{"id":22032,"date":"2023-11-08T21:17:59","date_gmt":"2023-11-08T17:17:59","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/cyber-immunity-technology-myths\/22032\/"},"modified":"2023-11-08T21:18:14","modified_gmt":"2023-11-08T17:18:14","slug":"cyber-immunity-technology-myths","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/cyber-immunity-technology-myths\/22032\/","title":{"rendered":"Myths and reality regarding Cyber Immune technologies"},"content":{"rendered":"<p>Ever since we started working on our own operating system, we\u2019ve encountered numerous myths that significantly hinder the adoption of new technologies. Fortunately, it\u2019s not so difficult to provide compelling evidence that these myths are just that: myths. In this post, we address some of the most common misconceptions.\n<\/p>\n<h2>Myth 1: current operating systems can already handle all the latest challenges<\/h2>\n<p>\nWe\u2019ve been hearing people say \u201cwe don\u2019t need another OS\u201d for more than 20 years. However, for all this time, mainstream operating systems have continued to suffer from the same three problems:\n<\/p>\n<ul>\n<li>Cyberthreats: in 2022, Kaspersky\u2019s security systems detected over <a href=\"https:\/\/www.kaspersky.com\/about\/press-releases\/2022_cybercriminals-attack-users-with-400000-new-malicious-files-daily---that-is-5-more-than-in-2021\" target=\"_blank\" rel=\"nofollow noopener\">400,000 new malicious files<\/a> Windows remains the primary target (accounting for 85% of threats), but the number of threats for Linux and Android is steadily increasing (with a 20% and 10% rise, respectively, last year).<\/li>\n<li>Instability: the infamous Windows blue screen of death still haunts our workdays. If anyone thinks things are different with Linux, they\u2019re mistaken \u2014 it also has a screen of death, only it\u2019s black (and it\u2019s known as kernel panic).<\/li>\n<li>Mutual incompatibility: every year, we\u2019re surrounded by more and more smart devices. <a href=\"https:\/\/iotbusinessnews.com\/2022\/05\/19\/70343-state-of-iot-2022-number-of-connected-iot-devices-growing-18-to-14-4-billion-globally\/\" target=\"_blank\" rel=\"nofollow noopener\">According to analysts<\/a>, by 2025, the number of connected devices worldwide will reach 27 billion. Sometimes, devices produced by one and the same company may run on different operating systems. Consequently, software developers often have to put tremendous effort into adapting the same applications for different OS environments.<\/li>\n<\/ul>\n<p>\nHere at Kaspersky we found the solution to these problems by creating KasperskyOS. It\u2019s based on the microkernel concept, the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Multiple_Independent_Levels_of_Security\" target=\"_blank\" rel=\"nofollow noopener\">MILS architectural approach<\/a>, and <a href=\"https:\/\/en.wikipedia.org\/wiki\/FLASK\" target=\"_blank\" rel=\"nofollow noopener\">FLASK<\/a> architecture.<\/p>\n<div id=\"attachment_49495\" style=\"width: 725px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-49495\" class=\"size-full wp-image-49495\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2023\/11\/08211736\/cyberimmunity-technology-myths-infographics.jpg\" alt=\"Average daily number of malicious files detected by Kaspersky security solutions from 2019 to 2022\" width=\"715\" height=\"428\"><p id=\"caption-attachment-49495\" class=\"wp-caption-text\">Average daily number of malicious files detected by Kaspersky security solutions from 2019 to 2022<\/p><\/div>\n<h2>Myth 2: the cybersecurity advantages of microkernels haven\u2019t been proven<\/h2>\n<p>\nIt\u2019s not easy to compare which architecture is better \u2014 microkernel or monolithic kernel. However, there have been many <a href=\"https:\/\/trustworthy.systems\/publications\/full_text\/Biggs_LH_18.pdf\" target=\"_blank\" rel=\"nofollow noopener\">serious studies<\/a> dedicated to this. From these, it\u2019s become evident that:\n<\/p>\n<ul>\n<li>Approximately 95% of critical vulnerabilities in Linux and exploits targeting this system wouldn\u2019t be critical in microkernel operating systems.<\/li>\n<li>Approximately 55% of these critical vulnerabilities could have been mitigated through microkernel verification.<\/li>\n<li>Approximately 30% could simply have been prevented entirely by implementing a microkernel architecture.<\/li>\n<\/ul>\n<div id=\"attachment_49572\" style=\"width: 2650px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2023\/11\/08211749\/cyberimmunity-technology-myths-game-scaled-1-scaled-scaled.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-49572\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2023\/11\/08211749\/cyberimmunity-technology-myths-game-scaled-1-scaled-scaled.jpg\" alt=\"3D shooter running on KasperskyOS.\" width=\"2640\" height=\"1528\" class=\"size-full wp-image-49572\"><\/a><p id=\"caption-attachment-49572\" class=\"wp-caption-text\">3D shooter running on KasperskyOS.<\/p><\/div>\n<h2>Myth 3: microkernel OS is slow<\/h2>\n<p>\nThe performance of an operating system during processes requiring connections to remote desktops is an important concern. Therefore, we paid particular attention to it. And thanks to multicore and codec support, we managed to achieve a level of performance comparable to Linux.<\/p>\n<p>Games are some of the most performance-demanding applications, so as part of our testing we set ourselves the task of running a recently released game that uses GPU heavily on KasperskyOS. This doesn\u2019t mean we\u2019re going to start developing games or consoles. But this experiment did let us clearly demonstrate to our partners which will develop devices on KasperskyOS the system\u2019s real capabilities of performing tasks related to design and 3D modeling.\n<\/p>\n<h2>Myth 4: Linux containers can perform the same tasks that KasperskyOS can using MILS.<\/h2>\n<p>\nIf we look closely at the architecture of our Cyber Immune gateway (one of the first KasperskyOS-based devices to hit the market), we find there around 200 security domains. If we tried to build the same thing on Docker containers in Linux, it would require more than 5GB of RAM. Such a gateway implemented in the form of 200 containers on low-spec hardware with a single-core processor would work extremely slowly. The fundamental difference lies in the approaches: in Linux containers, we essentially take a complete system and trim off what we don\u2019t need, whereas in KasperskyOS, we build it from the ground up with only the necessary components. This significantly optimizes resource consumption.<\/p>\n<div id=\"attachment_49496\" style=\"width: 1489px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2023\/11\/08211808\/cyberimmunity-technology-myths-architecture.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-49496\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2023\/11\/08211808\/cyberimmunity-technology-myths-architecture.jpg\" alt=\"Architecture of the Cyber Immune gateway\" width=\"1479\" height=\"876\" class=\"size-full wp-image-49496\"><\/a><p id=\"caption-attachment-49496\" class=\"wp-caption-text\">Architecture of the Cyber Immune gateway<\/p><\/div>\n<h2>Myth 5: you can\u2019t build dynamic systems with FLASK<\/h2>\n<p>\nThe FLASK concept provides control over security domains using security policies. There is a common belief that this approach makes it impossible to expand OS functionality through applications. However, the evolution of specific products based on KasperskyOS clearly demonstrates the opposite:\n<\/p>\n<ul>\n<li>In 2021, we proved with our IoT gateway the possibility of creating KasperskyOS-based Cyber Immune solutions with fixed functionality.<\/li>\n<li>In 2022, using a thin client as an example, we demonstrated the ability to create Cyber Immune solutions with support for a graphical user interface. Moreover, the partner with which we implemented this project added their own applications to KasperskyOS\u2019s thin client functionality without any hitches.<\/li>\n<li>We\u2019re currently in the third evolutionary stage \u2014 where external developers can create certain types of applications for KasperskyOS. To facilitate this, we\u2019re developing our own application distribution system. The first Cyber Immune platform capable of accepting such applications will be the gateway \u2014 since it must be able to connect to a wide range of different devices.<\/li>\n<\/ul>\n<p>\nHowever, we\u2019re not stopping there; we\u2019re now working to transition to the next stage, where on the basis of KasperskyOS it will be possible to create full-fledged Cyber Immune platforms and systems with a large number of applications. Mobile devices are an example of such systems.\n<\/p>\n<h2>Myth 6: development is narrowly specialized<\/h2>\n<p>\nIt might seem that development of a new operating system requires developers to completely retrain. But that\u2019s not the case. KasperskyOS is already bringing together developers from entirely different paradigms who use the tools they\u2019re familiar with.<\/p>\n<p>Web applications are being developed for gateways and thin clients utilize the Qt framework, popular in the Linux community. For controllers, there\u2019s nothing preventing the creation of console applications familiar to almost every programmer from their student days.