Wednesday, May 01 2024 | Updated at 11:51 PM EDT

Stay Connected With Us F T R

Mar 23, 2017 11:43 AM EDT

The Defense Advanced Research Projects Agency (DARPA) is implementing a new kind of computer security system that cannot be hacked. This system uses mathematical techniques which makes the codes looks like sentences that were logically arranged one after the other.

The technology used to create that hack-proof system is called formal verification, where every part acts like a mathematical proof. That means the program can be tested the same way mathematical theorems are proven.

According to Bryan Parno, a security and formal verification at Microsoft Research, says that with formal verification, the behavior of the program using a proof checker that will verify whether the statement is correct or not.

Jennifer Wing, the corporate vice president at Microsoft Research, added that they are not there to prove that the whole system is 100 percent correct and reliable.

Putting the Code to a Test

Little Bird, is a military drone that looks like military helicopters. While it was stationed at a Boeing facility in Arizona in 2015, a group of hackers tried to break into its system and take control of it. The hackers, however, got only as far as accessing one part of the drone's system.

Little Bird is a program of the High-Assurance Cyber Military Systems (HACMS). What the team did to the program of the military drone is to rewrite its software architecture using "high assurance building blocks." The purpose of those blocks is to make sure that the person who has access to one partition doesn't have the privilege to access other partitions. This way, they don't have full access of the system.

Since the beginning of computer science, there have been many attempts to create a formally verified software but was considered impossible. These days, however, a lot of giant tech companies like Microsoft and Amazon are collaborating with the U.S. military to do research on formal verification.

Researchers are still developing and creating different formal verification systems that are more ambitious than the last one.

See Now: Covert Team Inside Newsweek Revealed as Key Players in False Human Trafficking Lawsuit

Follows formal verification, hack-proof code, computer security system
© 2024 University Herald, All rights reserved. Do not reproduce without permission.

Must Read

Common Challenges for College Students: How to Overcome Them

Oct 17, 2022 PM EDTFor most people, college is a phenomenal experience. However, while higher education offers benefits, it can also come with a number of challenges to ...

Top 5 Best Resources for Math Students

Oct 17, 2022 AM EDTMath is a subject that needs to be tackled differently than any other class, so you'll need the right tools and resources to master it. So here are 5 ...

Why Taking a DNA Test is Vital Before Starting a Family

Oct 12, 2022 PM EDTIf you're considering starting a family, this is an exciting time! There are no doubt a million things running through your head right now, from ...

By Enabling The Use Of Second-Hand Technology, Alloallo Scutter It's Growth While Being Economically And Environmentally Friendly.

Oct 11, 2022 PM EDTBrands are being forced to prioritise customer lifetime value and foster brand loyalty as return on advertising investment plummets. Several brands, ...