How microkernel OSs can help defend smart devices against cyber threats

What’s going on with connected devices security and how microkernel architecture is experiencing a surge of interest – in one article we’ve collected all the recent news that led us to think of microkernel OSs as the “old new secure operating systems”.
Vera Knyazeva
Editor, Cyber Immunity enthusiast

Connected devices are becoming targets in a growing number of attacks. The amount of Internet of Things (IoT) attacks in the world reached over 10.54 million in December 2022, compared with 5.85 million a year earlier, and the highest number of monthly attacks was detected in June 2022, with approximately 13 million attacks. The most sophisticated hackers are able not only to attack smart lightbulbs or smart-locks but also penetrate the local networks using hacked devices. They often exploit the vulnerabilities in IoT system architecture. As far as IoT ecosystems are cyberphysical systems based on multiple interconnected microcontrollers, equipping each little device with sophisticated protection mechanisms is economically unviable, and attackers tend to specifically target the unprotected end devices.

The IoT security problem gets more and more relevant for ecosystems of several connected devices. As a solution to a problem, a number of smart ecosystem vendors invested in the development of microkernel OSs. Even though such operating systems have remained in the background for a long time, they’ve become very common at the microchip and microcontroller firmware level and well-known as more reliable and fault-tolerant. Their secret ingredient is architecture: the kernel contains several times less code than kernel of a traditional system, and performs only strictly necessary functions. This implies several important consequences:

  1. Microkernel OSs distinguish between trusted and untrusted components. Even though we’re dealing with multiple small elements that cannot be trusted, we can engineer the system to still be secure — even with such elements onboard.
  2. Microkernel OSs isolate privileged components and operate them in user mode. The elements of a big system often have privileges to perform certain actions upon each other. In microkernel OSs, the kernel is responsible for isolation of components: each one resides within its own address space.
  3. Microkernel OSs feature extra capabilities and tools for interaction control. In a microkernel OS the kernel controls the key messaging mechanism. In a system where we can’t trust all the elements, the interactions and privileges are limited and monitored.

The only thing all these mechanisms tend to lack is trust verification options — methods of verifiable security in which we base our confidence on the results of reproducible verification. In different microkernel OS there are different ways to make sure an element is trustworthy. Learn more about different examples of microkernel OSs for smart ecosystems and methods to prove trustworthiness in our new article ‘Microkernel OSs against threats to smart devices’. There you can also find brief review of modern threats to smart devices and some predictions of the future of microkernel OSs.

Connected devices are becoming targets in a growing number of attacks. The amount of Internet of Things (IoT) attacks in the world reached over 10.54 million in December 2022, compared with 5.85 million a year earlier, and the highest number of monthly attacks was detected in June 2022, with approximately 13 million attacks. The most sophisticated hackers are able not only to attack smart lightbulbs or smart-locks but also penetrate the local networks using hacked devices. They often exploit the vulnerabilities in IoT system architecture. As far as IoT ecosystems are cyberphysical systems based on multiple interconnected microcontrollers, equipping each little device with sophisticated protection mechanisms is economically unviable, and attackers tend to specifically target the unprotected end devices.

The IoT security problem gets more and more relevant for ecosystems of several connected devices. As a solution to a problem, a number of smart ecosystem vendors invested in the development of microkernel OSs. Even though such operating systems have remained in the background for a long time, they’ve become very common at the microchip and microcontroller firmware level and well-known as more reliable and fault-tolerant. Their secret ingredient is architecture: the kernel contains several times less code than kernel of a traditional system, and performs only strictly necessary functions. This implies several important consequences:

  1. Microkernel OSs distinguish between trusted and untrusted components. Even though we’re dealing with multiple small elements that cannot be trusted, we can engineer the system to still be secure — even with such elements onboard.
  2. Microkernel OSs isolate privileged components and operate them in user mode. The elements of a big system often have privileges to perform certain actions upon each other. In microkernel OSs, the kernel is responsible for isolation of components: each one resides within its own address space.
  3. Microkernel OSs feature extra capabilities and tools for interaction control. In a microkernel OS the kernel controls the key messaging mechanism. In a system where we can’t trust all the elements, the interactions and privileges are limited and monitored.

The only thing all these mechanisms tend to lack is trust verification options — methods of verifiable security in which we base our confidence on the results of reproducible verification. In different microkernel OS there are different ways to make sure an element is trustworthy. Learn more about different examples of microkernel OSs for smart ecosystems and methods to prove trustworthiness in our new article ‘Microkernel OSs against threats to smart devices’. There you can also find brief review of modern threats to smart devices and some predictions of the future of microkernel OSs.