{"id":25470,"date":"2021-05-20T01:11:00","date_gmt":"2021-05-20T01:11:00","guid":{"rendered":"https:\/\/www.lifeandnews.com\/articles\/?p=25470"},"modified":"2021-05-21T12:49:10","modified_gmt":"2021-05-21T12:49:10","slug":"shape-shifting-computer-chip-thwarts-an-army-of-hackers","status":"publish","type":"post","link":"https:\/\/www.lifeandnews.com\/articles\/shape-shifting-computer-chip-thwarts-an-army-of-hackers\/","title":{"rendered":"Shape-shifting computer chip thwarts an army of hackers"},"content":{"rendered":"\n<p><a href=\"https:\/\/theconversation.com\/profiles\/todd-austin-1228062\">Todd Austin<\/a>, <em><a href=\"https:\/\/theconversation.com\/institutions\/university-of-michigan-1290\">University of Michigan<\/a><\/em> and <a href=\"https:\/\/theconversation.com\/profiles\/lauren-biernacki-1228064\">Lauren Biernacki<\/a>, <em><a href=\"https:\/\/theconversation.com\/institutions\/university-of-michigan-1290\">University of Michigan<\/a><\/em><\/p>\n\n\n\n<p><em>The <a href=\"https:\/\/theconversation.com\/us\/topics\/research-brief-83231\">Research Brief<\/a> is a short take about interesting academic work.<\/em><\/p>\n\n\n\n<h2>The big idea<\/h2>\n\n\n\n<p>We have developed and tested a <a href=\"https:\/\/doi.org\/10.1145\/3297858.3304037\">secure new computer processor<\/a> that thwarts hackers by randomly changing its underlying structure, thus making it virtually impossible to hack.<\/p>\n\n\n\n<p>Last summer, 525 security researchers spent three months trying to hack our Morpheus processor as well as others. <a href=\"https:\/\/spectrum.ieee.org\/tech-talk\/semiconductors\/processors\/morpheus-turns-a-cpu-into-a-rubiks-cube-to-defeat-hackers\">All attempts against Morpheus failed<\/a>. This study was part of a program sponsored by the U.S. Defense Advanced Research Program Agency to <a href=\"https:\/\/spectrum.ieee.org\/tech-talk\/computing\/embedded-systems\/darpa-hacks-its-secure-hardware-fends-off-most-attacks\">design a secure processor<\/a> that could protect vulnerable software. DARPA <a href=\"https:\/\/www.darpa.mil\/news-events\/2020-01-28\">released the results on the program to the public<\/a> for the first time in January 2021.<\/p>\n\n\n\n<p>A processor is the piece of computer hardware that runs software programs. Since a processor underlies all software systems, a secure processor has the potential to protect any software running on it from attack. Our team at the University of Michigan first developed Morpheus, a secure processor that thwarts attacks by turning the computer into a puzzle, in 2019.<\/p>\n\n\n\n<p>A processor has an architecture \u2013 x86 for most laptops and ARM for most phones \u2013 which is the set of instructions software needs to run on the processor. Processors also <a href=\"https:\/\/www.computerhope.com\/jargon\/m\/microarchitecture.htm\">have a microarchitecture<\/a>, or the \u201cguts\u201d that enable the execution of the instruction set, the speed of this execution and how much power it consumes.<\/p>\n\n\n\n<p>Hackers need to be intimately familiar with the details of the microarchitecture to <a href=\"https:\/\/theconversation.com\/microprocessor-designers-realize-security-must-be-a-primary-concern-98044\">graft their malicious code, or malware, onto vulnerable systems<\/a>. To stop attacks, Morpheus randomizes these implementation details to turn the system into a puzzle that hackers must solve before conducting security exploits. From one Morpheus machine to another, details like the commands the processor executes or the format of program data change in random ways. Because this happens at the microarchitecture level, software running on the processor is unaffected.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/images.theconversation.com\/files\/401701\/original\/file-20210519-19-1t96mso.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip\"><img src=\"https:\/\/images.theconversation.com\/files\/401701\/original\/file-20210519-19-1t96mso.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip\" alt=\"a fan on top of a metal square in the middle of a computer circuit board\"\/><\/a><figcaption>The Morpheus computer processor, inside the square beneath the fan on this circuit board, rapidly and continuously changes its underlying structure to thwart hackers. Todd Austin, <a href=\"http:\/\/creativecommons.org\/licenses\/by-nd\/4.0\/\">CC BY-ND<\/a><\/figcaption><\/figure>\n\n\n\n<p>A skilled hacker could reverse-engineer a Morpheus machine in as little as a few hours, if given the chance. To counter this, Morpheus also changes the microarchitecture every few hundred milliseconds. Thus, not only do attackers have to reverse-engineer the microachitecture, but they have to do it very fast. With Morpheus, a hacker is confronted with a computer that has never been seen before and will never be seen again.