• Title/Summary/Keyword: 임베디드 WEB

Search Result 161, Processing Time 0.027 seconds

Emulation-Based Fuzzing Techniques for Identifying Web Interface Vulnerabilities in Embedded Device Firmware (임베디드 디바이스 펌웨어의 웹 인터페이스 취약점 식별을 위한 에뮬레이션 기반 퍼징 기법)

  • Heo, Jung-Min;Kim, Ji-Min;Ji, Cheong-Min;Hong, Man-Pyo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.6
    • /
    • pp.1225-1234
    • /
    • 2019
  • The security of the firmware is more important because embedded devices have become popular. Network devices such as routers can be attacked by attackers through web application vulnerabilities in embedded firmware. Therefore, they must be found and removed quickly. The Firmadyne framework proposes a dynamic analysis method to find vulnerabilities after emulating firmware. However, it only performs vulnerability checks according to the analysis methods defined in the tool, thus limiting the scope of vulnerabilities that can be found. In this paper, fuzzing is performed in emulation-based environment through fuzzing, one of the software security test techniques. We also propose a Fabfuzz tool for efficient emulation based fuzzing. Experiments have shown that in addition to the vulnerabilities identified in existing tools, other types of vulnerabilities have been found.

An Implementation of Web Site Login System Using Fingerprint Identification (지문인증을 이용한 웹 사이트 로그인 시스템의 구현)

  • 최순우;김영길
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.2
    • /
    • pp.207-213
    • /
    • 2002
  • Fingerprint has the characteristics that do not change with time and is unique to an individual. And fingerprint identification is considered the best choice for most biometric applications because of its accuracy, speed, reliability, non-intrusive interfaces and cost-effectiveness. In this paper, we applies fingerprint Identification to web site login to raise the quality of personal identification when we use e-commerce, internet banking, stock dealings, shopping mali, etc. The system implemented in this paper consists of embedded module to carry out fingerprint identification, web server and web site. Existing system carries out fingerprint identification in the web server, but the system Implemented in this paper carries out it in client. Therefore the loads of server are reduced and the confidence of internet service is improved because login is forbidden without fingerprint identification success.

A study on the analysis of virtual reality platform API for virtual reality (VR) development

  • Lee, Byong-Kwon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.8
    • /
    • pp.23-30
    • /
    • 2020
  • As the 4th industrial revolution emerged, the latest technologies such as IoT, AI, Big data, AR/VR/XR are emerging. However, in the field of virtual reality (VR) technology platform services, there is no standardization and systematic support. In addition, various platform technologies related to virtual reality have been presented, making it difficult to select an API that should be selected for development. In this study, we analyzed the method for virtual reality development and the virtual reality (VR) technology that is being serviced by users. In addition, by presenting the advantages and disadvantages of each development platform, we intend to present a reference point for developers to select an efficient platform. In addition, it will help the developer to select an effective equipment and software platform in comparison with the advantages and disadvantages of various HMD devices used in virtual reality. The virtual reality (VR) development environment test used products from Oculus, and the software development environment was tested with two types: WebBased VR and HMD embedded.

Low Overhead System Monitoring Based on SNMP for Embedded Systems (임베디드 시스템들을 위한 SNMP 기반의 저부하 시스템 모니터링)

  • Kim Tae-Su;Kim Dong-Uk;Kim Yong-Seok
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.43 no.3 s.309
    • /
    • pp.1-9
    • /
    • 2006
  • SNMP is a standard protocol for management of networking devices. Nowadays, most computer systems have capability to act as SNMP agents. In this paper, we developed a low overhead version of SNMP library for embedded systems, and implemented a monitoring software based on the library for a large number of target systems. The monitoring system consists of a monitoring server, SNMP agents, and client programs. The monitoring server collects status information from SNMP agents running on the monitoring targets, and sends summary information to client programs. We implemented two versions of clients, Java based standalone program and Web based program.

Design and Implementation of Embedded Ethernet Module for Home Network (홈 네트워크를 위한 Embedded Ethernet Module 설계 및 구현)

  • Kim Pan-kyu;Hoan Tae-Moon;Lee Jong-hyeok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.5
    • /
    • pp.1111-1116
    • /
    • 2005
  • The necessity of the home network have been enlarged gradually according to the distribution of ultra-high speed internet, the expansion of a digital information equipment and the change of a life pattern. In this paper, we proposed the embedded ethernet module that could be operate on eight bit system, but it could control home appliance with full ethernet speed. The embedded ethernet module consists of 8051 MCU and Hardware TCP/IP. In this module, we construct simple web server and port remote control program for I/O device control. We verified through internet that the developed embedded ethernet module could control and check home appliances anywhere and anytime. We expect the developed ethernet module can build up niche market at home network. And it will be helpful to activate home network market.

