• Title/Summary/Keyword: BOOT

Search Result 197, Processing Time 0.025 seconds

An Implementation of Secure boot Using TPM in Embedded System (TPM을 활용한 임베디드 시스템 환경의 보안 부팅 구현)

  • Kim, Jin-Woo;Lee, Sang-Gil;Ko, Jae-Yong;Lee, Cheol-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.949-960
    • /
    • 2019
  • Due to miniaturization of electronic devices and development of IoT(Internet of Things), embedded system have been used in various field. Meanwhile, there is a potential vulnerability by the insufficient of system's security. In this paper, we implement secure boot using TPM to protect the integrity of embedded system environment. The Suggestion considers the required availability in the embedded system and detects the system's tampering at secure boot process via TPM. In addition, we have reinforced the confidentiality through AES encryption of the kernel at secure boot.

Key Recovery Algorithm for Randomly-Decayed AES Key Bits (랜덤하게 변형된 AES 키 비트열에 대한 키 복구 알고리즘)

  • Baek, Yoo-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.327-334
    • /
    • 2016
  • Contrary to the common belief, DRAM which is used for the main memory of various computing devices retains its content even though it is powered-off. Especially, the data-retaining time can increase if DRAM is cooled down. The Cold Boot Attack, a kind of side-channel attacks, tries to recover the sensitive information such as the cryptographic key from the powered-off DRAM. This paper proposes a new algorithm which recovers the AES key under the symmetric-decay cold-boot-attack model. In particular, the proposed algorithm uses the strategy of reducing the size of the candidate key space by testing the randomness of the extracted AES key bit stream.

A Design and Implementation of Windows CE Boot Loader to support Compact Flash (컴팩트 플래시 지원을 위한 Windows CE 부트로더의 설계 및 구현)

  • Pi Mu-ho;choi Jong-pil;Kong Ki-sok
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.931-933
    • /
    • 2005
  • Windows CE는 Microsoft사의 Windows 운영체제 가운데서 가장 작은 운영체제로서 일반 데스크톱 Windows 커널을 수용할 수 없는 소형/임베디드 장비에서 주로 사용되어진다. 현재 Windows CE에서 사용되고 있는 부트로더로는 E-boot(Ethernet bootloader)가 있으며 RAM 이미지와 플래시 이미지 다운로드 기능을 제공한다. E-boot의 문제점으로는 플래시 메모리상에서 부팅을 수행하기 때문에 NOR 타입의 플래시만을 지원하여, 컴팩트 플래시와 같은 NAND 타입의 플래시 지원하지 않는다. 이는 OS Binary 이미지의 용량이 NOR 플래시를 초과할 경우에 수행이 불가능하다는 문제를 발생시킨다. 따라서 본 논문에서는 기존의 E-boot를 수정하여 NDR 플래시보다 상대적으로 가격이 저렴하고 휴대성이 좋은 컴팩트 플래시 메모리를 이용하여 부팅이 가능한 부트로더를 구현한다. 또한 컴팩트 플래시 지원을 위한 새로운 읽기/쓰기 메카니즘을 소개한다.

  • PDF

SeBo: Secure Boot System for Preventing Compromised Android Linux

  • Kim, Tong Min;Kim, Se Won;Yoo, Chuck
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.10 no.6
    • /
    • pp.335-343
    • /
    • 2015
  • As the usage of mobile devices becomes diverse, a number of attacks on Android also have increased. Among the attacks, Android can be compromised by flashing a new image of compromised Android Linux. In order to solve this problem, we propose SeBo (Secure Boot System) which prevents compromised Android Linux by guaranteeing secure boot environment for mobile devices based on ARM TrustZone architecture. SeBo checks the hash value of the Android Linux image before the Android Linux executes. SeBo detects all the attacks within 5 seconds. Moreover, since SeBo only trusts the Secure Bootloader from Secure World, SeBo can reduce the additional overhead of checking the Normal Bootloader from Normal World.

The Study of the Implementation of the Boot System Using CF(Compact Flash) memory card 1. Implementation of the Boot System Using CF memory card (CF(Compact Flash)메모리 카드를 이용한 부트 시스템 구현에 관한 연구 1. CF메모리 카드를 이용한 부트 시스템 구현)

  • 이광철;김영길
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.1
    • /
    • pp.108-114
    • /
    • 2004
  • In this paper we propose the boot system using CF memory card and study the system implementation method. The system that is proposed in this paper basically consist of high performance microprocessor, small amount of program memory and CF memory card. And added LCD module and touch panel for the user interface. This system use the CF memory card and DRAM instead of the Flash memory, so it can reduce the system cost. And system performance is increased because of the system program running in the DRAM.

