• Title/Summary/Keyword: Buffer Overflow

Search Result 141, Processing Time 0.03 seconds

Implementation of the Multi-Channel Network Controller using Buffer Sharing Mechanism (버퍼공유기법을 사용한 멀티채널 네트워크 컨트롤러 구현)

  • Lee, Tae-Su;Park, Jae-Hyun
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.56 no.4
    • /
    • pp.784-789
    • /
    • 2007
  • This paper presents an implementation of a new type of architecture to improve an overflow problem on the network buffer. Each receiver channel of network system stores the message in its own buffer. If some receiver channel receives many messages, buffer overflow problem may occur for the channel. This paper proposes a network controller that implements a receiver channel with shared-memory to save all of the received messages from the every incomming channels. The proposed architecture is applied to ARINC-429, a real-time control network for commercial avionics system. For verifying performance of the architecture, ARINC-429 controller is designed using a SOPC platform, designed by Verilog and targeted to Xilinx Virtex-4 with a built-in PPC405 core.

On Statistical Multiplexing of Data Signals with Dynamic Buffer Control (Buffer의 동적제어에 의한 데이터 신호의 통계적 다중화에 관한 연구)

  • 김낙명;은종관
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.20 no.3
    • /
    • pp.61-68
    • /
    • 1983
  • In this paper various aspects of statistical maltiplexing of data signs have been investigated. A queueing model with finite waiting room and batch poisson arrivals is studied assuming that data signals are transmitted at a constant rate. Using traffic intensity and average burst length as parameters, overflow probabilities and expected queueing delay due to buffering are obtained. Also, a real system model of a statistical multiplexer that can be directly used in micro-programmed hardware realization is proposed. To examine the performance of the system, computer simulation has been done at various conditions. The results obtained can be used in designing a buffer efficiently.

  • PDF

Approximate Cell Loss Performance in ATM Networks: In Comparison with Exact Results

  • Lee, Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.4A
    • /
    • pp.489-495
    • /
    • 2000
  • In this paper we propose an approximate method to estimate the cell loss probability(CLP) due to buffer overflow in ATM networks. The main idea is to relate the buffer capacity with the CLP target in explicit formula by using the approximate upper bound for the tail distribution of a queue. The significance of the proposition lies in the fact that we can obtain the expected CLP by using only the source traffic data represented by mean rate and its variance. To that purpose we consider the problem of estimating the cell loss measures form the statistical viewpoint such that the probability of cell loss due to buffer overflow does not exceed a target value. In obtaining the exact solution we use a typical matrix analytic method for GI/D/1B queue where B is the queue size. Finally, in order to investigate the accuracy of the result, we present both the approximate and exact results of the numerical computation and give some discussion.

  • PDF

The Improvement of Wireless TCP Performance Using Buffer Management (버퍼관리 기법을 응용한 무선 TCP 성능 개선 방안)

  • Kim, Joo-Young;Chung, Young-Jun
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07a
    • /
    • pp.574-576
    • /
    • 2005
  • 유무선 통합망 환경에서 TCP는 무선망에서의 통신오류 밀 핸드오프를 혼잡으로 인한 패킷 손실로 간주하여 혼잡제어 메카니즘을 동작시키기 때문에 네트워크의 전반적인 효율을 저하시킨다. 이러한 문제점을 해결하기 위한 방안으로 무선망에서의 TCP 성능을 개선하기 위한 연구가 다양하게 진행되어 오고 있다. 그 중에서 Snoop 프로토콜은 종단간의 의미 구조를 유지하면서 무선망의 패킷 손실을 지역 재전송을 통하여 최소화하는 방식으로 통신오류에는 좋은 성능을 보여주지만, 대량의 무선 데이터 유입시 buffer overflow가 발생할 가능성이 높다. 따라서 본 논문에서는 버퍼관리 기법을 이용하여 buffer overflow 상황을 미연에 방지하여 불필요한 혼잡제어 메카니즘을 호출하는 것을 방지하면서 네트워크의 전반적인 효율을 향상시키는 방안을 제안하였다.

