joins myself and my colleague Christopher (CRob) Robinson in the video below. Enrico is a Senior Principal Engineer in the Debug Architecture and Ramp Enabling (DARE) team based out of Folsom, CA.  A 22-year veteran at Intel, he started as an analog engineering intern and moved into digital design and later lead debug architecture, design, and validation teams.  Enrico has worked on many of Intel’s products including those in Flash memory, chipsets, mobile devices, and recently in client and server.  As part of the DARE team, Enrico owns the corporate debug interfaces architecture and strategy and leads the debug security and privacy solutions strategy for the Intel® Debug Protection Technology.

Outside of Intel, Enrico chairs the MIPI Alliance Debug Working Group and has been a technical contributor on some of the MIPI Alliance’s latest specifications including the Narrow Interface for Debug and Test (NIDnT), I3C Basic, Debug for I3C, and the SneakPeek Protocol specifications.  He started what is now the Security WG in the MIPI Alliance and is an active participant authoring specifications. Enrico was also part of the USB Type-C Debug Accessory Mode definition from the USB-IF.

Enrico holds several patents and has patents pending on topics such as power savings, I3C, debug, and security (with a patent pending specifically on debug security architecture). He holds a BS in Electrical Engineering and a BS in Computer Engineering from Penn State.

https://youtu.be/1jebfW7Feeg

This paper demonstrates Intel’s strategy for the protection of sensitive assets and describes privilege levels from Intel debug mode, those available to systems manufacturers, on up to those available to anyone. This aligns with our Security-First Pledge.  We not only want customers to be educated and better understand our protection mechanisms, but to also engage with us on future developments in this area.

Thanks to Enrico and the DARE team for sharing the strategy and for continuing to share their expertise across the industry to help advance security and privacy for everyone!

Jerry Bryant
Sr. Director
Intel Product Assurance and Security
About the Author
Intel Product Assurance and Security (IPAS) is designed to serve as a security center of excellence – a sort of mission control – that looks across all of Intel. Beyond addressing the security issues of today, we are looking longer-term at the evolving threat landscape and continuously improving product security in the years ahead.