Ever thought of a hack-proof Computer? Some Researchers Are Working

hack-proof Computer
Share It On:

22nd May 2021, Kathmandu

Computer security is becoming increasingly significant due to the increased reliance on computer systems, the Internet, and wireless networks.

Ever thought of a hack-proof computer? Some researchers are working towards making it a reality.

Computer threats are more common these days, given that there is no means to prevent these hackings. Tech companies are investing more in creating effective safeguards. The recent attack shows that a Chip which is the brain of the computer, is the primary target of most attacks.

One flawed chip can risk millions of computers. The only way to prevent a hack is if the chip was made infallible and robust. Some researchers are focusing on working on one such chip that can defend against attacks.

Hack-proof Computer

To create a nearly hack-proof computer, a Secure CPU was designed at the University of Michigan by security researchers called Morpheus.

This chipset will make the computer running on it immune to a large percentage of attacks, according to the IEEE Spectrum.

Todd Austin, lead of this research and Computer scientist, used encryption to make this chip more effective and stronger than current-generation computer chips. Most exploits will find it hard to penetrate the defenses.

He added this CPU makes the computer into a puzzle that happens to compute, and the idea was to make it really hard to make any exploit work on it so that one wouldn’t have to worry about individuals exploits, essentially making it difficult to understand making attackers discouraged for attacking this particular target.

Virtual Bug Bounty Program

At a recent virtual bug bounty program dubbed Finding Exploits to Thwart Tampering (FETT) sponsored by DARPA (the Defense Advanced Research Project’s Agency), the Department of Defense’s Defense Digital Service (DDS), and Synack – a crowdsourced security platform, the effectiveness and integrity of this new chipset was tested, 580 White hat hackers were challenged by the security researchers to bypass security on the chipset. They tried 13,000 hours to let themselves into this chipset but weren’t successful.

With developers constantly writing code, there is a chance of new bugs and security vulnerabilities. Still, with Morpheus, even though hackers find the bug, the information needed to exploit it vanishes within milliseconds. Encryption of top quality is used by this chipset Morpheus.

An algorithm called “Simon,” a cipher, is responsible for encryption and decryption in the chipset.

The encryption standard for the chipset is decided by Simon, and it changes every few hundred milliseconds.

It is perhaps the closest thing to the hack-proof computer system. In simple words, the part of the chipset is encrypted to hide how it works, which makes it difficult for hackers to exploit it.

According to the engineering department at the University of Michigan, this process of encrypting information reconfigures key bits of its code and data dozens of times per second, turning any vulnerabilities into dead ends for hackers in practical terms.

The Hack-proof Computer

Hackers have a tough time solving it because the new technique for the hack-proof computer chipset makes the entire working mechanism of the chipset look like a puzzle that keeps changing now and then.

Morpheus will be able to prevent low-level attacks or remote code execution attacks (RCEs), where due to flaws in programming, hackers will be able to inject malicious code into a chipset, as mentioned by Austin.

Yet, Morpheus may not be able to shield the computer from high-technique attacks such as SQL injections. The second most popular target of the seven processors evaluated under FETT is Morpheus.

Hack Morpheus

Undefined semantics was used by experts to hack Morpheus. It protects using two powerful methods ensembles of moving target defense and churn where ensembles of moving target defenses randomized key program value which forces attackers to probe the system before an attack extensively and to ensure their failure churn re-randomize program values underneath.

Churn rate is normally kept low for high system performance, but it spikes when a hacker attempts an attack to stop the attackers in their tracks.

Hackers have dramatically progressed over many years; therefore, the sorry state of computer chipsets and software may not change soon.

However, there’s at least some hope that two or three years down, computers will be able to ward off cyberattacks and exploits. This news should be good for hardware and software companies as they would only need to focus on sophisticated attacks then.


Share It On:

Recent Posts

NIC Asia Capital 8th AGM Concludes, Approves 52.53% Dividend
Banking & Insurance Latest News Top News

NIC Asia Capital 8th AGM Concludes, Approves 52.53% Dividend

Share It On:7 September 2024, Kathmandu NIC Asia Capital, a leading investment management firm in Nepal, successfully concluded its 8th

Unblock TikTok in Nepal: Internet Providers Directed By Telecommunications Authority
Latest News Top News

Unblock TikTok in Nepal: Internet Providers Directed By Telecommunications Authority

Share It On:6 September 2024,  Kathmandu The Nepal Telecommunications Authority (NTA) has instructed all internet providers to lift the ban

FNCCI Honors Paralympic Bronze Medalist Palesha Goverdhan
Latest News Top News

FNCCI Honors Paralympic Bronze Medalist Palesha Goverdhan

Share It On:6 September 2024, Kathmandu The Federation of Nepalese Chambers of Commerce and Industry (FNCCI) has honored 21-year-old Palesha

ASUS Unveils First Laptop Powered by AMD Ryzen AI 9 HX370 Processor
Gadgets Latest News Top News

ASUS Unveils First Laptop Powered by AMD Ryzen AI 9

Share It On:6 September 2024, Kathmandu ASUS has once again pushed the boundaries of innovation by launching the new ASUS

BYD Charging Station Inaugurated at Kathmandu University, Boosting Electric Mobility and Sustainability
Auto Life Latest News Top News

BYD Charging Station Inaugurated at Kathmandu University, Boosting Electric Mobility

Share It On:6 September 2024, Kathmandu Kathmandu University has taken a significant step toward sustainability and innovation with the inauguration

Ncell Launches New TikTok Pack, Adds TikTok To All Sadhain ON Pack Freebies
Latest News Telecom Top News

Ncell Launches New TikTok Pack, Adds TikTok To All Sadhain

Share It On:6 September 2024, Kathmandu All Ncell customers can now enjoy TikTok. On Friday (September 06), Ncell launched the