• Title/Summary/Keyword: 부트

Search Result 176, Processing Time 0.028 seconds

LWE와 완전동형암호에 대한 분석 및 동향

  • Yoo, Joon Soo;Yoon, Jiwon
    • Review of KIISC
    • /
    • v.30 no.5
    • /
    • pp.111-119
    • /
    • 2020
  • 동형암호(homomorphic encryption)는 암호화된 데이터 사이에서 임의의 연산을 가능하게 하는 유망한 암호학적 스킴(scheme)이다. 이를 활용하면 암호화된 데이터를 복호화하지 않고, 암호화된 상태에서 임의의 연산을 수행 할 수 있을 뿐만아니라, 격자를 기반(lattice-based)으로 하여 양자 알고리즘에 내성(resistant)이 있어 안전하다. 하지만, 동형암호를 이해하기 위해서는 전문적인 암호 또는 계산적인 이론의 지식과 이해가 필요하다. 따라서 본 논문에서는 완전동형암호(fully homomorphic encryption)의 기저에 있는 LWE(learning with error) 문제에서부터 완전동형암호의 핵심인 NAND 게이트와 부트스트래핑(bootstrapping)까지의 과정을 어렵지 않게 설명하여 초보자들의 이해를 돕고자 한다.

The design and implementation of HDD embedded system for PVR (PVR용 HDD를 내장한 임베디드 시스템 설계 및 구현)

  • 장용석;박현대;최효정;김대진
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2002.11a
    • /
    • pp.283-286
    • /
    • 2002
  • 디지털 방송 시대를 맞아 별도의 테이프 없이 방송프로그램을 24시간 이상 녹화할 수 있는 개인용 비디오 녹화기에 대한 관심이 높아지고 있다. 본 논문에서는 인텔사의 스트롱암 프로세서(SA-1110)를 이용하여 임베디드 시스템을 구현하고 하드디스크드라이브를 연결하고 운영체제로 리눅스를 사용하여 PVR(Personal Video Recorder)용 하드디스크드라이브를 내장한 임베디드 시스템을 구현하였다. 본 논문에서는 플래시 메모리에 부트로더, 리눅스커널과 램디스크를 JTAG을 통해서 저장하고 스트롱암프로세서에서 리눅스 운영체제를 통하여 외부 인터페이스를 제어하게 된다. 치부 인터페이스로는 이더넷과 시리얼 통신을 제공한다.

  • PDF

Kernel Integrity Check and Restoration through Kernel Image Comparison (커널이미지 비교에 의한 커널 무결성 검사 및 복구)

  • 김일용;김기창
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10c
    • /
    • pp.562-564
    • /
    • 2002
  • 최근 커널의 특정부분을 사용자 임의로 수정하여 시스템을 공격하는 여러 가지 기법들, 즉 커널 백도어가 늘어나고 있다. 이 커널 백도어의 문제점은 커널 자체를 수정하기 때문에 탐지 및 복구가 힘들다는 것이다. 이에 대응하여 커널 백도어를 탐지하는 대부분의 방법이 특정 주소를 검사하여 이루어지는데 이는 확실한 탐지에는 한계가 있다. 설사 탐지는 가능하다 하더라도 복구는 거의 불가능한 것이 현실이다. 이에 본 논문에서는 커널이 기동될 때 사용되는 순수한 부트 이미지와 커널에서 실행중인 이미지를 비교하여 커널의 무결성을 검사, 복구하는 시스템을 제안한다.

  • PDF

Secure Boot + Measured Boot: Guaranteeing the Integrity of the Linux Booting Process (보안부팅+측정부팅: 리눅스 부팅 과정의 무결성 보장)

  • Lee, Yunjae;Yoo, Seehwan
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.8
    • /
    • pp.504-509
    • /
    • 2017
  • Preserving the integrity of the booting process is important. Recent rootkit attacks and subverting OS attacks prove that any post-OS security mechanism can be easily circumvented if the booting process is not properly controlled. Using an actual case as an example, the hacker of the Se-jong government office simply bypassed the user's password authentication by compromising the normal booting process. This paper analyzes existing pre-OS protection using secure boot and measured boot, and proposes another bootloader that overcomes the limitations. The proposed bootloader not only guarantees the integrity of all the pre-OS binaries, bootloaders, and kernel, it also makes explicit records of integrity in the booting process to the external TPM device, so that we can track modifications of BIOS configurations or unintended booting process modifications.

A Fast Booting Technique using Improved Snapshot Boot in Embedded Linux (개선된 스냅샷 부트를 이용한 임베디드 리눅스의 빠른 부팅 기법)

  • Park, Se-Jin;Song, Jae-Hwan;Park, Chan-Ik
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.6
    • /
    • pp.594-598
    • /
    • 2008
  • In this paper we propose a fast booting technique based on Improved snapshot boot in embedded Linux, widely adopted in personal devices such as PDA and mobile phones. The existing Snapshot boot technique tries to create a snapshot image at the time of suspend, and later load the entire snapshot image into the system memory at the predefined location with the help of a bootloader at the time of resume. Since a bootloader has to copy the entire snapshot image into the predefined memory to resume the previous suspended computing state, a little bit long time is required to resume. Improved snapshot boot does not create a snapshot image consisting of whole memory pages at the time of suspend, thus resulting in smaller snapshot image than the existing snapshot boot. The remaining pages are in the swap area. The resulting smaller sized snapshot image enables much faster booting latency. Through the experiment, we can see the booting latency is reduced almost 30% with suspend image of 2982 pages. This result depends on the amount of swap-out pages.

