Cyber Attacks can be thwarted with Shakthi T Microprocessor!

Cyber Attacks can now be thwarted with the help of Microprocessors eventually leading to a phase where the software based anti-virus solutions will be replaced by hardware-based silicon chips.

Yes, the researchers at the Indian Institute of Technology of Madras (IIT-M) have developed a microprocessor chip which helps in protecting computer, smartphones, and tablets from almost all variants of cyber threats.

Called Shakti-T, the processor has the ability to detect suspicious software like WannaCry accessing a system’s memory in an unauthorized way and restricting the malware’s access to stored data in the memory.

Technically, the silicon wafer works on the concept called “Tagged Instruction Architecture” where all instructions are pre-coded into software that controls the way a computing device behaves to any command or instruction.

In general, as soon as a user clicks an infected email or forwarded link, the program launches itself and gains unauthorized access to memory locations in the system and encrypts the stored data.

The Shakti T processor has the ability to detect the malware program and guard it against being executed which eventually protects the memory from being accessed in an illegitimate way.

Assistant professor Chester Rebeiro said that the newly invented processor could abolish the need to use an anti-malware solution provided it gets support from the operating system and the applications.

Currently, the researchers under the leadership of Professor Kamakoti are busy in redesigning the OS and the applications that go with it. Once this is done, Shakthi T will be available for testing and can later be used for commercial purposes.

The Researchers of the Madras University are aiming the Cyber Attack Defense related Microprocessor at critical applications like those used in Military and Nuclear Power Grids.

Ad
Naveen Goud
Naveen Goud is a writer at Cybersecurity Insiders covering topics such as Mergers & Acquisitions, Startups, Cyber Attacks, Cloud Security and Mobile Security

No posts to display