WHITEPAPER | July 29, 2025

Windows 11 Upgrade – The Hardware Security Focused Refresh

Windows 10’s End of Life (EoL) is slated for October 14th, 2025. After this date, it will no longer be supported, and businesses are expected to upgrade to Windows 11; however, this upgrade is entirely unlike previous Windows upgrades in that strict hardware requirements are needed to support Windows 11. The transition from Windows 10 to Windows 11 represents a major inflection point for enterprise IT and SecOps, the hardware requirements are there to help with overall cybersecurity, as Windows moves from a primarily software security model to a best-of-both-worlds hardware and software model. In this blog post we discuss in detail the benefits of such upgrade through Intel vPro®. This work is part of the research IOActive published in a recent white paper, which was commissioned by Intel®.

IOActive works closely with both Microsoft and silicon security vendors. In this blog post, we focus on how PCs powered by Intel® Core™ Ultra processors and Intel vPro® offer a compelling strategy for Windows 11 upgrades.

Windows 10 was launched in 2015 with a comprehensive software-based security feature list,[1] including Windows Defender Antivirus, Windows Firewall, and data encryption technologies like BitLocker. However, software-based solutions can only take you so far in protecting data and systems and can still be vulnerable to sophisticated malware, zero-day attacks, and other Advanced Persistent Threats (APTs).

Windows 11, shifts focus from software-only to a best-of-both-worlds software-and-hardware-based security solution.[2] Providing a more robust, tamper-resistant security posture, helping ensure “secure by default” and “secure by design” principles.

Modern Copilot+ PCs, such as those powered by Intel Core Ultra Processors (200v Series), are built with security at their foundational level. At the heart of this enhanced security is the Microsoft Pluton security processor.  Enabled by default, Pluton is designed to protect sensitive assets like credentials, encryption keys, and user identities by isolating them from potential attackers, even if they gain full access to the system.

Taking this to the next level, Microsoft designed Secured-core PCs to provide an “On-By-Default” security for businesses and users to provide three core pillars of protection:

  • Protecting identities from external threats
  • Securing the operating system from malware
  • Defending against hardware and firmware attacks

To properly support these secure pillars, specific hardware security requirements are necessary.

Microsoft Secured-core PCs are designed to provide an extra layer of protection against firmware, hardware, and software attacks offering three tiers of protection

These baseline security features are essential for SecOps teams aiming to reduce attack surfaces and ensure system integrity:

  • Secure Boot to block malicious code during startup.
  • TPM 2.0 for secure credential and key storage.
  • Hypervisor Code Integrity (HVCI) Capable (Memory Integrity) for kernel-level code integrity.

To meet the enhanced hardware security requirements, all of the standard hardware security features must be enabled as well as HVCI.

  • HVCI enabled, enforcing runtime code integrity to block advanced exploits

For organizations with high security requirements, these advanced capabilities offer deeper resilience:

  • Dynamic Root of Trust for Measurement (DRTM) to verify integrity during the boot process.
  • System Management Mode (SMM) Protection to isolate critical system functions from the OS.

This multi-tiered model helps enterprises align endpoint protections with their specific risk profile and compliance needs.

Inside Intel vPro

Intel vPro systems are built for enterprise environments requiring robust security, high performance, and strong manageability. They deliver over 30 hardware-enabled protections that extend Windows 11’s security model,

01. Out of Box – Security at First Boot

Every Intel vPro-based system with Windows 11 ships with essential security features pre-enabled. This “secure by default” approach ensures rapid deployment without sacrificing protection,

02. Intel vPro Surpasses Microsoft Secured-core PC L3 Requirements

Intel vPro goes beyond even the higher requirements of Secured-core PC, with additional security features and services to help SecOps teams with the deployment and support of their hardware fleet.

  • Intel Total Memory Encryption – Multi-Key (TME-MK) helps prevent data exposure from physical memory attacks..
  • Intel Virtualization Technology – Redirect Protection (VT-rp) Strengthens isolation in multi-tenant and hybrid environments.
  • Intel Threat Detection Technology (TDT) Provides AI-driven detection of advanced threats like ransomware..
  • Intel Active Management Technology (AMT) – BSOD Recovery Enables remote remediation even after crashes..
  • Intel Innovation Platform Framework (IPF) – Device Discovery offers real-time visibility into device configurations and status.

Deploying Intel vPro-based systems with Microsoft Pluton on Windows 11 ensures your business is not only compliant but also strategically prepared for tomorrow’s cybersecurity challenges. This is more than just protection; it’s long-term operational resilience.

03. Third-Party Assessed for Compliance

These capabilities are third-party validated against compliance standards such as NIST SP800-193, SP800-147, and SP800-155, easing audit and certification processes for industries like healthcare, finance, and government.

