The Security & Firmware IPs (SFIP) group employs cutting-edge cryptographic algorithms and cyber technologies to create end-to-end security solutions for the entire computer industry.
Our products target all market segments: from low-end laptops through IOT and automotive platforms and up to the most powerful supercomputers. SFIP security solutions are part of every Intel chip — more than 100 million units are shipped out to customers each year!
Join us to create a safer, secured virtual world using the latest and greatest cyber security technologies.
Read more…
Our team delivers industry leading secured solutions:
Our security researchers work with SFIP engineers to perform ongoing security reviews, enhancements, and special events like hackathons to keep our products secure.
Join us to create a safer, secured virtual world using the latest and greatest cyber security technologies.
Our elite security research team develops advanced embedded security solutions by analyzing emerging attack mechanisms and exploitation techniques and identifying vulnerabilities in firmware and software products. The team also implements advanced code analysis, fuzzing, and penetration testing techniques and tools.
Our firmware and embedded engineers develop secure code that runs inside Intel’s platforms using a technology stack that includes C/C++/Python in a multi-threaded environment.
The SFIP validation team develops software infrastructures and automation to validate our security engine products. We use all kinds of validation techniques: black box, white box, grey box, and more.
“I’m proud to work on system critical architecture, enhancing Intel’s security. It’s great knowing that FW we architected, developed, and validated is running on millions of systems around the world. All this is done in an environment where people are always willing to help, share their knowledge, and do what’s needed for our success”
“I’m proud to work on system critical architecture, enhancing Intel’s security. It’s great knowing that FW we architected, developed, and validated is running on millions of systems around the world. All this is done in an environment where people are always willing to help, share their knowledge, and do what’s needed for our success”
“One of the best things about our team is the fact that we naturally combine teamwork and long-lasting professional relationships with our strong motivation to drive results and get things done. This friendly and collaborative atmosphere coupled with strong drive to succeed is quite unique. It is very gratifying to cooperate and deliver highly complex projects, while learning from each other along the way.”
“One of the best things about our team is the fact that we naturally combine teamwork and long-lasting professional relationships with our strong motivation to drive results and get things done. This friendly and collaborative atmosphere coupled with strong drive to succeed is quite unique. It is very gratifying to cooperate and deliver highly complex projects, while learning from each other along the way.”
“SFIP is a role model in Silicon Root of Trust and Confidential Computing. It’s an amazing group of people that always hold themselves to the highest standards and strive for professional results. While doing that, we do not forget to have fun together and enjoy the great atmosphere in our group.”
“SFIP is a role model in Silicon Root of Trust and Confidential Computing. It’s an amazing group of people that always hold themselves to the highest standards and strive for professional results. While doing that, we do not forget to have fun together and enjoy the great atmosphere in our group.”
In SFIP, people development is our top priority, and we strive to retain the best talent. We enjoy a positive and happy environment based on a respectful, fair, transparent, and inclusive culture.
The career opportunities in SFIP are vast. You can move between technologies and disciplines, and you can choose your development path. Do you want to grow into a manager position, or to become a technical expert? How about both? You will always have new opportunities, challenges to learn from, and paths to grow into. Support and encouragement from your manager are guaranteed.
We deliver cutting-edge security technologies and act as leaders in the security market. We have high standards of professionalism using best industry methodologies in software development and security with great exposure and impact on the market. SFIP engineers present at the most prestigious conferences and share valuable technical knowledge with the industry.
Powering up (booting) a computer is much more complicated than you might think. The main CPU and memory, audio, graphics, network, and local interfaces all need to start running at the appropriate times with the correct configurations, and to execute the right firmware or software quickly, reliably, and securely. SFIP firmware plays a major role in computer boot flow. We securely propagate the hardware configuration to various hardware components in the system; we digitally verify and load firmware packages onto numerous hardware components on the system; and we provide the indicators that allow these hardware components to start running.
Intel Trust Domain Extensions (Intel TDX) is an Intel CPU security feature that protects virtual machines (VMs) running in the cloud. These VMs are called Trust Domains (TDs). With TDX, customers running in the cloud do not need to trust their cloud provider with their sensitive data. TDX removes the cloud provider from the TCB by preventing the cloud provider host Virtual Machine Monitor (VMM) or any other privileged software running on the system from reading or changing TD data. TDX also allows attesting that a TD is running in a legitimate TDX environment.
When we need to transfer secret information from one point to another, we encrypt it using a secret key to transform the data into “garbage” code that hides its true meaning. To recover the information, the matching secret key is needed. Our team delivers hardware-based encryption support for playing protected streaming video content on Intel platforms.
Trusted Platform Module (TPM) is an international standard defined by the Trusted Computing Group (TCG) for a dedicated security processor in charge of ensuring system integrity. The TPM provides secure storage for keys, digital certificates, and sealed user data. The TPM also provides infrastructure for code and configuration measurements as well as trusted attestation and reporting. Our team developed Intel PTT® (Platform Trust Technology), a fully functional TPM 2.0 integrated into the Intel chipset.
Intel technologies may require enabled hardware, software or service activation. // No product or component can be absolutely secure. // Your costs and results may vary. // Performance varies by use, configuration and other factors. // See our complete legal Notices and Disclaimers. // Intel is committed to respecting human rights and avoiding complicity in human rights abuses. See Intel’s Global Human Rights Principles. Intel’s products and software are intended only to be used in applications that do not cause or contribute to a violation of an internationally recognized human right.