Axiado today introduced a deterministic in-order protocol for its firewall processor architecture, delivering high performance without compromising security.
Current high-performance processor architectures use out-of-order processing, exposing digital
systems to critical hardware vulnerabilities like Meltdown and Spectre. After-the-fact patches to those
vulnerabilities significantly diminishes processor performance. Axiado’s firewall processor architecture
does not have a performance downside from in-order processing due to its efficiencies of intercoreand
Out-of-order processing was introduced in the late 1990s as a response to market expectations of continuous performance enhancement. While offering a potential performance gain of up to 15 percent, out-of-order processing and related predictive execution (speculative branching, speculative caching, and cache dumping by OS debugger) left systems vulnerable to cyberattacks.
“In totality, our processor outperforms most processors that use out-of-order protocol because our OS makes a better use of all cores and accelerators that take care of most computationally intensive programs and subroutines,” said Axel Kloth, founder and CTO of Axiado.
According to John Gustafson, inventor of Gustafson’s Law of Parallel Speed-Up, former Director of Research at Intel Labs, and Senior Fellow of AMD, “A lot of companies have discovered that things like out-of-order execution, and all these other tricks that processor companies have done to improve performance, are full of holes and allow people to penetrate and abuse the systems.” Attempts to remedy these vulnerabilities by software patching diminishes processor performance, resulting in incomplete security and zero gain in processor performance.
Nick Tredennick, developer of Motorola's MC68000, AMD’s Nx686, and IBM's Micro/370 processors affirmed, “Out-of-order execution within the current CPUs requires speculative execution, speculative branching, and speculative caching. These caching and aging algorithms are very complex and highly prone to error, causing high latency for cleanups. An in-order processor does not have this challenge, and the remaining issue of per-core performance can be mitigated using other methods.”
“The most valuable thing that a company can do is to protect individuals and make sure that their sensitive information is not exposed on the internet,” said Axel Kloth, Founder of Axiado. “Our response to the need for uncompromised security is a processor architecture that employs in-order processing that is immune to the vulnerabilities of all other processors today without giving up high performance. Our processor architecture has been specifically designed to protect itself and other processors from known and unknown cyberattacks at the first point of intrusion. We believe this technology is invaluable to network systems companies who want to deliver impenetrable firewalls with high performance to their customers.”
|Security in the Cloud|
|The Cloud, Security, and How to Protect the Infrastructure|
|Top 10 Hacks Reported in 2018|
|Complexity May Be The Biggest Issue Of Cybersecurity|