Connect with us

Hi, what are you looking for?


Endpoint Security

Google Unveils KataOS ‘Verifiably-Secure’ Operating System for Embedded Devices

Google last week unveiled a new project focused on building a secure embedded platform for machine learning (ML) applications.

The project’s goal is designing intelligent ambient ML systems that are secure and trustworthy.

Google last week unveiled a new project focused on building a secure embedded platform for machine learning (ML) applications.

The project’s goal is designing intelligent ambient ML systems that are secure and trustworthy.

The project is named Sparrow and it revolves around a new operating system named KataOS, for which several components have already been open sourced by Google.

“KataOS provides a verifiably-secure platform that protects the user’s privacy because it is logically impossible for applications to breach the kernel’s hardware security protections and the system components are verifiably secure,” Google explained.

The tech giant pointed out that KataOS is mostly developed in Rust, which makes it more secure because it eliminates buffer overflows and other classes of bugs.

Sparrow is the reference implementation for KataOS. It combines the new operating system, which provides a logically-secure kernel, with a secured hardware platform that provides a logically-secure root of trust leveraging the OpenTitan project on a RISC-V architecture.

“The KataOS components are based on an augmented version of seL4’s CAmkES framework. Critical system services are CAmkES components that are statically configured. Applications are developed using an AmbiML-focused SDK and dynamically loaded by the system services,” KataOS developers explained.

Advertisement. Scroll to continue reading.

Google says its goal is to open source the entire Sparrow project, including all hardware and software designs. For now it has open sourced some components and invites others to contribute.

Source code and technical details for Sparrow and KataOS are available on GitHub.

Related: Academics Devise Open Source Tool For Hunting Node.js Security Flaws

Related: Apache Foundation Calls Out Open-Source Leechers

Related: Microsoft Releases Open Source Toolkit for Generating SBOMs

Related: Bishop Fox Releases Open Source Cloud Hacking Tool ‘CloudFox’

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.


Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.


Expert Insights

Related Content

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

IoT Security

A vulnerability affecting Dahua cameras and video recorders can be exploited by threat actors to modify a device’s system time.

IoT Security

Lexmark warns of a remote code execution (RCE) vulnerability impacting over 120 printer models, for which PoC code has been published.

Endpoint Security

Today, on January 10, 2023, Windows 7 Extended Security Updates (ESU) and Windows 8.1 have reached their end of support dates.

CISO Strategy

Varied viewpoints as related security concepts take on similar traits create substantial confusion among security teams trying to evaluate and purchase security technologies.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

IoT Security

Today’s growing attack surface is dominated by non-traditional endpoints.

IoT Security

An innocent-looking portable speaker can hide a hacking device that launches CAN injection attacks, which have been used to steal cars.