Will Zero Vulnerability Computing (Zvc) Ever Be Possible? Testing the Hypothesis

12 Pages Posted: 18 Jun 2022

See all articles by Fazal Raheman

Fazal Raheman

affiliation not provided to SSRN

Tejas Bhagat

affiliation not provided to SSRN

Brecht Vermeulen

Ghent University

Peter Van Daele

Ghent University

Abstract

Life without computers is unimaginable. However, computers remain vulnerable to cybercrimes, an exponentially growing $6 trillion industry that the world has come to accept as “necessary evil.” Third-party permissions resulting in an attack surface (AS) and in-computer storage that computers mandate are the two key design elements that hackers exploit: the former by remote malware installation, and the latter by stealing personal data using authentication faking techniques. In legacy computers, neither AS can be completely eliminated nor can a connected device store data offline. These evil necessities render fool-proof cybersecurity impossible. Although the architects of legacy computers made perfectly reasonable engineering trade-offs for their world, our world is very different. ZVC (Zero Vulnerability Computing) challenges the impossible with two new rules that design a hardware component, ICOS (In-Computer Offline Storage) and a software component, Supra OS (SOS), to deliver a comprehensive protection against vulnerabilities. We demonstrate the feasibility of ZVC in a minimalist milieu of a tiny form-factor NAND chipset that’s permanently mounted on a host computer as a hardware wallet, providing the first evidence of complete obliteration of AS. In the restricted environment of the experiment, neither malware could infect the ZVC device due to a lack of AS, nor personal data could be hacked as it mostly remained offline, except for sporadic processing. Further research should explore whether ZVC can fully secure computers in more complex real-world scenarios and open a new epoch in the evolution of computers.

Keywords: Cybercrimes, cybersecurity, computer vulnerabilities, attack surface, computer architecture, IoT

Suggested Citation

Raheman, Fazal and Bhagat, Tejas and Vermeulen, Brecht and Van Daele, Peter, Will Zero Vulnerability Computing (Zvc) Ever Be Possible? Testing the Hypothesis. Available at SSRN: https://ssrn.com/abstract=4139896 or http://dx.doi.org/10.2139/ssrn.4139896

Fazal Raheman (Contact Author)

affiliation not provided to SSRN ( email )

No Address Available

Tejas Bhagat

affiliation not provided to SSRN ( email )

No Address Available

Brecht Vermeulen

Ghent University ( email )

Coupure Links 653
Ghent, 9000
Belgium

Peter Van Daele

Ghent University ( email )

Coupure Links 653
Ghent, 9000
Belgium

Do you have a job opening that you would like to promote on SSRN?

Paper statistics

Downloads
51
Abstract Views
382
Rank
733,336
PlumX Metrics