Bug Hunting

Intel Credits Bug Bounty Program

Tagged: ,

Viewing 0 reply threads
  • Author
    • #168961
      Don Donzal

      In the official editorial on the latest Spectre-type variant, Intel states:

      Expecting that this category of side-channel exploits would be no different, one of the steps we took earlier this year was expanding our bug bounty program to support and accelerate the identification of new methods. The response to that program has been encouraging, and we are thankful for the continued partnership we have with the research community.

      As part of this ongoing work, today Intel and other industry partners are providing details and mitigation information for a new derivative of the original vulnerabilities impacting us and other chipmakers. This new derivative is called Variant 4, and it’s being disclosed jointly by GPZ and Microsoft’s Security Response Center (MSRC).

      Source: https://newsroom.intel.com/editorials/addressing-new-research-for-side-channel-analysis/


      • This topic was modified 3 years, 3 months ago by Don Donzal.
Viewing 0 reply threads
  • You must be logged in to reply to this topic.

Copyright ©2021 Caendra, Inc.

Contact Us

Thoughts, suggestions, issues? Send us an email, and we'll get back to you.


Sign in with Caendra

Forgot password?Sign up

Forgot your details?