Skip to main content

California dWeb.News: Shape-shifting computer chip thwarts an army of hackers

Shape-shifting computer chip thwarts an army of hackers

Shape-shifting computer chip thwarts an army of hackers

Author:

The Morpheus secure processor works like a puzzle that keeps changing before hackers have a chance to solve it. Alan de la Cruz via Unsplash

The Research Brief is a short take about interesting academic work.

The big idea

We have developed and tested a secure new computer processor that thwarts hackers by randomly changing its underlying structure, thus making it virtually impossible to hack.

Last summer, 525 security researchers spent three months trying to hack our Morpheus processor as well as others. All attempts against Morpheus failed. This study was part of a program sponsored by the U.S. Defense Advanced Research Program Agency to design a secure processor that could protect vulnerable software. DARPA released the results on the program to the public for the first time in January 2021.

A processor is the piece of computer hardware that runs software programs. Since a processor underlies all software systems, a secure processor has the potential to protect any software running on it from attack. Our team at the University of Michigan first developed Morpheus, a secure processor that thwarts attacks by turning the computer into a puzzle, in 2019.

A processor has an architecture – x86 for most laptops and ARM for most phones – which is the set of instructions software needs to run on the processor. Processors also have a microarchitecture, or the "guts" that enable the execution of the instruction set, the speed of this execution and how much power it consumes.

Hackers need to be intimately familiar with the details of the microarchitecture to graft their malicious code, or malware, onto vulnerable systems. To stop attacks, Morpheus randomizes these implementation details to turn the system into a puzzle that hackers must solve before conducting security exploits. From one Morpheus machine to another, details like the commands the processor executes or the format of program data change in random ways. Because this happens at the microarchitecture level, software running on the processor is unaffected.


The Morpheus computer processor, inside the square beneath the fan on this circuit board, rapidly and continuously changes its underlying structure to thwart hackers.
Todd Austin, CC BY-ND

A skilled hacker could reverse-engineer a Morpheus machine in as little as a few hours, if given the chance. To counter this, Morpheus also changes the microarchitecture every few hundred milliseconds. Thus, not only do attackers have to reverse-engineer the microachitecture, but they have to do it very fast. With Morpheus, a hacker is confronted with a computer that has never been seen before and will never be seen again.

Why it matters

To conduct a security exploit, hackers use vulnerabilities in software to get inside a device. Once inside, they graft their malware onto the device. Malware is designed to infect the host device to steal sensitive data or spy on users.

The typical approach to computer security is to fix individual software vulnerabilities to keep hackers out. For these patch-based techniques to succeed, programmers must write perfect software without any bugs. But ask any programmer, and the idea of creating a perfect program is laughable. Bugs are everywhere, and security bugs are the most difficult to find because they don't impair a program's normal operation.

Morpheus takes a distinct approach to security by augmenting the underlying processor to prevent attackers from grafting malware onto the device. With this approach, Morpheus protects any vulnerable software that runs on it.

What other research is being done

For the longest time, processor designers considered security a problem for software programmers, since programmers made the software bugs that lead to security concerns. But recently computer designers have discovered that hardware can help protect software.

Academic efforts, such as Capability Hardware Enhanced RISC Instructions at the University of Cambridge, have demonstrated strong protection against memory bugs. Commercial efforts have begun as well, such as Intel's soon-to-be-released Control-flow Enforcement Technology.

Morpheus takes a notably different approach of ignoring the bugs and instead randomizes its internal implementation to thwart exploitation of bugs. Fortunately, these are complementary techniques, and combining them will likely make systems even more difficult to attack.

What's next

We are looking at how the fundamental design aspects of Morpheus can be applied to protect sensitive data on people's devices and in the cloud. In addition to randomizing the implementation details of a system, how can we randomize data in a way that maintains privacy while not being a burden to software programmers?

Todd Austin receives funding from DARPA, which supported the development of the Morpheus secure CPU through DARPA Contract HR0011-18-C-0019. He owns shares in Agita Labs, which is commercializing a derivative of the Morpheus technology.
Lauren Biernacki receives funding from DARPA, which supported the development of the Morpheus secure CPU through DARPA Contract HR0011-18-C-0019.
Most computer security focuses on software, but computer processors are vulnerable to hackers, too. An experimental secure processor changes its underlying structure before hackers can figure it out.
facebook twitter 

Comments

Popular posts from this blog

dWeb.News Daily Picks From Daniel Webster dWeb Internet Cowboy

dWeb.News Daily Picks From Daniel Webster dWeb Internet Cowboy READ FULL REPORT FACEBOOK: Trump Stays Banned President Trump Does a New Tweety Type Thing on His Site 6G Can Download a Movie in a Blink of an Eye — Literally — Researchers Claim Kentucky Derby Crushes Oscars in Ratings PELOTON: Recall of Tread+ Treadmills After One Child Death and 70 Incidents; Recall of Tread Treadmills Due to Risk of Injury 7 Types of Phishing: How to Recognize Them & Stay Off the Hook 5 Technology Innovations That Will Shape the Future of the World This is How the Internet Changed Dating Industry Dogecoin rally is a ‘middle finger’ to the financial system, says crypto bull Mike Novogratz Too much, too little sleep linked to elevated heart risks in people free from disease NO JOKE: These are the Questions People Asked Google About Cinco de Mayo RUGGED: Ford expands off-road offerings with new 2021 Explorer Timberline Don't Try to Pirate Movies on SpaceX's Starlink Berkshire H...

California dWeb.News: Agents Seize Large Package of Methamphetamine Hidden Inside Vehicle

Agents Seize Large Package of Methamphetamine Hidden Inside Vehicle Author: Daniel Webster SALTON CITY, Calif. –  El Centro Sector  Border P...

dWeb Daily News Picks from Daniel Webster Internet Cowboy

dWeb Daily News Picks From Daniel Webster dWeb Internet Cowboy EU charges Apple in landmark App Store competition case Facebook to pay $5 mln to local journalists in newsletter push Real-estate vloggers are giving viewers an intimate look at pricey penthouses and massive mansions, racking up millions of views and subscribers in the process The world's first dogecoin billionaire watched their stock soar to $11BILLION as the "joke" cryptocurrency boomed after Elon Musk dubbed himself the "Dogefather" Phil Collins, Genesis Reunite For First Tour In 14 Years, Ending In Boston How the hunt for the world's most notorious terrorist actually went down—as told by the people inside the room Unrest from World’s Largest Volcano Prompts Alert from Local Authorities Roku pulls YouTube TV from its store, saying Google let contract expire Google Messages is getting a makeover on Samsung phones. Is your phone eligible? An Oracle exec’s brass-knuckled approach wi...