Skip to Content

From the Lab: Information Technology

New publications, experiments and breakthroughs in information technology–and what they mean.
August 19, 2008

Low-Power Chip
An efficient new chip could be used for implantable medical sensors

The tiny chip at the center of this penny could be used to control biomedical implants.

Source: “The Phoenix Processor: a 30pW Platform for Sensor Applications”
Mingoo Seok et al.
IEEE Symposium on VLSI Circuits, June 2008

Results: Researchers at the University of Michigan have designed a chip less than one millimeter square that uses about a 10th as much energy as the most energy-efficient chips on the market.

Why it matters: The chip could be a boon to sensor design. Its small size–along with the energy savings it provides, which reduce the size of the battery needed–makes it feasible to build sensors that could be implanted under the skin to gauge glucose levels in subcutaneous fluid, or in contact lenses to monitor pressure on the eye.

Methods: Since sensor chips are inactive most of the time, the researchers focused on reducing the amount of energy wasted when the chip is in sleep mode. They redesigned the chip to use less memory (a big source of energy leakage), in part by incorporating hardware for data compression. Next, they reduced the small amounts of power that most transistors leak even when turned off, opting for slightly larger transistors that leak less. They also added special transistors that completely shut off the power supply to the processing transistors when they’re not in use.

Next Steps: The researchers will add a battery to the chip and develop a way to wirelessly download data from it.

Denying Attacks
A two-layer system stops intelligent denial-of-service attacks

Source: “Mitigating Application-Level Denial of Service Attacks on Web Servers: A Client-Transparent Approach”
Mudhakar Srivatsa et al.
ACM
Transactions on the Web, July 2008: 15

Results: Researchers at IBM’s T. J. Watson Research Center and Georgia Tech have developed new security software that minimizes the effects of a type of attack that ties up websites with automated requests, preventing people from using them. The software is tailored to websites that host applications, such as word-­processing and ­interactive-shopping programs.

Why it matters: Denial-of-service attacks can shut down websites, potentially costing millions in revenue. They’re particularly difficult to prevent on websites that host applications, since the automated requests can look very similar to requests from real website users. Distinguishing legitimate users from attackers usually requires cumbersome and inconvenient procedures for logging in to a site. The new software avoids this requirement.

Methods: The researchers wrote algorithms for two filtering systems that prevent attacks. The first limits the total number of requests to the website; the second gives priority to certain users on the basis of what they do on the site. For example, a user who frequently hits the “buy” button will be given higher priority, while users making a quick succession of demanding requests–for example, to download many large image files–will be given a low ­priority. Would-be attackers would tend to make more requests that use up a lot of bandwidth, memory, or processing power but would not perform valuable actions such as making purchases, so they would be flagged; their access to the site would be reduced and eventually cut off.

Next steps: To use the system, programmers must categorize the activities of a website’s users and assign values to each activity. The researchers’ system currently provides an interface that allows programmers to do this. They plan to improve the interface, developing tools to help programmers make the necessary judgments.

Keep Reading

Most Popular

Large language models can do jaw-dropping things. But nobody knows exactly why.

And that's a problem. Figuring it out is one of the biggest scientific puzzles of our time and a crucial step towards controlling more powerful future models.

OpenAI teases an amazing new generative video model called Sora

The firm is sharing Sora with a small group of safety testers but the rest of us will have to wait to learn more.

Google’s Gemini is now in everything. Here’s how you can try it out.

Gmail, Docs, and more will now come with Gemini baked in. But Europeans will have to wait before they can download the app.

This baby with a head camera helped teach an AI how kids learn language

A neural network trained on the experiences of a single young child managed to learn one of the core components of language: how to match words to the objects they represent.

Stay connected

Illustration by Rose Wong

Get the latest updates from
MIT Technology Review

Discover special offers, top stories, upcoming events, and more.

Thank you for submitting your email!

Explore more newsletters

It looks like something went wrong.

We’re having trouble saving your preferences. Try refreshing this page and updating them one more time. If you continue to get this message, reach out to us at customer-service@technologyreview.com with a list of newsletters you’d like to receive.