By: Earnest Jones | 12-21-2017 | News
Photo credit: PressMaster

Unhackable 'Morpheus' Computer That Can Thwart Hackers 'like a Rubik's Cube'

The thought of an ‘unhackable’ computer barely crosses the minds of most people, this is to a great extent influenced by the many cases of hacking incidents. Well, DARPA is working towards developing a computer equipped with new security features that could make it completely 'unhackable.'

The project, known as Morpheus, will accrue DARPA around $3.6 million that will transform computer circuits into 'unsolvable puzzles.'

A total of $50 million has been set aside by the US military unit for the Morpheus program. It’s evident that the Morpheus system differs from traditional security methods, which rely on issuing software patches for vulnerabilities that have already been identified before.

That’s not the case with Morpheus, which operates in a way where information is 'rapidly and randomly moved and destroyed,' making it harder for attackers to seize critical data while protecting hardware and software.

According to Researchers at the University of Michigan, they’re developing the Morpheus security system, which they say functions somewhat like a Rubik's cube.

'We are making the computer an unsolvable puzzle,' said Todd Austin, a professor of computer science at the University of Michigan.

'It's like if you're solving a Rubik's Cube and every time you blink, I rearrange it.'

The idea is that Morpheus can help prevent the kinds of dreaded, zero-day exploits that have become so prevalent in 2017. Back in May there was the massive WannaCry attacks that reached more than 230,000 computers, the Equifax breach in July that compromised 145 million people's data and the Yahoo hack, announced in October that affected 3 billion accounts – this is just a few examples.

Most vulnerabilities develop as a result of 'software doors' that hackers are able to locate. According to DARPA, the most common vulnerabilities include permissions and privileges, buffer errors, resource management, information leakage, numeric errors, crypto errors, and code injection.


Share this article
Thoughts on the above story? Comment below!
0 comment/s
What do you think about this article?
Comment *

Recent News

Popular Stories