DerKilp

DerKilp Contact information, map and directions, contact form, opening hours, services, ratings, photos, videos and announcements from DerKilp, Magazine, .

15/02/2022
Shape-shifting computer chip thwarts an army of hackersThe big ideaWe have developed and tested a secure new computer pr...
16/11/2021

Shape-shifting computer chip thwarts an army of hackers
The big idea
We have developed and tested a secure new computer processor that thwarts hackers by randomly changing its underlying structure, thus making it virtually impossible to hack.

Last summer, 525 security researchers spent three months trying to hack our Morpheus processor as well as others. All attempts against Morpheus failed. This study was part of a program sponsored by the U.S. Defense Advanced Research Program Agency to design a secure processor that could protect vulnerable software. DARPA released the results on the program to the public for the first time in January 2021.

A processor is the piece of computer hardware that runs software programs. Since a processor underlies all software systems, a secure processor has the potential to protect any software running on it from attack. Our team at the University of Michigan first developed Morpheus, a secure processor that thwarts attacks by turning the computer into a puzzle, in 2019.

A processor has an architecture – x86 for most laptops and ARM for most phones – which is the set of instructions software needs to run on the processor. Processors also have a microarchitecture, or the “guts” that enable the ex*****on of the instruction set, the speed of this ex*****on and how much power it consumes.

Hackers need to be intimately familiar with the details of the microarchitecture to graft their malicious code, or malware, onto vulnerable systems. To stop attacks, Morpheus randomizes these implementation details to turn the system into a puzzle that hackers must solve before conducting security exploits. From one Morpheus machine to another, details like the commands the processor executes or the format of program data change in random ways. Because this happens at the microarchitecture level, software running on the processor is unaffected.
A skilled hacker could reverse-engineer a Morpheus machine in as little as a few hours, if given the chance. To counter this, Morpheus also changes the microarchitecture every few hundred milliseconds. Thus, not only do attackers have to reverse-engineer the microachitecture, but they have to do it very fast. With Morpheus, a hacker is confronted with a computer that has never been seen before and will never be seen again.

Why it matters
To conduct a security exploit, hackers use vulnerabilities in software to get inside a device. Once inside, they graft their malware onto the device. Malware is designed to infect the host device to steal sensitive data or spy on users.

The typical approach to computer security is to fix individual software vulnerabilities to keep hackers out. For these patch-based techniques to succeed, programmers must write perfect software without any bugs. But ask any programmer, and the idea of creating a perfect program is laughable. Bugs are everywhere, and security bugs are the most difficult to find because they don’t impair a program’s normal operation.

Morpheus takes a distinct approach to security by augmenting the underlying processor to prevent attackers from grafting malware onto the device. With this approach, Morpheus protects any vulnerable software that runs on it.

What other research is being done
For the longest time, processor designers considered security a problem for software programmers, since programmers made the software bugs that lead to security concerns. But recently computer designers have discovered that hardware can help protect software.

Academic efforts, such as Capability Hardware Enhanced RISC Instructions at the University of Cambridge, have demonstrated strong protection against memory bugs. Commercial efforts have begun as well, such as Intel’s soon-to-be-released Control-flow Enforcement Technology.

Morpheus takes a notably different approach of ignoring the bugs and instead randomizes its internal implementation to thwart exploitation of bugs. Fortunately, these are complementary techniques, and combining them will likely make systems even more difficult to attack.

What’s next
We are looking at how the fundamental design aspects of Morpheus can be applied to protect sensitive data on people’s devices and in the cloud. In addition to randomizing the implementation details of a system, how can we randomize data in a way that maintains privacy while not being a burden to software programmers?

We’re just not compatible any more: why Microsoft finally dumped Internet ExplorerTech giant Microsoft recently announce...
16/11/2021

We’re just not compatible any more: why Microsoft finally dumped Internet Explorer
Tech giant Microsoft recently announced the retirement of its longstanding web browser, Internet Explorer, in favour of its newer product, Microsoft Edge. With support for Internet Explorer only set to last until June 15, 2022, its remaining users have just over a year to find an alternative. But of course, most web users already have.

While the eventual downfall of Internet Explorer was seen as a foregone conclusion by those who monitor web trends, the news might come as an unwelcome surprise for those who are somewhat less up-to-date.

For the most part, though, this news is a whimper rather than a bang — a footnote at the end of an iconic story spanning more than 25 years.

As a current professional in the IT industry, I’ll break down some possible reasons for this decision, and what we can learn from it.
Searching for the answer
Almost everyone is familiar with the idea of “googling” something, but there’s no such thing as “microsofting” something. How did Google manage to become synonymous with web searching, while Microsoft, despite its long and pioneering history, failed to become synonymous with anything?

The answer is market share. Google handles 92.24% of web searches — more than 3.5 billion requests a day. Microsoft’s own search engine, Bing, has a paltry 2.29%.
It’s easy to see why users prefer Google’s own web browser, Chrome, over Microsoft’s Internet Explorer, which uses Bing as its default search engine. Users who prefer searching via Google (which is almost everyone) can make Google the default search engine in Internet Explorer. But it’s probably easier just to install Chrome and use Google from there.

Success breeds complacency; complacency breeds failure
Microsoft wasn’t always a bit player. Back when the web was in its infancy, it was a market-leading pioneer. Before there were app stores, or 5G, or even widespread personal computers, there were large mainframe computers with “unfriendly” Unix-based operating systems developed in the 1970s.

