Challenge #57
Tackling security vulnerabilities in processors.
Data is a valuable asset and therefore an increasingly common target of cyberattacks. We ensure the security of our data with new defense mechanisms.
Participating centers
Processors are the heart of computers. Until now, they have been developed with emphasis on speed rather than security. However, processors are not perfect, and unintended side effects of changes in code can allow attackers to draw conclusions about confidential data. For example, the time it takes the processor to process certain inputs can be revealing of certain information. Through runtime analysis, hackers gain insight that can help them steal data without ever leaving a trace. So far, these so-called side-channel attacks can hardly be prevented.
We are working to discover and understand unintended side effects. With this knowledge, we can ensure that such vulnerabilities will not pose a threat in future processors. We are also developing techniques to analyze the complex interactions inside a processor and explore the physical effects that occur there. In this way, we are laying the foundation for secure processors that still offer maximum performance.
(Header: Chris Ried/Unsplash)