  • PDF

A Feedback Buffer Control Algorithm for H.264 Video Coding (H.264 동영상 부호기를 위한 Feedback 버퍼 제어 방식)

  • Son Nam Rye;Lee Guee Sang
    • The KIPS Transactions:PartB
    • /
    • v.11B no.6
    • /
    • pp.625-632
    • /
    • 2004
  • Since the H.264 encoding adopts both forward prediction and hi-direction prediction modes and exploits Variable Length Coding(VLC), the amount of data generated from video encoder varies as Flaying time goes by. The fixed bit rate encoding system which has limited transmission channel capacity uses a buffer to control output bitstream It's necessary to control the bitstream to maintain within manageable range so as to protect buffer from overflow or underflow. With existing bit amount control algorithms, the $\lambda_{MODE}$ which is relationship between distortion value and quantization parameter often excesses normal value to end up with video error. This paper proposes an algorithm to protect buffer from overflow or underflow by introducing a new quantization parameter against distortion value of H.264 video data. The test results of 6 exemplary data show that the proposed algorithm has the same PSNR as and up to 8% reduced bit rate against existing algorithms.

A Study on the Performance Analysis of Statistical Multiplexer by the Queueing Model (Queueing 모델에 의한 통계적 다중화기의 성능 분석에 관한 연구)

  • 이주식;김태준;김근배;이종현;임해진;박병철
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.17 no.1
    • /
    • pp.1-10
    • /
    • 1992
  • In the already presented paper, the performance analysis of SMUX was need a lot of time bacause of recussive method, So this paper proposed the new mathematical method for the SMUX's performance. And it is constructed and analyzed the queueing model for SMUX based on the Go-back N retransmission ARQ model. It is assumed that it has the infinite buffer and a single server. It is analzied the parameters that have influence on the byffer and a single server. It is analzied the parameters that have influence on the buffer behaviour of statistical multiplexer overflow probabilities. maximum buffer size. mean wating time and mean buffer size, and these relationship are represented the graphs and datas which provided a guide to the buffer design problem. As these results. it is efficient when the SMUX is apphed that the traffic density is below 0.5 and transmission error probabilities is below 10­$^3$. So this paper can be applied to the basic and theoretical background prior to the implementation of SMUX.

  • PDF

Efficient Stack Smashing Attack Detection Method Using DSLR (DSLR을 이용한 효율적인 스택스매싱 공격탐지 방법)

  • Do Yeong Hwang;Dong-Young Yoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.9
    • /
    • pp.283-290
    • /
    • 2023
  • With the recent steady development of IoT technology, it is widely used in medical systems and smart TV watches. 66% of software development is developed through language C, which is vulnerable to memory attacks, and acts as a threat to IoT devices using language C. A stack-smashing overflow attack inserts a value larger than the user-defined buffer size, overwriting the area where the return address is stored, preventing the program from operating normally. IoT devices with low memory capacity are vulnerable to stack smashing overflow attacks. In addition, if the existing vaccine program is applied as it is, the IoT device will not operate normally. In order to defend against stack smashing overflow attacks on IoT devices, we used canaries among several detection methods to set conditions with random values, checksum, and DSLR (random storage locations), respectively. Two canaries were placed within the buffer, one in front of the return address, which is the end of the buffer, and the other was stored in a random location in-buffer. This makes it difficult for an attacker to guess the location of a canary stored in a fixed location by storing the canary in a random location because it is easy for an attacker to predict its location. After executing the detection program, after a stack smashing overflow attack occurs, if each condition is satisfied, the program is terminated. The set conditions were combined to create a number of eight cases and tested. Through this, it was found that it is more efficient to use a detection method using DSLR than a detection method using multiple conditions for IoT devices.

