Skip to main content

Meet The World’s First Unhackable Processor

Meet The World’s First Unhackable Processor




Meet The World’s First Unhackable Processor
Meet The World’s First Unhackable Processor

According to the latest reports, recently, a group of researchers from the University of Michigan, in the United States, has claimed, that they have managed to develop the world’s first unhackable processor, which is known as MORPHEUS. This all-new unhackable processor is capable of executing data encryption operations so fast, that its algorithms change at a faster rate than a hacker can act against them, hence, it provides much greater security than the defense mechanisms of the current processors can provide.
 Meet The World’s First Unhackable Processor
A group of researchers from the University of Michigan, in the United States, has claimed, that they have managed to develop the world’s first unhackable processor, which is known as MORPHEUS.
This all-new unhackable processor is capable of executing data encryption operations so fast, that its algorithms change at a faster rate than a hacker can act against them, hence, it provides much greater security than the defense mechanisms of the current processors can provide.
If anything could stand out the last year 2018 was the huge number of serious vulnerabilities that were discovered in the processors of AMD and, especially, Intel. As the well-known flaws like Meltdown, Specter and, more recently PortSmash and SPOILER have driven the researchers of both companies crazy in their attempt to solve them.
However, a team of scientists from the University of Michigan, led by Todd Austin, has just presented its new architecture for processors, called MORPHEUS, which is capable of blocking attacks on the processor of the devices where it is mounted.
For this, the processor is able to change certain aspects of its architecture completely and randomly, so that an attacker never knows what he/she is trying to access accurately. But, more importantly, MORPHEUS is able to do this job extremely quickly and with very low resource consumption.
Basically, the key to the security that the all-new MORPHEUS processor wants to provide is that the processor changes certain components of its code known as “undefined semantics”. This component simply refers to, the location, size, and content of the program code.
Hence, if any case, an attacker wants to use these data, which are usually fixed, he/she will not be able to locate them permanently, as 50ms later he/she will have changed to other values. This rate of reordering of the code is several times higher than the most modern and powerful techniques of hacking that are used today with current processors.
The MORPHEUS architecture was installed, fora demonstration, in a processor with RISC-V architecture, which is an open source chip that is used extensively in the development of prototypes. With this processor, MORPHEUS underwent “Control-Flow” attacks, one of the most aggressive techniques used by hackers in the world. And it simply managed to overcome all the attacks that were carried out with complete success.
As expected, the ratio of impaired processor architecture code has a cost in resources of the system. However, scientists have developed MORPHEUS and claimed that the cost of such resources is only 1% and the speed with which the code becomes random can be varied, depending on what the processor is going to be used for. This also includes an attack detector, which analyzes when one of these could be occurring and accelerates the speed based on this data.
So, what do you think about this? Simply share all your views and thoughts in the comment section below. And if you liked this post then simply do not forget to share this post with your friends and family.

Owner Info-:
-rishi
E-mail : rishivaishnav2019@gmail.com
Instagram : @rishi.__________

THANKS FOR VISITING

Comments

Popular posts from this blog

25 Best WiFi Hacking Apps For Android 2019

25 Best WiFi Hacking Apps For Android 2019 Best WiFi Hacking Apps For Android 2019 W ith Android Phone, you can do lots of hacking attacks. Wifi hacking is not so easy task but it’s possible with some apps. Here we’ve listed 20+ best WiFi hacking apps for Android 2019: Time to crack wifi security key with your Android using best Android apps to hack WiFi network. Every computer and Android geek always think to hack wifi network password from Android mobile. With Android Phone, you can do lots of hacking attacks. Wifi hacking is not so easy task but it’s possible with some apps. And this is only possible with some cool apps that can be used to hack wifi network. So, have a look at complete guide discussed below. Must download all these  hacking books of 2019 . Also Read:  Best Android Hacking Apps 2019 Contents:  [ show ] Top 25 Best WiFi Hacking Apps For Android 2019 Here we have discussed some best apps that you will be using to crack the wifi

OMG! World’s Most Dangerous Laptop Sold For $1.3 Million

OMG! World’s Most Dangerous Laptop Sold For $1.3 Million OMG! World's Most Dangerous Laptop Sold For $1.3 Million W e all know very well that there are many strange projects which don’t please us, but there are some people who simply tag them as “Art”, “The Persistence of Chao” is the name of Guo Dong’s “work of art”, basically it is a laptop which is fully loaded with the world’s most dangerous malware and viruses. Now, apart from all these things the most interesting thing is that this dangerous laptop was auctioned and sold for $1.3 million. OMG! World’s Most Dangerous Laptop Sold For $1.3 Million There are many strange projects which don’t please us, but there are some people who simply tag them as “Art”, “ The Persistence of Chaos ” is the name of  Guo Dong’s  “ work of art “, basically it is  a laptop which is fully loaded with world’s most dangerous malware and viruses . Yes, it may seem bit odd, but the fact is that Guo Dong’s “work of art