Kernova Github
Kernova Page
Kernova
Kernova is an application I am building for my A-Level project. This means it will take me 45 years to make as I use lots of AI for most of my projects and obviously cannot be using AI for this projects. That being said, my website's page about it may be partially AI generated.
What is Kernova
Kernova an application used to sandbox applications on Windows system without the application detecting it. As far as I am aware, software like this doesn't really exists on windows and the only real way to do this is by manually attaching it memory in which you generally lose pointers and it becomes messy. The way will be done is by emulating an entire windows system kernel. This is similar to what Wine for linux does, however it can be more simple that this as most functions can directly be passed through to the legit kernel beneath. The idea is that every single application that runs through this will have every call logged somewhere which can then be reviewed.
Why doesn't this really really exists
It may already exist, but I cannot find it. The reason I believe it may not already exists, is that windows already has function to bind to application as see what it's doing. The annoying part is, windows tells this application that it's doing that. This means whatever the application was doing, can suddenly just stop doing it. This means for games with anti-cheats, or malicious applications, the application can just shut off. The idea with Kernova is that you can do all of this undetected. Theoretically, this can already be achieved by writing a driver, however malware that runs kernel level, or real time anti-cheats such as easy anti-cheat run kernel level anyway and still can find suspicious behaviour and shut off.
A VM can already do this.
Think of the only way of getting into an application without it knowing, is to get behind it. So for a normal application, a kernel driver can do that. For a kernel driver, the only way around this is to modify hardware. However what if you ran viral hardware on your system. This is what a Virtual Machine (VM) is. A virtual machine can already do everything I am trying to do. By hosting a machine, inside your machine you can get behind the entire system, and view everything that happens. However, just like binding onto the hardware of a system, you loose all system pointers making it really hard to find anything. You also have a huge performance overhead of almost 20% without CPU or GPU passthrough. Kernova, aims to simply run your executable, instead of windows running it itself.
How does it work
I can't be bothered to write anything else at the moment, but you get the idea.
Kernova Github
Kernova Page
Kernova
Kernova is an application I am building for my A-Level project. This means it will take me 45 years to make as I use lots of AI for most of my projects and obviously cannot be using AI for this projects. That being said, my website's page about it may be partially AI generated.
What is Kernova
Kernova an application used to sandbox applications on Windows system without the application detecting it. As far as I am aware, software like this doesn't really exists on windows and the only real way to do this is by manually attaching it memory in which you generally lose pointers and it becomes messy. The way will be done is by emulating an entire windows system kernel. This is similar to what Wine for linux does, however it can be more simple that this as most functions can directly be passed through to the legit kernel beneath. The idea is that every single application that runs through this will have every call logged somewhere which can then be reviewed.
Why doesn't this really really exists
It may already exist, but I cannot find it. The reason I believe it may not already exists, is that windows already has function to bind to application as see what it's doing. The annoying part is, windows tells this application that it's doing that. This means whatever the application was doing, can suddenly just stop doing it. This means for games with anti-cheats, or malicious applications, the application can just shut off. The idea with Kernova is that you can do all of this undetected. Theoretically, this can already be achieved by writing a driver, however malware that runs kernel level, or real time anti-cheats such as easy anti-cheat run kernel level anyway and still can find suspicious behaviour and shut off.
A VM can already do this.
Think of the only way of getting into an application without it knowing, is to get behind it. So for a normal application, a kernel driver can do that. For a kernel driver, the only way around this is to modify hardware. However what if you ran viral hardware on your system. This is what a Virtual Machine (VM) is. A virtual machine can already do everything I am trying to do. By hosting a machine, inside your machine you can get behind the entire system, and view everything that happens. However, just like binding onto the hardware of a system, you loose all system pointers making it really hard to find anything. You also have a huge performance overhead of almost 20% without CPU or GPU passthrough. Kernova, aims to simply run your executable, instead of windows running it itself.
How does it work
I can't be bothered to write anything else at the moment, but you get the idea.