Recently, under its SSITH program, DARPA provided $3.6 million to the University of Michigan for continued development of a microarchitecture that is said to be "unbreakable."
Linton Salmon, project manager of the DARPA Microsystems Technology Office, said that DARPA hopes to use new technology to develop integrated circuits that are essentially free from the "final operation" of software, as opposed to methods that often use software patches to block security breaches.
Intel has provided on-chip V-Pro security hardware in its Xeon microprocessor family for many years. However, DARPA is working hard to find computers that can achieve higher levels of protection, especially on military battlefields, because the hardware security holes on the battlefield may endanger the life of the soldiers.
DARPA’s stated goal of “defending hackers†does not seem to be able to achieve truly indestructible hardware. But Todd Austin, a professor of electrical engineering (EECS) at the University of Michigan who led the research program, claimed that the method used by his research team was called 'Morpheus', which achieved anti-hacker hardware by replacing the internal program code every second. Austin said that Morpheus' defensive measures are like asking a possible attacker to unlock a new Rubik's Cube every second to break the chip's security. In this way, the architecture can provide maximum protection against intrusions, including hacking attacks using zero-day vulnerability, or attacks not yet discovered by network security experts. Austin said that Morpheus offers a solution that can be tested and verified in the future.
Because Morpheus can constantly change the location of the firmware and hardware, it also changes the location of the stored passwords. Because the password is encrypted, the hacker needs time to decode it. Even the fastest hackers cannot find the vulnerability again within one second after decryption.
The technology used by Morpheus is currently used in military computer software. However, through key operations on the hardware, Austin believes that it can eliminate a variety of known vulnerabilities, including privileges and privileges, buffer errors, resource management, information leakage, digital errors, encryption errors, and program code injection.
Austin and his team will use DARPA's sponsorship to design hardware versions of Morpheus protection algorithms on low-cost hardware to limit the impact of unbreakable microprocessor costs. Morpheus is one of the 9 projects under the DARPA-sponsored SSITH program.
In addition to Austin, researchers collaborating on the project include Valeria Bertacco, professor of EECS at the University of Michigan, Mohit Tiwari, assistant professor of electronics and computer engineering at the University of Texas at Austin, and professor of electrical engineering at Princeton University. Dean Sharad Malik and others.
USB cables come in different shapes and sizes despite the fact a lot of them do the same things. In this short and handy guide, we`ll take a look at all the different types of USB cables available on the market and give you some examples of where you might find them in use.
USB Type-A, USB Type-B, Mini-USB, Micro-USB, USB-C
USB Cable,usb cable types,usb cable extension
ETOP WIREHARNESS LIMITED , https://www.oemmoldedcables.com