0

Technology is a gift for us and computers or computer networks is one of them. It is so useful in every field. But as everything has its good side it also has bad or a dark side which we should avoid. But there are some weird minded persons in our society.  who are using their brains for bad side or bad work in this technology. It is called Cyber Crime, like hacking or data breaches activities. Obviously, it is a crime, which is spreading so much. But as every lock has its key and every problem keeps the solution, the researchers have a chip called Morpheus. Which can help over this problem?

Introduction

At the University of Michigan (U-M), a new computer processor architecture has developed. This could assist in the future where computers proactively defend against cyber threats. They are rendering the current electronic security model of bugs and patches obsolete.

There is a chip called Morpheus, which encrypts and randomly shuffled key bits of its own code to block potential attacks. It data 20 times per second. This processor is faster than a human hacker and a thousand times faster than even the fastest electronic hacking techniques, according to the team at U-M.

Today`s Approach

“Nowadays approach of eliminating security bugs one by one is losing the game,” as per Todd Austin, “people are constantly writing code and as long as there is new code, there will be new bugs and security vulnerabilities.”

Even the developer of the system said that, If the hacker finds a bug with Morpheus, the information needed to exploit it vanishes 50 milliseconds later. It`s perhaps the closest thing to a future-proof secure system. Austin and his colleagues have demonstrated a DAPRA-funded prototype processor that successfully defended against every known variant of the control-flow attack, this is the most dangerous and widely used technique. As per researchers, the technology could be used in a variety of applications. Where simple and reliable security will be increasingly critical, from laptops and PCs to the internet of things devices.

How the attacks affect?

We have all know that how damaging an attack can be. when it hits a computer that`s sitting on your desk. But this could place users when attacks on the computer in your car. Also in your smart lock or even in your body. To patch known code vulnerabilities, the system embeds security into its hardware instead of using the software. This kind of application makes vulnerabilities impossible to pin down and exploit by constantly randomizing critical programme assets in a process known as “churn”.

Undefined semantics

Technology is focusing on the randomizing bits of data  “undefined semantics”. However, the chip is transparent to software developers and end-users. These undefined semantics refers to the nooks and crannies of the computer architecture. For example, the location, format, and content of the programme code are undefined semantics. This randomization of data is part of a processor`s most basic machinery. Legitimate programmers don’t generally interact with this process. The hackers can reverse-engineer them to uncover vulnerabilities in a system and launch an attack.

Austin and his colleagues presented the chip and research paper in April 2019 at the ACM International Conference on Architectural Support for Programming Languages and Operating Systems.

Robotic Jellyfish is Spying Climate

Previous article

Pacemaker Can Harvest Electricity From The Heart

Next article

More in Tech News

You may also like

Comments

Leave a Reply