{"id":122934,"date":"2021-05-23T14:42:05","date_gmt":"2021-05-23T21:42:05","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2021\/05\/super-secure-processor-thwarts-hackers"},"modified":"2021-05-23T14:42:05","modified_gmt":"2021-05-23T21:42:05","slug":"super-secure-processor-thwarts-hackers","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2021\/05\/super-secure-processor-thwarts-hackers","title":{"rendered":"Super-Secure Processor Thwarts Hackers"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/super-secure-processor-thwarts-hackers2.jpg\"><\/a><\/p>\n<p>We have developed and tested a <a href=\"https:\/\/doi.org\/10.1145\/3297858.3304037\">secure new computer processor<\/a> that thwarts hackers by randomly changing its underlying structure, thus making it virtually impossible to hack.<\/p>\n<p>Last summer, 525 security researchers spent three months trying to hack our Morpheus processor as well as others. <a href=\"https:\/\/spectrum.ieee.org\/tech-talk\/semiconductors\/processors\/morpheus-turns-a-cpu-into-a-rubiks-cube-to-defeat-hackers\">All attempts against Morpheus failed<\/a>.<\/p>\n<p>This study was part of a program sponsored by the U.S. Defense Advanced Research Program Agency to <a href=\"https:\/\/spectrum.ieee.org\/tech-talk\/computing\/embedded-systems\/darpa-hacks-its-secure-hardware-fends-off-most-attacks\">design a secure processor<\/a> that could protect vulnerable software. DARPA <a href=\"https:\/\/www.darpa.mil\/news-events\/2020-01-28\">released the results on the program to the public<\/a> for the first time in January 2021.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We have developed and tested a secure new computer processor that thwarts hackers by randomly changing its underlying structure, thus making it virtually impossible to hack. Last summer, 525 security researchers spent three months trying to hack our Morpheus processor as well as others. All attempts against Morpheus failed. This study was part of a [\u2026]<\/p>\n","protected":false},"author":396,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34],"tags":[],"class_list":["post-122934","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/122934","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/396"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=122934"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/122934\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=122934"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=122934"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=122934"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}