Categories: OpinionsProgramming

Shape-shifting computer chip thwarts an army of hackers

May 24, 2021

By Todd Austin, University of Michigan and Lauren Biernacki, University of Michigan 

The Research Brief is a short take about interesting academic work.

The big idea

We have developed and tested a secure new computer processor that thwarts hackers by randomly changing its underlying structure, thus making it virtually impossible to hack.

Last summer, 525 security researchers spent three months trying to hack our Morpheus processor as well as others. All attempts against Morpheus failed. This study was part of a program sponsored by the U.S. Defense Advanced Research Program Agency to design a secure processor that could protect vulnerable software. DARPA released the results on the program to the public for the first time in January 2021.

A processor is the piece of computer hardware that runs software programs. Since a processor underlies all software systems, a secure processor has the potential to protect any software running on it from attack. Our team at the University of Michigan first developed Morpheus, a secure processor that thwarts attacks by turning the computer into a puzzle, in 2019.

A processor has an architecture – x86 for most laptops and ARM for most phones – which is the set of instructions software needs to run on the processor. Processors also have a microarchitecture, or the “guts” that enable the execution of the instruction set, the speed of this execution and how much power it consumes.


Free Reports:

Get our Weekly Commitment of Traders Reports - See where the biggest traders (Hedge Funds and Commercial Hedgers) are positioned in the futures markets on a weekly basis.





Download Our Metatrader 4 Indicators – Put Our Free MetaTrader 4 Custom Indicators on your charts when you join our Weekly Newsletter





Hackers need to be intimately familiar with the details of the microarchitecture to graft their malicious code, or malware, onto vulnerable systems. To stop attacks, Morpheus randomizes these implementation details to turn the system into a puzzle that hackers must solve before conducting security exploits. From one Morpheus machine to another, details like the commands the processor executes or the format of program data change in random ways. Because this happens at the microarchitecture level, software running on the processor is unaffected.

The Morpheus computer processor, inside the square beneath the fan on this circuit board, rapidly and continuously changes its underlying structure to thwart hackers.
Todd Austin, CC BY-ND

A skilled hacker could reverse-engineer a Morpheus machine in as little as a few hours, if given the chance. To counter this, Morpheus also changes the microarchitecture every few hundred milliseconds. Thus, not only do attackers have to reverse-engineer the microachitecture, but they have to do it very fast. With Morpheus, a hacker is confronted with a computer that has never been seen before and will never be seen again.

Why it matters

To conduct a security exploit, hackers use vulnerabilities in software to get inside a device. Once inside, they graft their malware onto the device. Malware is designed to infect the host device to steal sensitive data or spy on users.

The typical approach to computer security is to fix individual software vulnerabilities to keep hackers out. For these patch-based techniques to succeed, programmers must write perfect software without any bugs. But ask any programmer, and the idea of creating a perfect program is laughable. Bugs are everywhere, and security bugs are the most difficult to find because they don’t impair a program’s normal operation.

Morpheus takes a distinct approach to security by augmenting the underlying processor to prevent attackers from grafting malware onto the device. With this approach, Morpheus protects any vulnerable software that runs on it.

What other research is being done

For the longest time, processor designers considered security a problem for software programmers, since programmers made the software bugs that lead to security concerns. But recently computer designers have discovered that hardware can help protect software.

Academic efforts, such as Capability Hardware Enhanced RISC Instructions at the University of Cambridge, have demonstrated strong protection against memory bugs. Commercial efforts have begun as well, such as Intel’s soon-to-be-released Control-flow Enforcement Technology.

Morpheus takes a notably different approach of ignoring the bugs and instead randomizes its internal implementation to thwart exploitation of bugs. Fortunately, these are complementary techniques, and combining them will likely make systems even more difficult to attack.

The Morpheus secure processor works like a puzzle that keeps changing before hackers have a chance to solve it.
Alan de la Cruz via Unsplash

What’s next

We are looking at how the fundamental design aspects of Morpheus can be applied to protect sensitive data on people’s devices and in the cloud. In addition to randomizing the implementation details of a system, how can we randomize data in a way that maintains privacy while not being a burden to software programmers?

About the Author:

Todd Austin, Professor of Electrical Engineering and Computer Science, University of Michigan and Lauren Biernacki, Ph.D. Candidate in Computer Science & Engineering, University of Michigan

This article is republished from The Conversation under a Creative Commons license. Read the original article.

InvestMacro

Share
Published by
InvestMacro

Recent Posts

Gold Falls for the Fifth Consecutive Trading Session

By RoboForex Analytical Department  On Thursday, the price of a troy ounce of Gold is…

19 hours ago

Countries spend huge sums on fossil fuel subsidies – why they’re so hard to eliminate

By Bruce Huber, University of Notre Dame  Fossil fuels are the leading driver of climate…

2 days ago

Profit-taking is observed on stock indices. The data on wages in Australia haven’t met expectations

By JustMarkets At the end of Tuesday, the Dow Jones Index (US30) fell by 0.29%.…

2 days ago

USD/JPY at a Three-Month Peak: No One Opposes the US Dollar

By RoboForex Analytical Department  The USD/JPY currency pair has climbed to a three-month high of…

2 days ago

Can Chinese Tech earnings offer relief for Chinese stock indexes?

By ForexTime  CHINAH, CN50, HK50 falling on fears of heightened US-China trade tensions US president-elect Trump…

2 days ago

Companies are buying up cheap carbon offsets − data suggest it’s more about greenwashing than helping the climate

By Sehoon Kim, University of Florida  Carbon offsets have become big business as more companies…

2 days ago

This website uses cookies.