Design of Remote Data Collection System using Orbcomm Satellite Communication (오브컴 위성 통신을 이용한 원격지 데이터 수집 시스템 설계)

  • Heo, Min;Jung, Sung-Hun;Mo, Soo-Jong;Lim, Jae-Hong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.122-125
    • /
    • 2005
  • Data collection system is now widely used. This system is divided by embedded system and communication module. And data collection system in the remote area is using Satellite communication. So, data collection system is complicated and expensive. This paper proposes stabilization and cheapness of remote data collection system in dusty. The system can be composed simply through third party Satellite Communication programming of terminal including embedded system. Finally, collected data is transmitted to multi-user through web agent.

  • PDF

Implementation of bluetooth LAN Access Point for the wireless Local access (근거리 무선 제어를 위한 Bluetooth LAN Access Point 구현)

  • Lee, Byeong-Woong;Oh, Won-Geun;Yoe, Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.5
    • /
    • pp.676-683
    • /
    • 2002
  • In this paper, LAN Access Point is realized by making out bluetooth protocol stack in Linux Kernel, porting Linux in an embeded system employed bluetooth module. Hardware for a general-purpose embeded system is designed and Linux Kernel is ported after deploying Bluetooth Module. Also, Boot loader for system booting and management is composed, and Kernel is modified to meet with the system. Finally, Ethernet devise driver is made out, and bluetooth protocol Stack and Lan Access Point are realized. The possibility of TCP/IP communication through LAN Access Point to PC employed Bluetooth module, which is considered as client, is evaluated. From the evaluation results, we can see that the performance in Telnet FTP, Web browsing through Bluetooth LAN Access Point is satisfactory.

Design of Embedded System for realtime monitoring and remote-control based on web (웹기반의 실시간 모니터링 및 원격컨트롤을 위한 임베디드 시스템 설계)

  • Lee, Sung-Soo;Lee, Jong-Jin;Lee, Myung-Jin;Song, Jong-Kwan;Yoon, Byung-Woo
    • Proceedings of the Korea Institute of Convergence Signal Processing
    • /
    • 2005.11a
    • /
    • pp.186-189
    • /
    • 2005
  • An embedded monitoring and control system which can be controlled and monitored with web, was implemented in this paper. The principal data which should be controlled are the present temperature and pH of a fish farm. The input signals are from temperature sensors and pH sensors. The input data are digital which are A/D converted every constant time, and the results are stored to the database. The converted data are displayed on a large electric signboard at the fish-farm. This system was designed that supervisors can control the system and watch the real situation of the fish-farm at remote places.

  • PDF

The Development of Remote Monitoring Technology for URC Robot (URC 로봇 원격 모니터링기술 개발)

  • Kim Joo-Man
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.8
    • /
    • pp.8-19
    • /
    • 2006
  • In the ubiquitous environment, the real-time remote control and monitoring technology for intelligent robot creates service as a sharable and independent of time-location for various contents to get from a sensor or camera of the robot. In this paper, We propose the real-time monitor and control mechanism for intelligent robot called URC(Ubiquitous Robotic Companion). URC are intelligent robots designed as to interact with external digital device that can communicate through wire or wireless by integration the network and information technology into traditional robot. It has been carried out by implementing this technology into the target robot called ISSAC4 and proving its practical worth. We designed feasibly to control on remote site by web-browser. It guarantees a continuity of real-time image transferring by Client-Pull method.

  • PDF

Information Hiding Technique in Smart Phone for the Implementation of GIS Web-Map Service (GIS 웹 맵 서비스 구현을 위한 스마트 폰에서의 정보은닉 기법)

  • Kim, Jin-Ho;Seo, Yong-Su;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.5
    • /
    • pp.710-721
    • /
    • 2010
  • Recently, for the advancement of embedded technology about mobile device, a new kind of service, mash-up is appeared. It is service or application combining multimedia content making tool or device and web-GIS(geographic information system) service in the mobile environment. This service can be ease to use for casual user and can apply in various ways. So, It is served in web 2.0 environment actively. But, in the mashup service, because generated multimedia contents linked with web map are new type of multimedia contents which include user's migration routes in the space such as GPS coordinates. Thus, there are no protection ways for intellectual property created by GIS web-map service users and user's privacy. In this paper, we proposed a location and user information hiding scheme for GIS web-map service. This scheme embeds location and user information into a picture that is taken by camera module on the mobile phone. It is not only protecting way for user's privacy but is also tracing way against illegal photographer who is peeping person through hidden camera. And than, we also realized proposed scheme on the mobile smart phone. For minimizing margin of error about location coordinate value against contents manipulating attacks, GPS information is embedded into chrominance signal of contents considering weight of each digit about binary type of GPS coordinate value. And for tracing illegal photographer, user information such as serial number of mobile phone, phone number and photographing date is embedded into frequency spectrum of contents luminance signal. In the experimental results, we confirmed that the error of extracted information against various image processing attacks is within reliable tolerance. And after file format translation attack, we extracted embedded information from the attacked contents without no damage. Using similarity between extracted one and original templete, we also extracted whole information from damaged chrominance signal of contents by various image processing attacks.