A group of investigators at the University of Michigan, United States, has claimed that the first unhackable processor in the world, called MORPHEUS, has been successful.
A new, unhackable processor is able to run data encryption so quickly that its algorithms are changed faster than hacker can, which means that the security of the current processors is far greater than the defense mechanisms.
The huge number of serious vulnerabilities found in AMD processors and, in particular, Intel were able to stand out last year 2018. As well-known defects such as Meltdown, Specter and recently PortSmash and SPOILER have led both companies ' researchers crazy in trying to solve them.
A team of scientists from the University of Michigan, led by Todd Austin, has recently presented their new processors architecture known as MORPHEUS, which can block attacks on the device manufacturer on which they are mounted.
To achieve this, the processor is able to completely and randomly modify certain aspects of its architecture so that an attacker never knows exactly what he or she is trying to access. More importantly, however, MORPHEUS is capable of doing this very fast and with low consumption of resources.
In general, the key to ensuring the safety of the all-new MORPHEUS processor is that the processor changes certain components of its so-called' undefined semantics.' This component refers simply to the location of the program code, its size and content.
So if any, an attacker wants to use these usually fixed data, they can not find them permanently because 50 meters later they have changed to other values. The attacker will not be able to find them again. This rate is several times greater than the most modern and strong hacking techniques used today by current processors. This rateofre-ordering the code.
The MORPHEUS architecture is an open source chip which is widely used in the development of prototypes and was installed for a demonstration in a processor with RISC-V Architecture. This processor was one of MORPHEUS ' most aggressive techniques used by hackers in the world, called Control-Flow attacks. And it managed simply to surmount all the attacks that were successful.
The system. The system. Nevertheless, scientists have developed MORPHEUS and claimed that the costs and randomness of the coding are only 1 percent depending on the uses of the device. This also includes an attack detector that analyzes whether any of these can occur and speeds based on these data.
So, what do you believe? Just share in the comment section below all your opinions and thoughts. And if you liked this post, just don't forget to share it with family and friends.
The processor can thus completely and randomly change aspects of its architecture so that an assailant never knows exactly what he / she is trying to access. MORPHEUS can do that task however, most importantly, extremely fast and with a very low consumption of resources.
Basically, the key to ensuring that the entire new MORPHEUS processor is available is that it modifies some parts of its code called' undefined semantics.' This is the place, size, and content of the program code. This part simply refers to
Therefore, if an attacker wishes, he / she will not find the data permanently if they are used, since 50ms later he / she will have changed to other values. This rate is several times higher than the most advanced and powerful hacking techniques used today with current processors.
For the demonstration, the MORPHEUS architecture was installed in a RISC-V architecture, an open source chip which is widely used in prototypes development. MORPHEUS suffered a "control flux" attack with this processor, which is one of the world's more aggressive hacker techniques. And it simply succeeded in overcoming all of the successful attacks.
A new, unhackable processor is able to run data encryption so quickly that its algorithms are changed faster than hacker can, which means that the security of the current processors is far greater than the defense mechanisms.
The huge number of serious vulnerabilities found in AMD processors and, in particular, Intel were able to stand out last year 2018. As well-known defects such as Meltdown, Specter and recently PortSmash and SPOILER have led both companies ' researchers crazy in trying to solve them.
A team of scientists from the University of Michigan, led by Todd Austin, has recently presented their new processors architecture known as MORPHEUS, which can block attacks on the device manufacturer on which they are mounted.
To achieve this, the processor is able to completely and randomly modify certain aspects of its architecture so that an attacker never knows exactly what he or she is trying to access. More importantly, however, MORPHEUS is capable of doing this very fast and with low consumption of resources.
In general, the key to ensuring the safety of the all-new MORPHEUS processor is that the processor changes certain components of its so-called' undefined semantics.' This component refers simply to the location of the program code, its size and content.
So if any, an attacker wants to use these usually fixed data, they can not find them permanently because 50 meters later they have changed to other values. The attacker will not be able to find them again. This rate is several times greater than the most modern and strong hacking techniques used today by current processors. This rateofre-ordering the code.
The MORPHEUS architecture is an open source chip which is widely used in the development of prototypes and was installed for a demonstration in a processor with RISC-V Architecture. This processor was one of MORPHEUS ' most aggressive techniques used by hackers in the world, called Control-Flow attacks. And it managed simply to surmount all the attacks that were successful.
The system. The system. Nevertheless, scientists have developed MORPHEUS and claimed that the costs and randomness of the coding are only 1 percent depending on the uses of the device. This also includes an attack detector that analyzes whether any of these can occur and speeds based on these data.
So, what do you believe? Just share in the comment section below all your opinions and thoughts. And if you liked this post, just don't forget to share it with family and friends.
The processor can thus completely and randomly change aspects of its architecture so that an assailant never knows exactly what he / she is trying to access. MORPHEUS can do that task however, most importantly, extremely fast and with a very low consumption of resources.
Basically, the key to ensuring that the entire new MORPHEUS processor is available is that it modifies some parts of its code called' undefined semantics.' This is the place, size, and content of the program code. This part simply refers to
Therefore, if an attacker wishes, he / she will not find the data permanently if they are used, since 50ms later he / she will have changed to other values. This rate is several times higher than the most advanced and powerful hacking techniques used today with current processors.
For the demonstration, the MORPHEUS architecture was installed in a RISC-V architecture, an open source chip which is widely used in prototypes development. MORPHEUS suffered a "control flux" attack with this processor, which is one of the world's more aggressive hacker techniques. And it simply succeeded in overcoming all of the successful attacks.
No comments:
Post a Comment