Will Zero Vulnerability Computing (ZVC) Ever Be Possible? Testing the Hypothesis
Fazal Raheman,
Tejas Bhagat,
Brecht Vermeulen and
Peter Van Daele
Additional contact information
Fazal Raheman: Blockchain 5.0 Ltd., Kesklinna Linnaosa, Ahtri tn 12, 10151 Tallinn, Estonia
Tejas Bhagat: Blockchain 5.0 Ltd., Kesklinna Linnaosa, Ahtri tn 12, 10151 Tallinn, Estonia
Brecht Vermeulen: IDLab iGent Tower—Department of Information Technology, IMEC—Ghent University, Technologiepark-Zwijnaarde 126, B-9052 Ghent, Belgium
Peter Van Daele: IDLab iGent Tower—Department of Information Technology, IMEC—Ghent University, Technologiepark-Zwijnaarde 126, B-9052 Ghent, Belgium
Future Internet, 2022, vol. 14, issue 8, 1-20
Abstract:
Life without computers is unimaginable. However, computers remain vulnerable to cybercrimes, a USD 6 trillion industry that the world has come to accept as a “necessary evil”. Third-party permissions resulting in an attack surface (AS) and in-computer storage that computers mandate are key design elements that hackers exploit, formerly by remote malware installation and later by stealing personal data using authentication faking techniques. In legacy computers, the AS cannot be completely eliminated, nor can a connected device retain data offline, rendering fool-proof cybersecurity impossible. Although the architects of legacy computers made perfectly reasonable engineering trade-offs for their world, our world is very different. Zero vulnerability computing (ZVC) challenges the impossible with in-computer offline storage (ICOS) and Supra OS (SOS), to deliver comprehensive protection against vulnerabilities. The feasibility of ZVC is demonstrated in a tiny permanently computer-mounted hardware wallet, providing the first evidence of the complete obliteration of the AS. Malware cannot infect the ZVC device on account of lacking an AS, nor can personal data be hacked as they mostly remain offline, except for sporadic processing. Further research should explore whether ZVC can fully secure computers in more complex real-world scenarios and open a new epoch in the evolution of computers and the Internet.
Keywords: cybercrimes; cyber security; computer vulnerabilities; attack surface; IoT; computer architecture; malware; hacking (search for similar items in EconPapers)
JEL-codes: O3 (search for similar items in EconPapers)
Date: 2022
References: View references in EconPapers View complete reference list from CitEc
Citations: View citations in EconPapers (1)
Downloads: (external link)
https://www.mdpi.com/1999-5903/14/8/238/pdf (application/pdf)
https://www.mdpi.com/1999-5903/14/8/238/ (text/html)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:gam:jftint:v:14:y:2022:i:8:p:238-:d:876381
Access Statistics for this article
Future Internet is currently edited by Ms. Grace You
More articles in Future Internet from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().