- Micro-architectural attacks
- Firmware attacks like microcode
- Platform configuration (Intel® vPro, Intel® Management Engine, etc.)
- Platform design
- Physical attacks (note that this is a deviation from our existing Bug Bounty policy)
- Firmware attacks
- Physical: I/O, storage, flash, memory, sensors, embedded controller, trusted platform module
- Firmware: BIOS, IP firmware components, embedded controller, sensor, trusted platform module, storage, flash storage
- Device drivers shipped with the device (such as Intel graphics drivers, Thunderbolt device drivers, Bluetooth device drivers, wireless drivers, ethernet drivers, chipset driver)
Részletek itt.
- A hozzászóláshoz be kell jelentkezni
- 95 megtekintés