Video Streaming Receiver with Token Bucket Automatic Parameter Setting Scheme by Video Information File needing Successful Acknowledge Character (성공적인 확인응답이 필요한 비디오 정보 파일에 의한 토큰버킷 자동 파라메타 설정 기법을 가진 비디오 스트리밍 수신기)

  • Lee, Hyun-no;Kim, Dong-hoi;Nam, Boo-hee;Park, Seung-young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.10
    • /
    • pp.1976-1985
    • /
    • 2015
  • The amount of packets in palyout buffer of video streaming receiver can be changed by network condition, and saturated and exhausted by the delay and jitter. Especially, if the amount of incoming video traffic exceeds the maximum allowed playout buffer, buffer overflow problem can be generated. It makes the deterioration of video image and the discontinuity of playout by skip phenomenon. Also, if the incoming packets are delayed by network confusion, the stop phenomenon of video image is made by buffering due to buffer underflow problem. To solve these problems, this paper proposes the video streaming receiver with token bucket scheme which automatically establishes the important parameters like token generation rate r and bucket maximum capacity c adapting to the pattern of video packets. The simulation results using network simulator-2 (NS-2) and joint scalable video model (JSVM) show that the proposed token bucket scheme with automatic establishment parameter provides better performance than the existing token bucket scheme with manual establishment parameter in terms of the generation number of overflow and underflow, packer loss rate, and peak signal to noise ratio (PSNR) in three test video sequences.

Microarchitectural Defense and Recovery Against Buffer Overflow Attacks (버퍼 오버플로우 공격에 대한 마이크로구조적 방어 및 복구 기법)

  • Choi, Lynn;Shin, Yong;Lee, Sang-Hoon
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.3
    • /
    • pp.178-192
    • /
    • 2006
  • The buffer overflow attack is the single most dominant and lethal form of security exploits as evidenced by recent worm outbreaks such as Code Red and SQL Stammer. In this paper, we propose microarchitectural techniques that can detect and recover from such malicious code attacks. The idea is that the buffer overflow attacks usually exhibit abnormal behaviors in the system. This kind of unusual signs can be easily detected by checking the safety of memory references at runtime, avoiding the potential data or control corruptions made by such attacks. Both the hardware cost and the performance penalty of enforcing the safety guards are negligible. In addition, we propose a more aggressive technique called corruption recovery buffer (CRB), which can further increase the level of security. Combined with the safety guards, the CRB can be used to save suspicious writes made by an attack and can restore the original architecture state before the attack. By performing detailed execution-driven simulations on the programs selected from SPEC CPU2000 benchmark, we evaluate the effectiveness of the proposed microarchitectural techniques. Experimental data shows that enforcing a single safety guard can reduce the number of system failures substantially by protecting the stack against return address corruptions made by the attacks. Furthermore, a small 1KB CRB can nullify additional data corruptions made by stack smashing attacks with only less than 2% performance penalty.

An ABR Rate-based Control Scheme Avoiding Access Point Buffer Overflow and Underflow during Handoffs in Wireless ATM Networks (무선 ATM망에서 핸드오프시 접속점 버퍼 오버플로우와 언더플로우를 방지하는 ABR 전송률 기반 제어 방안)

  • Ha, In-Dae;Oh, Jung-Ki;Park, Sang-Joon;Choi, Myung-Whan
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.4
    • /
    • pp.527-539
    • /
    • 2001
  • The wireless asynchronous transfer mode (ATM) system has the advantage of providing the broadband services with various quality-of-service requirements to the mobile terminal efficiently by utilizing the ATM technology developed for the wired ATM system. The available bit rate (ABR) service among various ATM services utilizes the available bandwidth remaining in the ATM link, which allows the efficient bandwidth usage. During the handoff of the mobile terminal, however, the queue length in the access point (AP) which resides in the boundary of the wired ATM network and the wireless ATM network may increase abruptly. In this paper, we propose a scheme which prevents the buffer-overflow and buffer-underflow in the AP during the handoff of the wireless ABR connection in the wireless ATM system using binary feedback rate-based ABR traffic control. This scheme controls the source's cell generation rate during both handoff period and some time interval after the completion of the handoff procedure. The simulation results show that the proposed scheme prevents the buffer-overflow and buffer-underflow. The proposed scheme can contribute to increasing the throughput of the wireless ABR service during handoff by preventing the buffer overflow and underflow during handoff period.

  • PDF