• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • COVID-19 Update
  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Subscribe
  • Project of the Week
  • Latest News
  • About Us
    SEARCH
Network Security, News

University of Michigan’s MORPHEUS Chip Encrypts 20 Times Per Second

The university’s hacker-resistant development changes code and seals off network vulnerabilities faster than ever.

May 23, 2019 Jessica Messier Leave a Comment

Intel’s chip-making deal

The University of Michigan recently announced that it has developed a new computer chip that functions much like a Rubik’s cube.

The chip, also called MORPHEUS, blocks hacks by encrypting and reshuffling pieces of its code and data 20 times per second, significantly faster than human and electronic hackers can work. The process is called a “churn.”

“Imagine trying to solve a Rubik’s Cube that rearranges itself every time you blink,” said Todd Austin, U-M professor of computer science and engineering, and a developer of the system. “That’s what hackers are up against with MORPHEUS. It makes the computer an unsolvable puzzle.”

The churn rate can also be adjusted up or down to balance out maximizing security and minimizing resource consumption. Its ability to “churn” enables it to “bake security into its hardware,” U-M says, which helps it to work past patching code vulnerabilities.

While MORPHEUS can rearrange code and data rapidly, it’s also transparent to software developers and end users. That’s because it focuses on randomizing bits of data called “undefined semantics,” or the “nooks and crannies” of the computing architecture. These are part of a processor’s “most basic machinery,” which aren’t generally touched by programmers; however, hackers can engineer them to detect vulnerabilities and launch attacks.

At the same time, MORPHEUS also includes an attack detector in its architecture, which searches for threats, and boosts the churn rates if a threat is in fact present.

Austin and his team have already demonstrated a prototype to DARPA, and are working on commercializing the solution. MORPHEUS can be used for multiple applications, including laptops, computers and IoT devices.

“Today’s approach of eliminating security bugs one by one is a losing game,” Austin said in a previous statement. “With MORPHEUS, even if a hacker finds a bug, the information needed to exploit it vanishes 50 milliseconds later. It’s perhaps the closest thing to a future-proof secure system.”

Tagged With: Cyber Security, Hardware

Related Content:

  • AVI-SPL logo AVI-SPL Awarded by Strategic Account Management Association
  • Thrive SOAR MSSP Thrive Upgrades SOC With SOAR Integration
  • Microsoft Intelligent Data Paltform Microsoft Announces Intelligent Data Platform For Database Integration
  • Why Data and Analytics Are Critical in the…

Free downloadable guide you may like:

  • The State of the IT Department in 2022

    The role of the IT professional has shifted from one that supports the business to one that is deserving of a seat at the table when it comes to making business decisions. Check out our new report to see what your peers in IT think about top concerns and opportunities in 2022.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Get the FREE Tech Decisions eNewsletter

Sign up Today!

Latest Downloads

The State of the IT Department in 2022

The role of the IT professional has shifted from one that supports the business to one that is deserving of a seat at the table when it comes to ma...

Hybrid Work Challenges
The Three Most Common Hybrid Work Challenges Two Years Into the Pandemic

Many of us have been working in a hybrid environment for two years now. Our editors thought this would be a good time to take a look at what’s work...

These 10 IT Certifications Are Critical To An IT Pro’s Success in 2022

Here are 10 cloud, data and security certifications that we identify as critical to an IT professional’s resume in 2022 and beyond, according to a ...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!
Sharp Microsoft Collaboration HQ Logo

Learn More About the
Windows Collaboration Display

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Subscribe to the Newsletter
  • Contact Us
  • Media Solutions & Advertising
  • Comment Guidelines
  • RSS Feeds
  • Terms of Use
  • Privacy Policy
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!

© 2022 Emerald X, LLC. All rights reserved.