A study on gate driver with Boot-strap chain to drive Multi-level PDP driver application (Multi-level을 사용한 PDP 구동회로를 위한 Gate driver 의 Boot-strap chain 에 관한 연구)

  • Nam, Won-Seok;Kim, Jun-Hyoung;Song, Suk-Ho;Roh, Chung-Wook;Hong, Sung-Soo;SaKong, Suk-Chin
    • Proceedings of the KIPE Conference
    • /
    • 2005.07a
    • /
    • pp.99-101
    • /
    • 2005
  • A gate driver with Boot-strap chain is proposed to drive Multi-level PDP sustain switches. The proposed gate driver uses only one boot-strap capacitor and one diode per each MOSFETs switch without floating power supply. By adoption of this gate driver circuits, the size, weight and the cost of the drivel board can be reduced.

  • PDF

A Study of the Boot ROM S/W Design and Verification for the Next Generation LEO Satellite (차세대 저궤도 위성의 Boot ROM 소프트웨어 설계 및 검증에 대한 연구)

  • Choi, Jong-Wook;Lee, Jae-Seung;Yang, Seung-Eun;Shin, Hyun-Kyu;Chae, Dong-Seok;Lee, Jong-In
    • Aerospace Engineering and Technology
    • /
    • v.7 no.1
    • /
    • pp.83-90
    • /
    • 2008
  • The next generation LID satellite has 64KB PROM which contains the boot loader and the monitor software, and two 4MB NVMEMs which are used for flight software storage. The boot loader has two operation modes which are the flight software mode and the monitor mode. In the flight software mode, it checks CRC checksum of selected NVMEM and copies flight software image from NVMEM to RAM And then it starts VxWorks RTOS in RAM, creates flight software tasks, and starts execution of flight software. In the monitor mode, it activates monitor software which performs NVMEM reprogramming and board-level testing on the ground. This paper is to present the design of Boot ROM software and verification method using simulator.

  • PDF

Studies on the Physiological and Biochemical Mechanisms of the Drought Resistance in Winter Barley (대맥한발저항성 기작에 관한 생리적 및 생화학적 연구)

  • 최원열;김용환
    • KOREAN JOURNAL OF CROP SCIENCE
    • /
    • v.28 no.4
    • /
    • pp.451-457
    • /
    • 1983
  • This study was conducted to estimate the effect of the drought on the changes of chlorophyll, protein and proline content of upper three leaves, and the grain yield components of barley plant (CV. baegdong) subjected to water stress at four stages: late vegetative, boot, anthesis early grain filling. 1. In comparison with leaf posititions in water stress, the first leaf below flag leaf maintained the highest relative turgidity, chlorophyll and protein content and showed the least proline accumulation. And, in terms of growth stages in water stress, chlorophyll was shown to be highest at anthesis stage, protein being highest at boot stage and proline being least at boot stage. 2. In boot stages, culm and spike length, and Number of grains per spike were remarkably decreased. And the weight of 1000 grains was at least level in the early grain filling stage, and also the grain size was comparatively decreased at boot and two following stages. 3. The protein content of grain by water stress, apart from early grain filling stage, was not significantly affected by water stress at different growth stages. 4. The rate of sterility was particularly increased at boot and anthesis stages. 5. It was eventually concluded that the boot stage among four growth stages, and the flag leaf in 3 leaf positions were mostly damaged by water stress at reproductive growth stage.

  • PDF

Stress Analysis of C.V. Joint Rubber Boots by Finite Element Method and Application to Design Modification (유한요소법을 이용한 등속 조인트 고무 부트의 변형해석 및 설계변경에의 응용)

  • Kim, S. H.;Lee, H. W.;Huh, H.;Lee, J. H.;Oh, S. T.
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.6 no.3
    • /
    • pp.123-137
    • /
    • 1998
  • The finite deformation with self contact problem of C. V. joint boots is analysed by using the implicit finite element code ABAQUS/Standard. It is shown that analysis results have a good agreement with experimental ones to the degree of maximum rotation angle. As an application of design modification, the effects of thickness change of the rounded part of boot model on the bending and the contact situation of deformed geometry are investigated. In this paper, the effect of the design modification in the end on the leakage is examined using 2-D finite element simulation. To solve the leakage problem of grease, the length of the small end is enlarged. From this study, it is confirmed that we can save the cost and time by applying FEM techniques to analyze and design the boot model.

  • PDF

Software-based Encryption Pattern Bootstrap for Secure Execution Environment (보안 실행 환경을 위한 소프트웨어 기반의 암호화 패턴 부트스트랩)

  • Choi, Hwa-Soon;Lee, Jae-Heung
    • Journal of IKEEE
    • /
    • v.16 no.4
    • /
    • pp.389-394
    • /
    • 2012
  • Most current systems have ignored security vulnerability concerned with boot firmware. It is highly likely that boot firmware may cause serious system errors, such as hardware manipulations by malicious programs or code, the operating system corruption caused by malicious code and software piracy under a condition of no consideration of security mechanism because boot firmware has an authority over external devices as well as hardware controls. This paper proposed a structural security mechanism based on software equipped with encrypted bootstrap patterns different from pre-existing bootstrap methods in terms of securely loading an operating system, searching for malicious codes and preventing software piracy so as to provide reliability of boot firmware. Moreover, through experiments, it proved its superiority in detection capability and overhead ranging between 1.5 % ~ 3 % lower than other software security mechanisms.