04. Industry Driven Validation Earlier this year, in collaboration with Microsoft, CrowdStrike, and AttackIQ, Intel mapped and ranked the hardware-optimized software security features against MITRE ATT&CK framework using the full set of Intel vPro security protections, some 30 hardware features, on a typical enterprise security software stack. This provided, in total, 90 hardware mitigations against real-world attacks when using Windows 11 and Windows Defender.

05. Achieve Enterprise-Class Security Posture

Together, Intel vPro and Pluton form a layered defense strategy that empowers IT leaders to confidently enforce zero-trust architectures, ensure business continuity, and scale securely in hybrid or cloud-native environments.

Conclusion

Upgrading from Windows 10 to Windows 11 is more than a user experience refresh, it’s a strategic opportunity to modernize your organization’s security architecture. With built-in protections Windows 11 sets a new baseline for device security.

For enterprises, the transition brings a clear advantage: by pairing Windows 11 with Intel vPro, organizations can go beyond compliance and exceed Secured-core PC requirements with hardware-enhanced capabilities like Intel TME-MK, Intel VT-rp, Intel TDT, and Intel AMT. These features offer operational benefits for SecOps teams, from accelerated recovery and advanced threat detection to improved device visibility and remote manageability.

This transition offers a rare out-of-the-box uplift for security and IT teams, delivering stronger protection without the complexity of traditional large-scale security projects.

Download our free white paper for more technical background around this mandatory update. 


[1] https://learn.microsoft.com/en-us/windows/security/threat-protection/overview-of-threat-mitigations-in-windows-10

[2] https://www.microsoft.com/insidetrack/blog/hardware-backed-windows-11-empowers-microsoft-with-secure-by-default-baseline/

COLLATERAL, WHITEPAPER | August 8, 2023

Shuffle Up and Deal: Analyzing the Security of Automated Card Shufflers | Joseph Tartaro, Enrique Nissim, Ethan Shackelford

Joseph Tartaro, Principal Security Consultant, Enrique Nissim, Principal Security Consultant, and Ethan Shackelford, Associate Principal Security Consultant, conducted a comprehensive analysis of the security aspects of ShuffleMaster’s Deck Mate 1 (DM1) and Deck Mate 2 (DM2) automated shuffler machines. Primarily used at poker tables, these machines are widely adopted by casinos and cardrooms and are commonly used in private games. While the primary objective of these devices is to enhance game speed by assisting dealers in shuffling, they also ensure security through various deck checks, and their control over the deck renders them highly desirable targets for attackers.

In this whitepaper, the team attempted to answer the following questions:

  • Is cheating possible if one of these hardware devices is compromised?
  • How feasible is it to perform such an attack?
  • What can be done to prevent and/or mitigate the risk of cheating?
  • How can players and gaming operators protect themselves from this kind of cheating?

It is worth noting that no signs of code from the manufacturer performing any malicious or hidden functions were found in either of the audited shufflers. Different groups across the internet have speculated that shufflers contain secret logic that Casinos and/or card rooms could leverage to cheat players or increase house edge. Having thoroughly reverse engineered the entire state machine of the original firmware for both shuffler models, we found no evidence whatsoever that this was the case.

WHITEPAPER | June 13, 2023

Drone Security and Fault Injection Attacks | Gabriel Gonzalez

Gabriel Gonzalez, IOActive Director of Hardware Security presents full technical detail of his research into drone security and side-channel/fault injection attacks in this whitepaper.

The use of Unmanned Aerial Vehicles (UAVs), commonly referred to as drones, continues to grow. Drones implement varying levels of security, with more advanced modules being resistant to typical embedded device attacks. IOActive’s interest is in developing one or more viable Fault Injection attacks against hardened UAVs.

This paper covers IOActive’s work in setting up a platform for launching side-channel and fault injection attacks using a commercially available UAV. We describe how we developed a threat model, selected a preliminary target, and prepared the components for attack, as well as discussing what we hoped to achieve and the final result of the project.

WHITEPAPER | April 19, 2022

Reverse Engineering of DAL-A Certified Avionics: Collins’ Pro Line Fusion—AFD-3700

Ruben Santamarta, IOActive Security Researcher, presents a highly technical and detailed look into reverse engineering the DAL-A Certified Avionics: Collins’ Pro Line Fusion—AFD-3700.

Modern avionic systems are designed according to the Integrated Modular Avionics concept. Under this paradigm, safety-certified avionic applications and non-critical airborne software share the same computing platform but are running at different partitions. In this context the underlying safety-critical certified RTOS provides the logical isolation, which should prevent unintended interactions between software with different criticalities.

