FacebookTwitterLinkedIn

ChromeOS Security Overview

If computers get hacked because of weaknesses in the operating system then why not remove the operating system to make them more secure?

That’s the simple principle behind ChromeOS, the open source operating system sponsored by Google.

There is only one program on ChromeOS: that is the Chrome browser. Everything else, like the ssh plugin, is a browser extension that you can get from the Chrome marketplace here. (You can see which extensions you have in Chrome by typing chrome://extensions/.)

Naked ChromeOS
Of course ChromeOS is an operating system too, since the Chrome browser cannot run by itself. There needs to be some software in place to respond when the power is turned on and to interact with the screen and storage and where someone plugs in a USB device.

But what Google has done in building ChromeOS is to get rid of some of the bad security practices that makes Windows, in particular, vulnerable to hacking. One of those design principles is to not allow one process to read the memory of another and to deny most processes access to devices. Another is to deny processes access to low-level functions, like deleting and writing files.

Cryptographic verification of the Operating System
The most important security feature of ChromeOS is the boot loader is stored in read-only memory (ROM) and the hardware verifies the signature of that, which is stored in a chip.

The boat loader is the mini OS that starts the computer just far enough until the the user can select which OS to run or until it runs the only one it finds.

chromeos Cryptographic verification

To say that it is signed means that ChromeOS has run a hash function over the image to create a hashed value.  When the OS boots it runs the same hashing function and compares that to the hashed value (i.e., the signature) stored in a chip of the device. If they differ then the bootloader has been tampered with. That’s what a hacker might do.

In that event, the OS will restore the boot image to the factory default. This also means someone cannot boot from a USB drive.

ChromeOS also checks the root file system the same way. (This raises the obvious question: if the boot loader is in ROM memory and if the signature is stored in a chip then how can Google push out updates to Chrome?)

Windows has the same feature which is why you have to disable Secure Boot if you want to replace Windows with Linux.

Isolate Processes in a Sandbox
Like Android, ChromeOS runs in a container. That is the way that Java works too. And that’s the way that container software, like Docker, used to install complex systems on servers, works as well.

What that means is commands can run and objects can only be created inside of the memory that is inside the container, which rides atop the operating system. So the hacker cannot gain access to the memory of other running programs since they are operating inside the Sandboxed containers. Accessing memory outside of running programs is the approach used by hackers when they use buffer overflow and similar attacks.

chromeos Isolate Processes in a Sandbox

Chrome calls their container-approach Sandbox. That is an odd name since sandbox is an IT term that means where one deploys untested code that is still under development.

The ChromeOS Sandbox means that most ChromeOS processes are only allowed access to memory and the CPU. They cannot write changes to disk or interact with any devices. That’s the same design principle as SELINUX, which is a fork of Linux created by the NSA.

But at some point the OS needs low-level access to the USB device, screen, storage, etc. So if there are security issues with the container then the hacker can gain access to raw memory. So far there have been no widespread issues with that.

Who needs Windows?
A thinking person might come to the conclusion that if everything they do is on the cloud today then why do they need a $1,500 PC or $2,000 MAC that has processing power to run memory and CPU-intensive programs locally.

If the only program people use are the browser then why buy a computer that was built for the ancient past when people actually ran Outlook and Office on their PC or used something that takes a lot of resources like Photoshop? You can do all of that in the cloud now, using the browser.

Even programmers do not need a high-end PC anymore. There are lots and lots of online editors for everything from Java and JavaScript to data scientists using Python. Examples of those are noodlejs.com for JavaScript and iPython Jupyter, Hydrosphere, and Zeppelin notebooks that support markup (i.e., in-situ documentation) and many programming languages.

But what about the analyst working on large and complex systems like Hadoop or Spark? The best way to approach that—now adopted by most companies as the cloud model—is to install those on a cloud server. Then use the ssh extension in Chrome to login to that or the Windows remote desktop (RDP) extension for Chrome.

The PC market is drying up. Microsoft is selling an increasing number of tablets with keyboards. That has become a bright spot for the company.  

A table with a keyboard is what the $200 ASUS Chromebook is like, except it does not have a touch screen like the Microsoft Surface.  

ASUS is cheap. One reason for that is ASUS does not have to pay Microsoft for Windows. And it’s incredible lightweight. So it’s like one of those very expensive slim Macs that people buy for panache, but without the lofty price tag.

The cheapest model ASUS could benefit from more memory and a better CPU. If you have ever looked at the many processes spawned by Chrome on Linux, and the large amount of memory it uses, you can see that Chrome, given lots of memory and CPU, will use that. So, buy a better Chromebook and ditch Windows and Mac. Put the money you saved in the bank. Or blow it on something else you do not need.

▼ Show Discussion

About the author:

Karolis Liucveikis

Karolis Liucveikis - experienced software engineer, passionate about behavioral analysis of malicious apps.

Author and general operator of PCrisk's "Removal Guides" section. Co-researcher working alongside Tomas to discover the latest threats and global trends in the cyber security world. Karolis has experience of over five years working in this branch. He attended KTU University and graduated with a degree in Software Development in 2017. Extremely passionate about technical aspects and behavior of various malicious applications. Contact Karolis Liucveikis.

PCrisk security portal is brought by a company RCS LT. Joined forces of security researchers help educate computer users about the latest online security threats. More information about the company RCS LT.

Our malware removal guides are free. However, if you want to support us you can send us a donation.

About PCrisk

PCrisk is a cyber security portal, informing Internet users about the latest digital threats. Our content is provided by security experts and professional malware researchers. Read more about us.

Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal