VEKOS(Verified Experimental Kernel OS) is a Rust-based experimental kernel that focuses on runtime verification and security. Every filesystem operation and memory allocation generates cryptographic proofs that can be verified in real-time, ensuring system integrity. Think of it like a blockchain for OS operations rather than just storage verification.
Key features:
- Merkle tree-backed filesystem with operation verification
- Memory manager with CoW and proof generation
- Buddy allocator with zone-based memory management
- Shell with VT100 support
- Verified boot sequence with stage attestation
The kernel is still in alpha, but it demonstrates a novel approach to OS security by making verification a first-class citizen. All critical operations (memory allocations, filesystem writes, process creation) generate proofs that are stored in an append-only chain, similar to a blockchain but for system operations.
GitHub: https://github.com/JGiraldo29/vekos
I would be excited to get feedback on this project, especially on the verification approach and potential use cases. If you have any question the innerworkings of the development, just ask and I will gladly answer all questions. The code is under the Apache 2.0 license and welcomes contributors.
Announcement: VEKOS, an OS with Built-In Cryptographic Proofs
-
- Posts: 1
- Joined: Wed Dec 04, 2024 10:00 am
-
- Member
- Posts: 5568
- Joined: Mon Mar 25, 2013 7:01 pm
Re: Announcement: VEKOS, an OS with Built-In Cryptographic Proofs
What does the verification process look like from a user/administrator perspective?
Which kinds of integrity violations are detected? Which ones aren't?
Do you use the TPM for anything?
Which kinds of integrity violations are detected? Which ones aren't?
Do you use the TPM for anything?