Finite element analysis for 3-D self-contact problems of C.v.joint rubber boots (3차원 자체접촉을 위한 유한요소해석에 의한 등속조인트 고무부트의 변형해석)

  • Lee, H.W.;Kim, S.H.;Lee, C.H.;Huh, H.;Lee, J.H.;Oh, S.T.
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.21 no.12
    • /
    • pp.2121-2133
    • /
    • 1997
  • A finite element code is developed for 3-D self-contact problems, using continuum elements with a SRI(Selective Reduced Integration) scheme to prevent locking phenomenon by the incompressibility of rubber. Contact treatment is carried out in two ways : using the displacement constraints in case of rigid contact ; and imposing the same contact forces on two contact boundaries in case of self-contact. The finite element code developed is applied to the deformation analysis of C.V.joint boots which maintain lubrication conditions and protect the C.V.joint assembly from impact and dust. The boot accompanies large rotation depending on the rotation of the wheel axis and leading to the self-contact phenomena of the boot bellows. Since this contact phenomenon causes wear of the product and has great influence on the endurance life of the product, it is indispensable to carry out stress analysis of the rubber boots. In case of self-contact, various methods for determining contact forces have been suggested with an appropriate contact formulation. Especially, the types of penetration in self-contact are modularized to accelerate conputation with a contact algorithm.

The Design and Implementation of OSF/1 AD3 Based-Microkernel Initialization for SPAX (SPAX를 위한 OSF/1 AD3 기반의 마이크로 커널 초기화 설계 및 구현)

  • Kim, Jeong-Nyeo;Cho, Il-Yeon;Lee, Jae-Kyung;Kim, Hae-Jin
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.5
    • /
    • pp.1333-1344
    • /
    • 1998
  • In comparison to traditional monolithic kernel, the microkernel based operating system has slower speed. But Microkernel based OS suites for multi-computer system, because It has benefits in the modularity and portability point of view. Each unit and memory of a processor must be initialized by using the boot information so that the multi-computer system OS can actively run the function of the system. This paper describes the microkernel initialization of OSF/1 AD3 MISIX that is based on OSF/1 AD3 for SPAX. It will introduce the initialization of microkernel for the SPAX which is High-speed Parallel Processing system in terms of Boot, Initialization related hardware and memory address space construction. This paper will also state the test result based on test environments. Microkernel tested in single node system that has 4 processors.

  • PDF

Defending Against Some Active Attacks in P2P Overlay Networks (P2P 오버레이 네트워크에서의 능동적 공격에 대한 방어)

  • Park Jun-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.4C
    • /
    • pp.451-457
    • /
    • 2006
  • A peer-to-peer(P2P) network is inherently vulnerable to malicious attacks from participating peers because of its open, flat, and autonomous nature. This paper addresses the problem of effectively defending from active attacks of malicious peers at bootstrapping phase and at online phase, respectively. We propose a secure membership handling protocol to protect the assignment of ID related things to a newly joining peer with the aid of a trusted entity in the network. The trusted entities are only consulted when new peers are joining and are otherwise uninvolved in the actions of the P2P networks. For the attacks in online phase, we present a novel message structure applied to each message transmitted on the P2P overlay. It facilitates the detection of message alteration, replay attack and a message with wrong information. Taken together, the proposed techniques deter malicious peers from cheating and encourage good peers to obey the protocol of the network. The techniques assume a basic P2P overlay network model, which is generic enough to encompass a large class of well-known P2P networks, either unstructured or not.

Design and Implementation of High Performance Virtual Desktop System Managing Virtual Desktop Image in Main Memory (메인 메모리상에 가상 데스크탑 이미지를 운용하는 고속 가상 데스크탑 시스템 설계 및 구현)

  • Oh, Soo-Cheol;Kim, SeungWoon
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.8
    • /
    • pp.363-368
    • /
    • 2016
  • A storage-based VDI (Virtual Desktop Infrastructure) system has the disadvantage of degraded performance when IOs for the VDI system are concentrated on the storage. The performance of the VDI system decreases rapidly especially, in case of the boot storm wherein all virtual desktops boot simultaneously. In this paper, we propose a main memory-based virtual desktop system managing virtual desktop images on main memory to solve the performance degradation problem including the boot storm. Performance of the main memory-based VDI system is improved by storing the virtual desktop image on the main memory. Also, the virtual desktop images with large size can be stored in the main memory using deduplication technology. Implementation of the proposed VDI system indicated that it has 4 times performance benefit than the storage-based VDI system in case of the boot storm.

The prediction of appearance of jellyfish through Deep Neural Network (심층신경망을 통한 해파리 출현 예측)

  • HWANG, CHEOLHUN;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.20 no.5
    • /
    • pp.1-8
    • /
    • 2019
  • This paper carried out a study to reduce damage from jellyfish whose population has increased due to global warming. The emergence of jellyfish on the beach could result in casualties from jellyfish stings and economic losses from closures. This paper confirmed from the preceding studies that the pattern of jellyfish's appearance is predictable through machine learning. This paper is an extension of The prediction model of emergence of Busan coastal jellyfish using SVM. In this paper, we used deep neural network to expand from the existing methods of predicting the existence of jellyfish to the classification by index. Due to the limitations of the small amount of data collected, the 84.57% prediction accuracy limit was sought to be resolved through data expansion using bootstraping. The expanded data showed about 7% higher performance than the original data, and about 6% better performance compared to the transfer learning. Finally, we used the test data to confirm the prediction performance of jellyfish appearance. As a result, although it has been confirmed that jellyfish emergence binary classification can be predicted with high accuracy, predictions through indexation have not produced meaningful results.