Breaking News


Super-Secure Processor Prevents Hackers by Altering Computer Into Puzzle!!

An effort backed by the Defense Advanced Research Projects Agency (DARPA) has illustrated the security of a computer processor that randomly changes its structure to guard systems from hackers. A team from the University of Michigan produced Morpheus in 2019 then had the processor examined last year under a DARPA-sponsored study, Todd Austin & Lauren Biernacki from the university, stated in a paper published Thursday on The Conversation.

Morpheus mixes up microarchitecture details to create a puzzle that bars hackers from breaking in. The technology sustained penetration testing against 525 security researchers, who successfully have never hacked the processor during trials under DARPA’s Finding Exploits to Thwart Tampering/ FETT program.

A child uses a “Calliope mini” computer throughout the demonstration of the device on the 5th of May, 2017, in Berlin, Germany. The USB-connected circuit board, related to a Raspberry Pi, is designed to teach kids about basic computer coding and electronics. In a project funded by Google, the Berlin-based operator of the machines is providing 2,500 of the devices to schools, while the Roberta Initiative of the Fraunhofer Institute is educating around 100 tutors on how to instruct in their use.

This means that this new processor makes your vulnerable system virtually difficult to breach. If this is right, the new Morpheus chipset can repel off dangerous hackers and other cybercriminals. 

For the longest time, processor designers regarded security as a problem for software programmers, since programmers made the software flaws that lead to security concerns. But recently computer designers have discovered that hardware can help in protecting the software. Morpheus takes a very different approach to overlook the bugs and instead randomizes its internal implementation to thwart the exploitation of bugs.

What’s next?

We’re looking at how the fundamental design features of Morpheus can be utilized to protect sensitive data on people’s devices and in the cloud.

Leave a Reply

Your email address will not be published. Required fields are marked *