• Welcome to TechPowerUp Forums, Guest! Please check out our forum guidelines for info related to our community.

DARPA Believes the Future of Security to be in Additional Processing Hardware

Raevenlord

News Editor
Joined
Aug 12, 2016
Messages
3,755 (1.18/day)
Location
Portugal
System Name The Ryzening
Processor AMD Ryzen 9 5900X
Motherboard MSI X570 MAG TOMAHAWK
Cooling Lian Li Galahad 360mm AIO
Memory 32 GB G.Skill Trident Z F4-3733 (4x 8 GB)
Video Card(s) Gigabyte RTX 3070 Ti
Storage Boot: Transcend MTE220S 2TB, Kintson A2000 1TB, Seagate Firewolf Pro 14 TB
Display(s) Acer Nitro VG270UP (1440p 144 Hz IPS)
Case Lian Li O11DX Dynamic White
Audio Device(s) iFi Audio Zen DAC
Power Supply Seasonic Focus+ 750 W
Mouse Cooler Master Masterkeys Lite L
Keyboard Cooler Master Masterkeys Lite L
Software Windows 10 x64
DARPA seems to be taking to heart engineer and cyber-security experts' opinions that hardware-based security would be the best security. The Defense Advanced Research Agency (DARPA), which has appeared in every other sci-fi war movie, has started its System Security Integrated through Hardware and Firmware (SSITH) program, with an initial kick worth $3.6 million to the University of Michigan. The objective? To develop "unhackable" systems, with hardware-based security solutions that become impervious to most software exploits.

Electrical Engineering and Computer Science (EECS) of the University of Michigan Professor Todd Austin, lead researcher on the project, says his team's approach, currently code-named Morpheus, achieves hack-proof hardware by "changing the internal codes once a second". Austin likens Morpheus' defenses to requiring a would-be attacker to solve a new Rubik's Cube every second to crack the chip's security. In this way, the architecture should provide the maximum possible protection against intrusions, including hacks that exploit zero-day vulnerabilities, or those that cybersecurity experts have yet to discover. Morpheus thereby provides a future-proof solution, Austin said. "This race against ever more clever cyberintruders is never going to end if we keep designing our systems around gullible hardware that can be fooled in countless ways by software," SSITH program manager Linton Salmon of the Agency's Microsystems Technology Office.





This approach is a far cry from the usual "patch and pray" philosophy: "To break this cycle and thwart both today's and tomorrow's software attacks, the SSITH program challenges researchers to design security directly at the hardware architecture level," said Salmon. "Instead of relying on software Band-Aids to hardware-based security issues, we are aiming to remove those hardware vulnerabilities in ways that will disarm a large proportion of today's software attacks."

The final Morpheus hardware will actually be a hardware version of the Morpheus algorithm that the University of Michigan has already developed, and bases its security chops by constantly changing the location of the protective firmware with hardware - hardware that also constantly scrambles the location of stored, encrypted passwords. A solution that's already being employed in software as of today; however, Austin believes that moving software efforts to a hardware-based solution can eliminate all classes of known vulnerabilities: permissions and privileges, buffer errors, resource management, information leakage, numeric errors, crypto errors, and code injection.



Austin said that Morpheus will provide a future-proof solution for cybersecurity, though it's uncertain whether or not this confidence applies to the advent of quantum computing. Whether or not a hardware-solution based on conventional physics is enough to stop a quantum-based computer still remains contested in the field, but DARPA, and the University of Michigan, seem to have their ideas on the subject.

View at TechPowerUp Main Site
 
In other words, a government sanctioned version of Intel Management Engine/AMD Secure Technology. I wouldn't be surprised if the vulnerabilities in those is what spurred DARPA to create this program.
 
In other words, a government sanctioned version of Intel Management Engine/AMD Secure Technology. I wouldn't be surprised if the vulnerabilities in those is what spurred DARPA to create this program.
What they need is a platform built form the ground up that is code-compatible, but not code-dependent or code-vulnerable with current systems. Perhaps using a trinary code set instead of binary.

The real future of data security is, ironically, in the past. Data systems of critical concern need to be taken offline permanently and the feed and reteival information completely manual after strict vetting.
 
Data systems of critical concern need to be taken offline permanently and the feed and reteival information completely manual after strict vetting.
Once you take data offline, it becomes quite a hassle to access on a regular basis though. I would very much like to see a secure system with the convenience of accessing it almost instantly.
 
Once you take data offline, it becomes quite a hassle to access on a regular basis though. I would very much like to see a secure system with the convenience of accessing it almost instantly.
That would be nice. The reality though is that anytime you connect anything to the internet, it becomes inherently insecure to some degree. A completely isolated system might be cumbersome, but it is unhackable unless you are physically present, a condition which can be strictly controlled. An alternate solution is to have scheduled connection access, IE a system which is only connected at scheduled times and is then physically disconnected after. Or variation of that, a system which can be connected "on-demand" whereby those with clearence to connect and access use a form of secured communication to request connection, do the work needed and then disconnect upon completion.
 
Hardware-based security also means hardware-based exploits/backdoors like we've seen with Intel's ME recently (and with various SoCs).
Allegations like "provides a future-proof solution" must always be said to secure funding, but have been rendered null since forever because such is the nature of technology (be it security or feature-wise).
It might provide some level of novel security over what exists right now, be government approved and whatever, but not making it air-gapped alone makes it fully vulnerable, for example.
Also, no software patching means hardware revisions and field replacements. I'm sure the USA's government (or any other) funding can take care of that... :rolleyes:
 
In other words, a government sanctioned version of Intel Management Engine/AMD Secure Technology. I wouldn't be surprised if the vulnerabilities in those is what spurred DARPA to create this program.

That's my first thought.

Unless they fully release the ASIC hardwares FPGA source, I won't trust it. And even then, I'm skeptical that's what's getting put in the chip.
 
Back
Top