• Title/Summary/Keyword: 신뢰성 부팅

Search Result 9, Processing Time 0.023 seconds

Classification of Trusted Boot Technology Components based on Hardware Dependency (하드웨어 종속/독립성에 따른 신뢰성 부팅 기술 구성 요소 분류)

  • Park, Keon-Ho;Kim, Sieun;Lee, Yangjae;Lee, SeongKee;Kang, Tae In;Kim, Hoon Kyu;Park, Ki-woong
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.14 no.6
    • /
    • pp.44-56
    • /
    • 2018
  • Researches on military weapons are actively studied to improve national defense power of each country. The military weapon system is being used not only as a weapon but also as a reconnaissance and surveillance device for places where it is difficult for people to access. If such a weapon system becomes an object of attack, military data that is important to national security can be leaked. Furthermore, if a device is taken, it can be used as a terrorist tool to threaten its own country. So, security of military devices is necessarily required. In order to enhance the security of a weapon system such as drone, it is necessary to form a chain of trust(CoT) that gives trustworthiness to the overall process of the system from the power on until application is executed. In this paper, by analyzing the trusted computing-based boot technology, we derive trusted boot technology components and classify them based on hardware dependence/independence. We expect our classification of hardware dependence/independence to be applied to the trusted boot technology of our self-development ultraprecision weapon system to improve the defense capability in our military.

Reliability Design for an IP-Based Settop Box (IP-Based Settop Box의 신뢰성 향상을 위한 구조 설계)

  • 김정우;김천성;정병달;조남석
    • Proceedings of the IEEK Conference
    • /
    • 2003.07c
    • /
    • pp.2653-2656
    • /
    • 2003
  • 본 논문에서는 IP-Based 디지털 TV Settop box에서 발생할 수 있는 신뢰성의 문제점에 대해서 설명하고, 이를 향상, 보완할 수 있는 방법을 제안한다. IP-Based DTV Settop box 는 사용자에게 인터넷 검색이나 주문형 비디오와 같은 고부가가치의 서비스를 제공하기 위하여 범용 운영체제를 주로 사용한다. 하지만, 범용 운영체제의 사용에 따른 시스템의 불안정성과 운영체제 자체의 오류가 발생하였을 때는 Settop box의 기본기능 조차 사용하지 못하게 될 수도 있다. 본 논문에서는 이러한 문제를 해결하기 위하여 중앙 제어부를 모니터링하는 별도의 제어부를 따로 두어 중앙 제어부가 오 동작 하였는지 검사하도록 한다. 만약, 중앙 제어부가 비정상적인 상태이면 별도의 제어부가 Settop box의 기본 기능을 계속할 수 있도록 유도하고, 시스템이 재 부팅되어 정상동작을 하면 제어 권을 다시 중앙 제어부로 넘겨준다. 또한, 중앙 제어부의 시스템이 부팅하는 동안 제안된 구조를 이용해 Settop box의 기본 기능인 디지털 TV시청을 가능하도록 하는 방안에 대해서도 논한다.

  • PDF

Fast Booting of Linux Kernel using Dynamic IDE Device Probing Scheme (동적 IDE 장치 검사 기법을 이용한 리눅스 커널의 빠른 부팅)

  • Kim, Young-Ju
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.1
    • /
    • pp.139-146
    • /
    • 2007
  • Most of embedded systems have been developed practically based on the PC platform equipped with Intel x86 CPU since it is able to reduce the total time for product development and improve the reliability of product by making use of a variety of solutions developed for a long time in the PC environment. Also, embedded systems based on PC-platform mainly use a high-capacity hard disk as data storage device for applications intending to store multimedia data. Recently, while the capacity of hard disk is increasing rapidly, the start-up ready time of hard disk is growing longer more than 30 seconds. The lengthened start-up ready time may delay the booting time of embedded system seriously, weighting users down with inconvenience. This paper proposes the refined system architecture and the dynamic IDE device probing method for fast booting of linux kernel in the embedded system based on PC platform with high-capacity hard disks, and the performance of proposed methods is evaluated and presented.

Secure Boot Security Requirements for Cryptographic Modules against Supply Chain Threats (공급망 위협에 대응하기 위한 암호모듈의 안전한 부팅 보안 요구사항 제안)

  • Jong Wook Park;Sanghan Lee;Bonseok Koo;Seon Yeob Baek;Sang Yun Han
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.989-1000
    • /
    • 2023
  • In order to respond to supply chain threats, active research and development efforts are underway for software tamper prevention technologies such as Secure Boot and management systems like Software Bill of Materials(SBOM). Particularly, the Trusted Computing Group (TCG) is introducing standards for Trusted Platform Module(TPM) to provide a secure and trustworthy computing boot environment. This paper emphasizes the need for introducing secure booting technology for cryptographic modules to ensure that they remain safe and provide reliable functionality even in the face of supply chain threats. Furthermore, it analyzes vulnerabilities in cryptographic modules verified by the ISO/IEC 19790 standard and proposes security requirements for secure booting of cryptographic modules to address these vulnerabilities.

Enhancing Dependability of Systems by Exploiting Storage Class Memory (스토리지 클래스 메모리를 활용한 시스템의 신뢰성 향상)

  • Kim, Hyo-Jeen;Noh, Sam-H.
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.37 no.1
    • /
    • pp.19-26
    • /
    • 2010
  • In this paper, we adopt Storage Class Memory, which is next-generation non-volatile RAM technology, as part of main memory parallel to DRAM, and exploit the SCM+DRAM main memory system from the dependability perspective. Our system provides instant system on/off without bootstrapping, dynamic selection of process persistence or non-persistence, and fast recovery from power and/or software failure. The advantages of our system are that it does not cause the problems of checkpointing, i.e., heavy overhead and recovery delay. Furthermore, as the system enables full application transparency, our system is easily applicable to real-world environments. As proof of the concept, we implemented a system based on a commodity Linux kernel 2.6.21 operating system. We verify that the persistence enabled processes continue to execute instantly at system off-on without any state and/or data loss. Therefore, we conclude that our system can improve availability and reliability.