<\/p>\n<p>Furthermore, together with colleagues working on developing an automotive gateway, we offer the option to use standard frameworks from the automotive industry, such as AUTOSAR Adaptive. We\u2019re actively working on providing Flutter technology capabilities in our OS, which will ensure compatibility with Android applications.\n<\/p>\n<h2>Myth 7: the difficulty of porting to different hardware platforms<\/h2>\n<p>\nSome developers fear that developing new operating systems is pointless because drivers are only written for mainstream OS (Linux, Android, Windows). Therefore, any new OS will only work with a limited range of hardware. Understanding this, we launched a research project with the goal of creating technology that enables Linux drivers to run on KasperskyOS with minimal modifications \u2014 Linux Compat.<\/p>\n<p>The idea is simple: in KasperskyOS, you can run a piece of code in the secure domain like in a container. We add a thin software layer to this container so the Linux driver thinks it\u2019s operating in its familiar Linux environment. Thanks to this technology, we\u2019ve ported around 300,000 lines of Linux code to KasperskyOS \u2014 changing less than 5%. 300,000 lines of code is 8\u201310 years of work for an experienced developer (when it comes to driver development). Now for some concrete numbers. For example, accelerometer and gyroscope drivers in Linux contain about 7000 lines of code. To run this code using our technology on KasperskyOS, only 20 lines needed to be modified. And the NFC driver, used to support equipment with which mobile devices interact with payment terminals, contains about 1200 lines of code; with our technology, this driver ran without any changes at all.<\/p>\n<p>In my opinion, we\u2019ve developed a technology that will allow us to upscale in the future. And right now we\u2019re choosing the product on which we can fully test this technology.<\/p>\n<p>Everybody needs to choose for themselves whether they want to be mired in myth or in the new Cyber Immune reality. You can learn more on our <a href=\"https:\/\/os.kaspersky.com\/?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______&amp;utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=ae_wpplaceholder_nv0092&amp;utm_content=link&amp;utm_term=ae_kdaily_organic_svfgv92uamkzgs1\" target=\"_blank\" rel=\"noopener nofollow\">KasperskyOS website<\/a> and in <a href=\"https:\/\/os.kaspersky.com\/blog\/\" target=\"_blank\" rel=\"noopener nofollow\">blog on Cyber Immunity<\/a>. <\/p>\n<p>Let\u2019s debunk myths together: reality is way more interesting!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We explore some common misconceptions about the development and application of Cyber Immune products based on KasperskyOS. <\/p>\n","protected":false},"author":2751,"featured_media":22035,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1916],"tags":[2652,2178,1487],"class_list":{"0":"post-22032","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"tag-cyber-immunity","10":"tag-cyberimmunity","11":"tag-kasperskyos"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/cyber-immunity-technology-myths\/22032\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/cyber-immunity-technology-myths\/26606\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/cyber-immunity-technology-myths\/29337\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/cyber-immunity-technology-myths\/26889\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/cyber-immunity-technology-myths\/49494\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/cyber-immunity-technology-myths\/32884\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/cyber-immunity-technology-myths\/32532\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/cyberimmunity\/","name":"cyberimmunity"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/22032","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2751"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=22032"}],"version-history":[{"count":1,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/22032\/revisions"}],"predecessor-version":[{"id":22034,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/22032\/revisions\/22034"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/22035"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=22032"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=22032"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=22032"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}