<\/p>\n\n\n\n<h2>Why it matters<\/h2>\n\n\n\n<p>To conduct a security exploit, hackers use vulnerabilities in software to get inside a device. Once inside, they <a href=\"https:\/\/theconversation.com\/guarding-against-the-possible-spectre-in-every-machine-89825\">graft their malware<\/a> onto the device. Malware is designed to infect the host device to steal sensitive data or spy on users.<\/p>\n\n\n\n<p>The typical approach to computer security is to fix individual software vulnerabilities to keep hackers out. For these patch-based techniques to succeed, programmers must write perfect software without any bugs. But ask any programmer, and the idea of creating a perfect program is laughable. Bugs are everywhere, and security bugs are the most difficult to find because they don\u2019t impair a program\u2019s normal operation.<\/p>\n\n\n\n<p>Morpheus takes a distinct approach to security by augmenting the underlying processor to prevent attackers from grafting malware onto the device. With this approach, Morpheus protects any vulnerable software that runs on it.<\/p>\n\n\n\n<h2>What other research is being done<\/h2>\n\n\n\n<p>For the longest time, processor designers considered security a problem for software programmers, since programmers made the software bugs that lead to security concerns. But recently computer designers have discovered that hardware can help protect software.<\/p>\n\n\n\n<p>Academic efforts, such as <a href=\"https:\/\/www.cl.cam.ac.uk\/research\/security\/ctsrd\/cheri\/\">Capability Hardware Enhanced RISC Instructions<\/a> at the University of Cambridge, have demonstrated strong protection against memory bugs. Commercial efforts have begun as well, such as Intel\u2019s soon-to-be-released <a href=\"https:\/\/newsroom.intel.com\/editorials\/intel-cet-answers-call-protect-common-malware-threats\/\">Control-flow Enforcement Technology<\/a>.<\/p>\n\n\n\n<p>Morpheus takes a notably different approach of ignoring the bugs and instead randomizes its internal implementation to thwart exploitation of bugs. Fortunately, these are complementary techniques, and combining them will likely make systems even more difficult to attack.<\/p>\n\n\n\n<h2>What\u2019s next<\/h2>\n\n\n\n<p>We are looking at how the fundamental design aspects of Morpheus can be applied to protect sensitive data on people\u2019s devices and in the cloud. In addition to randomizing the implementation details of a system, how can we randomize data in a way that maintains privacy while not being a burden to software programmers?<\/p>\n\n\n\n<p>[<em>Research into coronavirus and other news from science<\/em> <a href=\"https:\/\/theconversation.com\/us\/newsletters\/science-editors-picks-71\/?utm_source=TCUS&amp;utm_medium=inline-link&amp;utm_campaign=newsletter-text&amp;utm_content=science-corona-research\">Subscribe to The Conversation\u2019s new science newsletter<\/a>.]<\/p>\n\n\n\n<p><a href=\"https:\/\/theconversation.com\/profiles\/todd-austin-1228062\">Todd Austin<\/a>, Professor of Electrical Engineering and Computer Science, <em><a href=\"https:\/\/theconversation.com\/institutions\/university-of-michigan-1290\">University of Michigan<\/a><\/em> and <a href=\"https:\/\/theconversation.com\/profiles\/lauren-biernacki-1228064\">Lauren Biernacki<\/a>, Ph.D. Candidate in Computer Science &amp; Engineering, <em><a href=\"https:\/\/theconversation.com\/institutions\/university-of-michigan-1290\">University of Michigan<\/a><\/em><\/p>\n\n\n\n<p>This article is republished from <a href=\"https:\/\/theconversation.com\">The Conversation<\/a> under a Creative Commons license. Read the <a href=\"https:\/\/theconversation.com\/shape-shifting-computer-chip-thwarts-an-army-of-hackers-159990\">original article<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Todd Austin, University of Michigan and Lauren Biernacki, University of Michigan The Research Brief is a short take about interesting academic work. The big idea We have developed and tested a secure new computer processor that thwarts hackers by randomly changing its underlying structure, thus making it virtually impossible to hack. Last summer, 525 security [&hellip;]<\/p>\n","protected":false},"author":44,"featured_media":25471,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3410],"tags":[9964,794,273,9963,3396,9962,1815,9961,7727,9965],"_links":{"self":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/25470"}],"collection":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/users\/44"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/comments?post=25470"}],"version-history":[{"count":2,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/25470\/revisions"}],"predecessor-version":[{"id":25473,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/25470\/revisions\/25473"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/media\/25471"}],"wp:attachment":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/media?parent=25470"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/categories?post=25470"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/tags?post=25470"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}