Fast Mount Mechanisms for Improving Flash File System Availability (플래시 파일 시스템의 가용성 향상을 위한 빠른 마운트 기법)

  • Jung, Jin-Man;Kim, Bong-Jae;Jang, Joon-Hyouk;Min, Hong;Cho, Yoo-Kun;Hong, Ji-Man;Jeon, Gwang-Il
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06b
    • /
    • pp.44-47
    • /
    • 2011
  • 임베디드 시스템에 저장매체로 사용되는 NAND플래시 메모리의 용량이 급격하게 증가하여 부팅 과정에서 파일 시스템을 마운트 하는데 필요한 시간이 점점 길어지고 있다. 특히 갑작스럽게 전원공급이 중단되거나 오류로 인해 비정상적인 종료가 발생하면 복구시간은 더 길어질 수 있으며, 이러한 문제는 실시간 저장 매체로서 활용될 수 있는 플래시 파일 시스템의 가용성을 낮게 하여 신뢰성을 떨어뜨리는 요인이 된다. 본 논문에서는 플래시 파일 시스템의 가용성을 높이기 위한 빠른 마운트 기법을 제안한다. 제안 기법은 스마트 체크포인팅 알고리즘을 이용하여 체크포인트의 가용성을 높이는 방법이다. 제안된 기법을 NAND 플래시 전용 파일 시스템인 YAFFS2에 구현하였고, 성능 분석 결과 기존의 기법에 비해 쓰기 빈도가 동적인 환경에서 마운트 시간을 최대 30%정도 줄이는 효과가 있었다.

Research on Mac OS X Physical Memory Analysis (Mac OS X 물리 메모리 분석에 관한 연구)

  • Lee, Kyeong-Sik;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.89-100
    • /
    • 2011
  • Physical memory analysis has been an issue on a field of live forensic analysis in digital forensics until now. It is very useful to make the result of analysis more reliable, because record of user behavior and data can be founded on physical memory although process is hided. But most memory analysis focuses on windows based system. Because the diversity of target system to be analyzed rises up, it is very important to analyze physical memory based on other OS, not Windows. Mac OS X, has second market share in Operating System, is operated by loading kernel image to physical memory area. In this paper, We propose a methodology for physical memory analysis on Mac OS X using symbol information in kernel image, and acquire a process information, mounted device information, kernel information, kernel extensions(eg. KEXT) and system call entry for detecting system call hooking. In additional to the methodology, we prove that physical memory analysis is very useful though experimental study.

Implementation of Efficient and Reliable Flash File System (효율적이고 신뢰성 있는 플래시 파일시스템의 구현)

  • Jin, Jong-Won;Lee, Tae-Hoon;Lee, Seung-Hwan;Chung, Ki-Dong
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.5
    • /
    • pp.651-660
    • /
    • 2008
  • Flash memory is widely used in embedded systems because of its benefits such as non-volatile, shock resistant, and low power consumption. However, NAND flash memory suffers from out-place-update, limited erase cycles, and page based read/write operations. To solve these problems, YAFFS and RFFS, the flash memory file systems, are proposed. However YAFFS takes long time to mount the file system, because all the files are scattered all around flash memory. Thus YAFFS needs to fully scan the flash memory. To provide fast mounting, RFFS has been proposed. It stores all the block information, the addresses of block information and meta data to use them at mounting time. However additional operations for the meta data management are decreasing the performance of the system. This paper presents a new NAND flash file system called ERFFS (Efficient and Reliable Flash File System) which provides fast mounting and recovery with minimum mata data management. Based on the experimental results, ERFFS reduces the flash mount/recovery time and the file system overhead.

  • PDF

Distributed Hashing-based Fast Discovery Scheme for a Publish/Subscribe System with Densely Distributed Participants (참가자가 밀집된 환경에서의 게재/구독을 위한 분산 해쉬 기반의 고속 서비스 탐색 기법)

  • Ahn, Si-Nae;Kang, Kyungran;Cho, Young-Jong;Kim, Nowon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.12
    • /
    • pp.1134-1149
    • /
    • 2013
  • Pub/sub system enables data users to access any necessary data without knowledge of the data producer and synchronization with the data producer. It is widely used as the middleware technology for the data-centric services. DDS (Data Distribution Service) is a standard middleware supported by the OMG (Object Management Group), one of global standardization organizations. It is considered quite useful as a standard middleware for US military services. However, it is well-known that it takes considerably long time in searching the Participants and Endpoints in the system, especially when the system is booting up. In this paper, we propose a discovery scheme to reduce the latency when the participants and Endpoints are densely distributed in a small area. We propose to modify the standard DDS discovery process in three folds. First, we integrate the Endpoint discovery process with the Participant discovery process. Second, we reduce the number of connections per participant during the discovery process by adopting the concept of successors in Distributed Hashing scheme. Third, instead of UDP, the participants are connected through TCP to exploit the reliable delivery feature of TCP. We evaluated the performance of our scheme by comparing with the standard DDS discovery process. The evaluation results show that our scheme achieves quite lower discovery latency in case that the Participants and the Endpoints are densely distributed in a local network.