top of page

Evidence Madness

A competition organized by POLYPLEXUS to identify seminal scientific evidence published within the last five years that will lead to new, transformative industries by 2040.

64 submissions solicited from four domains: Physics, Chemistry, Computer Science, and the Life Sciences, and discovered evidence that will create change by 2040.
Submitted evidence in each domain went head to head in a competitive bracket competition.

Kyu Jung submitted "Protect CPU" via Computer Science domain won the 2nd place

2nd Place Evidance madness.png

click to see more info

final_evidence_madness.png

 Evidence & Comments submitted 

Micro Abstract: An inherently secure processor is developing to prevent from a malicious attack. A cyber-attack must be executed by a CPU to infect or control a computer. The secured CPU disables a malicious attack.

Submission Reason: Current software-based protections inherently have limitations to protect against malicious attacks. Since such protections are in a reactive manner, it is impossible to eliminate a root of threats. These reactive protections never break existing chain effects between attacks and protections. However, any software-based cyber-attack must be executed by a CPU to successfully infect data or control a computer. Therefore, such cyber-attacks can be disabled by a secured CPU, which is capable of proactively protecting a computing system before any malicious attack is successful. Although the existing evidence has to overcome overheads, other development for immunizing CPU is recently introduced to provide advanced protection of CPUs for cybersecurity without security software. This disruptive concept and R&D are expected to replace a reactive nature of existing software-based security industry with immunized computing systems that remove a root of threats without extra cost.

Comments: Experts consent that “RESILIENCY” represents a new era in cybersecurity. The proactive approach protects CPUs and does not activate attacks. This evidence will delve into the feasibility of “PROTECTION” that eliminates the roots of threats and rethink about the potential paradigm shift that may reform security industry and future R&D directions. This approach urges us to rethink about emerging security paradigm shift.

bottom of page