shot-button
Subscription Subscription
Home > News > World News > Article > This black box chip in devices can frustrate hackers

This 'black box' chip in devices can frustrate hackers

Updated on: 14 May,2018 08:04 PM IST  |  New York
IANS |

According to Computer Science Professor Dmitri Strukov from the University of California-Santa Barbara, he and his team were looking to put an extra layer of security on devices

This 'black box' chip in devices can frustrate hackers

HackingRepresentational Image


In an era of Machine Learning (ML)-enabled hacking, in which Artificial Intelligence (AI) technology is trained to "learn" and model inputs and outputs, a new chip-based technology termed as a "black box" can thwart hackers' plans, say, researchers.


According to Computer Science Professor Dmitri Strukov from the University of California-Santa Barbara, he and his team were looking to put an extra layer of security on devices.


The result is a chip that deploys "ionic memristor" technology.

Key to this technology is the memristor, or memory resistor -- an electrical resistance switch that can "remember" its state of resistance based on its history of applied voltage and current.

A circuit made of memristors results in a "black box" of sorts, as Strukov called it, with outputs extremely difficult to predict based on the inputs.

"You can think of it as a black box. Due to its nature, the chip is physically unclonable and can, thus, render the device invulnerable to hijacking, counterfeiting or replication by cyber-criminals," said Strukov in a paper which appeared in the journal Nature Electronics.

With ML, an attacker doesn't even need to know what exactly is occurring as the computer is trained on a series of inputs and outputs of a system.

"For instance, if you have 2 million outputs and the attacker sees 10,000 or 20,000 of these outputs, he can, based on that, train a model that can copy the system afterwards," said Hussein Nili, the paper's lead author.

The "memristive black box" can circumvent this method of attack because it makes the relationship between inputs and outputs look random enough to the outside world even as the circuits' internal mechanisms are repeatable enough to be reliable.

"If we scale it a little bit further, it's going to be hardware which could be, in many metrics, the state-of-the-art," Strukov noted.

Catch up on all the latest Crime, National, International and Hatke news here. Also, download the new mid-day Android and iOS apps to get latest updates

This story has been sourced from a third party syndicated feed, agencies. Mid-day accepts no responsibility or liability for its dependability, trustworthiness, reliability and data of the text. Mid-day management/mid-day.com reserves the sole right to alter, delete or remove (without notice) the content in its absolute discretion for any reason whatsoever.

"Exciting news! Mid-day is now on WhatsApp Channels Subscribe today by clicking the link and stay updated with the latest news!" Click here!


Mid-Day Web Stories

Mid-Day Web Stories

This website uses cookie or similar technologies, to enhance your browsing experience and provide personalised recommendations. By continuing to use our website, you agree to our Privacy Policy and Cookie Policy. OK