top of page
polyplexus_madness.png

Additional Evidence Madness Comments & Further Update

Comments: By any measure, the security market is massive, and cyber-attacks spur demand for security software. Costs of cybercrime damage are slated to reach $6 trillion by 2021 annually. The CPU protecting cybersecurity will form a wave of several major, long-term security and security-required R&D and business trends to:  
   1)    reduce or eliminate protection expenses due to the built-in nature of the proactive protections; and 
   2)    mitigate computing and networking time and cost overheads by reducing or removing trends of the existing security software updating and network monitoring overheads. 
We expect that further R&D will immunize any type of processor (e.g., CPU, AP, DSP, NPU, MCU, etc.) for any computer, smart-connected device, embedded system, IoTs, etc., which are secured with security software or not even protected.

Comments on Cybersecurity for IoTs and Embedded Systems

Billions of IoT and embedded systems—including autonomous and electric vehicles, drones, smart home security systems, autonomous farming equipment, biometric cybersecurity scanners, ultra-high-speed wireless networks (e.g., 6G and beyond), wearable health monitors, and smart factory equipment—are currently in use and will continue to proliferate at an unprecedented rate. These devices primarily rely on microcontrollers (MCUs) and various types of processors, such as embedded processors, DSPs, ASIPs, and media processors. Nearly all of them are interconnected through advanced communication networks, which exposes them to significant cybersecurity risks.

In particular, MCUs and processors (e.g., CPU, AI accelerators, application processors) that operate within next-generation ultra-high-speed networks (e.g., 100 Gbps with low-latency 6G) face immense challenges in running conventional security software due to computational overhead. Addressing these vulnerabilities requires cybersecurity measures to be enforced directly at the CPU level. Consequently, CPU-level protection will no longer be optional but a fundamental necessity for securing future IoT and embedded systems.

Comments on AI Cybersecurity

One of the core functions of artificial intelligence (AI) is to facilitate “the future of complex decision-making” through massive-scale data processing, absorption, and interpretation. However, the effectiveness of AI models hinges on their ability to process accurate and authorized data. Furthermore, AI systems must learn exclusively from trusted data sources to prevent adversarial manipulation.

CPU-based cybersecurity ensures that AI systems operate only on legitimate data by preventing unauthorized access, data poisoning, or adversarial attacks. This approach safeguards AI from being influenced by malicious inputs supplied by hackers, thereby ensuring that AI-driven decisions remain secure, unbiased, and aligned with ethical standards.

Comments on Emerging Cybersecurity Threats

Recent cybersecurity reports, including those from IBM, have highlighted alarming attacks on critical sectors. For example, during the COVID pandemic, hackers targeted vaccine research institutions, attempting to steal invaluable intellectual property. These attacks pose serious ethical and global security concerns, as they undermine the collective efforts of researchers, governments, and private organizations working toward humanitarian advancements.

Despite being a miniature semiconductor encapsulated in a ceramic package, an immunized CPU can serve as a formidable defense mechanism, proactively neutralizing cyber threats before they compromise critical research and innovation. By embedding cybersecurity directly into hardware, immunized CPUs can prevent unauthorized access to sensitive information and ensure that mission-critical data remains protected from malicious actors worldwide.

bottom of page