These systems were about as bare-bones as you can get, with little consideration given to graphics or usability. Unix’s original web browser, Netscape, was similarly no-frills.

This is where Microsoft came in, by focusing on making “personal computers” more personal. With much nicer designs and more intuitive user interfaces, by the time Internet Explorer launched in 1995, Microsoft had cemented itself at the forefront of the digital world.

But as US Baptist minister and civil rights leader Benjamin E. Mays famously warned, “The tragedy of life is often not in our failure, but rather in our complacency.”

Having established its reputation, Microsoft stopped pushing Internet Explorer’s development, and started venturing elsewhere, continually improving Windows but not its web browser. From that point on, Internet Explorer was always late to the party in introducing innovations such as tabbed browsing and search bars. It fell further into irrelevance and obsolescence.

Compatibility issues
Having spent much of my life as a web developer, one of my biggest gripes is the incompatibility of some web browsers. It’s exhausting and demoralising spending hours polishing web pages, only for them not to run properly on some browsers.

This concern even spread to Microsoft’s own in-house developers. In a 2019 blog post titled “The perils of using Internet Explorer as your default browser”, Microsoft’s Chris Jackson warned:

[…] developers by and large just aren’t testing for Internet Explorer these days. They’re testing on modern browsers.

The message was clear: web developers don’t get on well with Internet Explorer, so sites that work well on other browsers might not work here — and that problem is only going to get worse.

With Microsoft having lost interest in making sure Internet Explorer keeps up, it has transferred its attention to its new browser, Microsoft Edge. But the horse may already have bolted. The marketplace is crowded with Google’s Chrome, Apple’s Safari, Mozilla’s Firefox, and numerous open source browsers.

Read more: Battle of the browsers: how the web was won

Phoning it in
Here’s another key stat that illustrates Internet Explorer’s decline: in 2020, more than two-thirds of all website visits were via a mobile device.

Now, a browser that can sync across multiple platforms is a necessity. In a world of Apple and Android devices, the term “Windows phone” sounds prehistoric — because it pretty much is. Operating system support for Windows phones ended in 2017, just seven years after Microsoft first launched the range.

How older people are mastering technology to stay connected after lockdownIt’s a well-worn stereotype: the image of an e...
16/11/2021

How older people are mastering technology to stay connected after lockdown
It’s a well-worn stereotype: the image of an elderly person fiddling with technology that leaves them completely bamboozled. The media often depict older people struggling to use or manage digital technology. While this is often designed to be humorous, it can undermine them as users of technology. And that’s a problem if it turns older people off from trying to engage with digital devices, as it can affect their wellbeing.

Older adults are already at a digital disadvantage: 18% of over-65s do not have internet access. Propelled by enforced isolation, older people increasingly turned to technology during the pandemic, but not all were able to connect or communicate with friends and family via the internet.

Of course some older people have less experience of digital technology than others, and unsurprisingly describe mixed emotions regarding the use of everyday devices such as smartphones, laptops, e-readers and tablets. They also report not having much confidence when it comes to using them. Lack of control, a sense of being overwhelmed, and poor product design can lead to feelings of being incompetent, alone and even trapped.

Yet for those who persevere, the rewards can be plentiful: completing tasks more easily, communicating more effectively, increased independence and a sense of achievement. These things are important if this growing part of the population is to experience ageing in a more positive and empowering way.

Through our research we wanted to examine these mixed emotions that older people have about using technology, and how they develop ways to combat the challenges they face. While digital technology has been shown to alleviate pressure on health and social care, until now there’s been a limited understanding of how using technology influences the way older adults live.
Attitudes towards technology
While many see digital technology as a challenge to be conquered, there are different ways of overcoming or confronting the obstacles. Some may view the challenge as a personal goal, using instruction manuals or simply trial and error to prevail over software updates, unwanted viruses or junk mail.

Others view digital technology as a collective endeavour, asking friends and family for help. Not only is this the most successful strategy, it also fosters important interaction with others. For example, during the pandemic many younger people acted as IT support for older friends and relatives.

Not all elderly people have this kind of network, but arguably they can benefit most from greater use of the internet to feel connected and keep loneliness at bay. In these situations, there are useful schemes run by charities such as Age UK, where digital champions can help older adults master technology.

Adopting strategies
Understandably frustrations emerge when learning a new skill, but some older people have shown how they overcome their exasperation by developing a relationship with their devices. Naming their tablet or humanising their phone helps to bond older people to technology.

In our study different devices were often referred to as having a personality, gender, or even a mind of their own. This strategy brings a little levity to a situation that could otherwise be stressful.

Once these people become more used to digital technology, familiarity can encourage continued use. With a new device, software and apps they know and understand can be downloaded so that it feels less alien. Similarly, if a touchscreen is problematic, some older people might decide to use a keyboard and mouse instead.

16/11/2021

Address


Alerts

Be the first to know and let us send you an email when DerKilp posts news and promotions. Your email address will not be used for any other purpose, and you can unsubscribe at any time.

Contact The Business

Send a message to DerKilp:

Shortcuts

  • Address
  • Alerts
  • Contact The Business
  • Claim ownership or report listing
  • Want your business to be the top-listed Media Company?

Share