This paper provides a comprehensive analysis of the architecture and vulnerabilities found on the Adaptive Flight Display component of the Collins Aerospace’s Pro Line Fusion solution. This integrated avionics system, deployed both in military and commercial aircraft, is certified as DO-178B/C Design Assurance Level A.

WHITEPAPER | April 5, 2022

Cyberattacks on SATCOM: Understanding the Threat

In 2014, Ruben Santamarta, Principal Security Consultant with IOActive, published a whitepaper titled “A Wake-up Call for SATCOM Security.” It detailed the discovery of an exceptionally weak security posture across a number of SATCOM terminals from a range of manufacturers. Four years later in 2018, Ruben published a follow up titled “Last Call for SATCOM Security” which detailed a thorough investigation into the security of SATCOM equipment across the Aviation, Maritime, and Military industries. In light of the cyberattacks at the start of the war in Ukraine, once again, the security posture was found to be overwhelmingly poor and in need of immediate and thorough corrective action by manufacturers.

WHITEPAPER | February 7, 2022

Facial Recognition Security Research

IOActive, Inc. (IOActive) has conducted extensive research and testing of facial recognition systems on commercial mobile devices. Our testing lab includes testing setups for 2D- and 3D-based algorithms, including technologies using stereo IR cameras.

For each of the different technologies, we first try to understand the underlying algorithms and then come up with creative and innovative setups to bypass them. Once an unlock is achieved, we calculate the Spoof Acceptance Rate (SAR), as described in the Measuring Biometric Unlock Security” section of the Android Compatibility Definition Document.1 This metric allows us to compare different solutions and evaluate the strength of each solution.

This document describes IOActive’s results for commercially available mobile phones implementing face authentication mechanisms to unlock the device. All them relied on the “selfie-camera,” a single lens producing 2D RGB images. IOActive used 2D and 3D masks when attempting to bypass the security features.

Our comparison was based on a set of objectives bundled into five categories: Below the OS, Platform Update, Trusted Execution, Advanced Threat Protection, and Crypto Extension. Based on IOActive research, we conclude that AMD offers no corresponding technologies those categories while Intel offers features; Intel and AMD have equivalent capabilities in the Trusted Execution category.

WHITEPAPER | May 17, 2021

Cross-Platform Feature Comparison

For an Intel-commissioned study, IOActive compared security-related technologies from both the 11th Gen Intel Core vPro mobile processors and the AMD Ryzen PRO 4000 series mobile processors, as well as highlights from current academic research where applicable.

Our comparison was based on a set of objectives bundled into five categories: Below the OS, Platform Update, Trusted Execution, Advanced Threat Protection, and Crypto Extension. Based on IOActive research, we conclude that AMD offers no corresponding technologies those categories while Intel offers features; Intel and AMD have equivalent capabilities in the Trusted Execution category.

WHITEPAPER | February 10, 2020

LoRaWAN Networks Susceptible to Hacking: Common Cyber Security Problems, How to Detect and Prevent Them

LoRaWAN is fast becoming the most popular wireless, low-power WAN protocol. It is used around the world for smart cities, industrial IoT, smart homes, etc., with millions of devices already connected.

The LoRaWAN protocol is advertised as having “built-in encryption” making it “secure by default.” As a result, users are blindly trusting LoRaWAN networks and not paying attention to cyber security; however, implementation issues and weaknesses can make these networks easy to hack.

Currently, cyber security vulnerabilities in LoRaWAN networks are not well known, and there are no existing tools for testing LoRaWAN networks or for detecting cyber attacks, which makes LoRaWAN deployments an easy target for attackers.

In this paper, we describe LoRaWAN network cyber security vulnerabilities and possible cyber attacks, and provide useful techniques for detecting them with the help of our open-source tools.

WHITEPAPER | August 7, 2019

Arm IDA and Cross Check: Reversing the 787’s Core Network

In 2008, the Dreamliner was presented as the world’s first e-Enabled commercial airplane. Boeing certainly introduced an impressive new set of functionalities, enabling the vast majority of the components to be highly integrated with and connected to regular systems, such as onboard maintenance, data-load, and the Crew Information System.

IOActive has documented our detailed attack paths and component vulnerabilities to describe the first plausible, detailed public attack paths to effectively reach the avionics network on a commercial airplane from either non-critical domains, such as Passenger Information and Entertainment Services, or even external networks. 

WHITEPAPER | September 25, 2018

Commonalities in Vehicle Vulnerabilities

With the connected car becoming commonplace in the market, vehicle cybersecurity continues to grow more important every year. At the forefront of security research, IOActive has amassed real-world vulnerability data illustrating the general issues and potential solutions to the cybersecurity threats today’s vehicles face.