MORPHEUS vs. Everybody
DARPA pitted 500+ hackers against this computer chip. The chip won.
An “unhackable” computer chip lived up to its name in its first bug bounty competition, foiling over 500 hackers who were offered tens of thousands of dollars to crack it and three other secure processor technologies.
MORPHEUS, developed by electrical engineering and computer science researchers at the University of Michigan, weathered the three-month virtual competition DARPA dubbed the FETT Challenge without a single successful attack. The challenge ran from June through August of 2020 and also tested technologies from MIT, Cambridge University, Lockheed Martin and non-profit tech institute SRI International.
The end of “patch and pray?”
The U-M team achieved its results by abandoning a cornerstone of traditional computer security—finding and eliminating software bugs, explained Todd Austin, the team’s leader and the S. Jack Hu Collegiate Professor of Computer Science and Engineering. MORPHEUS works by reconfiguring key bits of its code and data dozens of times per second, turning any vulnerabilities into dead ends for hackers.
“Imagine trying to solve a Rubik’s Cube that rearranges itself every time you blink,” Austin said. “That’s what hackers are up against with MORPHEUS. It makes the computer an unsolvable puzzle.”
MORPHEUS has previously proven itself in the lab, but the FETT Challenge marks the first time that it was exposed to a group of skilled hackers from around the globe. Austin says its success is further proof that computer security needs to move away from its traditional bugs-and-patches paradigm.
“Today’s approach of eliminating security bugs one by one is a losing game,” Austin said. “Developers are constantly writing code, and as long as there is new code, there will be new bugs and security vulnerabilities. With MORPHEUS, even if a hacker finds a bug, the information needed to exploit it vanishes within milliseconds. It’s perhaps the closest thing to a future-proof secure system.”
For the FETT competition, the MORPHEUS architecture was built into a computer system that housed a mock medical database. Computer experts were invited to try to breach it remotely. MORPHEUS was the second-most popular target of the four technologies in the competition.
MORPHEUS’s secrets: Protecting ‘undefined semantics’ with encryption and churn
Even though it presents a fortress to attackers, Austin says MORPHEUS is transparent to software developers and end users. This is because it focuses on randomizing bits of data known as “undefined semantics.” Undefined semantics are nooks and crannies of the computing architecture—for example the location, format, and content of program code. They’re part of a processor’s most basic machinery, and legitimate programmers don’t generally interact with them. But hackers can reverse-engineer them to uncover vulnerabilities.
The MORPHEUS chip protects undefined semantics through what Austin calls “encryption and churn.” Encryption randomizes the important undefined semantics that hackers need to launch a successful attack, while churn re-randomizes them while the system is running. This puts attackers in a race against the clock to discover the information that they need. Austin said that the churn rate is normally kept low to keep system performance high. But when a would-be hacker exercises an undefined semantic in an attempted attack, the churn rate spikes, stopping attackers in their tracks.
MORPHEUS participated in the FETT challenge as part of DARPA’s System Security Integration Through Hardware and Firmware program, designed to foster technologies that find new ways to safeguard the digital world. While its participation in that program has ended, MORPHEUS is continuing to advance through Agita Labs, a U-M spinoff company founded by Austin and Valeria Bertacco, an Arthur F. Thurnau Professor and a professor of computer science and engineering.
“I’m excited to see how MORPHEUS evolves now that it has proven itself in the FETT Challenge, and as security becomes a more and more pressing challenge in the tech world,” Austin said. “We are adapting the technology to protect the most sensitive data in the cloud, including medical and genomic data, biometrics and financial credentials.”
The MORPHEUS architecture is detailed in a 2019 paper titled “MORPHEUS: A Vulnerability-Tolerant Secure Architecture Based on Ensembles of Moving Target Defenses with Churn.” Other researchers on the paper include Bertacco, U-M computer science and engineering assistant professor Baris Kasikci; computer science and engineering graduate research assistants Mark Gallagher, Lauren Biernacki, Zelalem Birhanu Aweke, Salessawi Ferede Yitbarek, Misiker Tadesse Aga; Shibo Chen; Mohit Tiwari and Austin Harris at University of Texas at Austin; and Sharad Malik and Zhixing Xu at Princeton University.
The research was supported by the DARPA SSITH program under contract HR0011-18-C-0019.
DARPA statement: “A” (Approved for Public Release, Distribution Unlimited)