Mayhem: A Supercomputer to Tackle Cybersecurity Vulnerabilities

Cybersecurity and threats management is a major worry of companies. There is not a single complete security arrangement that can detect, exploit and dispatch security threats alone. White-hatters are continuously armoring the industry from different cyber-attacks, but they are also not untouched from human errors and mistakes. So the industry is very desperately looking for an automatic and fault proof protection.


Pentagon autonomous challenge came with a brand new endeavor that stands out on every single aspect of concern related to cybersecurity. Mayhem supercomputer, built by ForAllSecure enterprises is the new face that can handle any kind of security threat. The winner crown of DARPA security challenge justifies its claim.  It establishes itself in the World’s largest summit of hackers by participating in “Flags to Capture” competition and grasp the attention of all with its big and several meter long apparatus. It requires a huge amount of electricity and water cooler to cool itself from the warmth of 300-kilowatt electricity.

DARPA (Defense Advanced Research Projects Agency) has been conducting such attempt to protect the software and application and select the most efficient software program that can run in almost every kind of device of daily use and make them safe and attack proof.

Enhancement of technology and implementation of the Internet of Things (IoT) makes it more crucial and urgent as inter-device communication enhances the widespread of the virus and threats injection from one device to another.

Working of Mayhem mega machine

It primarily works on two concepts that are fuzzing and symbolic execution.

The combined effort of two individual approaches to analyze and dispatch the duty is the core mechanism of fuzzing and symbolic execution. If we have to say it in simple words, Symbolic execution creates an equation for each logic that is implemented in an attacking program and fetches the solution of a bug accordingly.

On the other hand, fuzzing is the process of permutation and combination of information under a program, so that program gets crashed and in this way, it determines the vulnerable nature and weakness of a program. It works quite perfectly in determining the solution and weakness of most frequent program. Fuzzing is inserting the unknown set of data continuously into program’s string till the equation designed by symbolic execution reaches to its solution.

Fuzzing is like hit and trial method with tremendous speed. It guesses about the solution very smartly as well as very speedily. Symbolic execution is similar to solving a mathematical equation and knows that which input can spoil the attacking software system and inserting that very solution into the software to dismiss the attack.

Olivia Jones is a self-professed security expert; she has been making the people aware of the security threats.Her passion is to write about Cyber security, cryptography, malware, social engineering, internet and new media. He writes for Norton security products at


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s