• Title/Summary/Keyword: Computer OS

Search Result 509, Processing Time 0.034 seconds

Analysis and Forecast for Object-C garbage collection memory management policies. (Object C의 가비지 컬렉션을 통한 메모리 관리 정책 분석 및 전망)

  • Kwon, Yejin;Park, Youngbom
    • Annual Conference of KIPS
    • /
    • 2013.05a
    • /
    • pp.994-997
    • /
    • 2013
  • 가비지 컬렉션(Garbage Collection)은 시스템에서 더 이상 사용하지 않는 동적 할당된 메모리 블록 혹은 개체를 찾아 자동적으로 다시 사용 가능한 자원으로 회수하는 것을 의미한다. 최근 대부분의 프로그래밍 언어에서는 메모리 관리를 자동으로 처리해주는 가비지 컬렉터를 기본적으로 포함하고 있으며 이러한 시스템 환경은 개발자들의 개발 속도 향상과 프로그램 가독성을 높여주는 이점을 주고 있다. 그러나 가비지 컬렉터는 자원이 한정되어 있는 스마트폰과 같은 환경에서는 큰 오버헤드를 가지며 성능 저하의 주 원인으로 꼽히기도 한다. 따라서 iOS의 경우에는 가비지 컬렉터를 지원하지 않는다. 이에 따라 본 연구에서는 스마트폰의 안드로이드와 iOS의 프로그래밍 언어인 Java와 Object C의 가비지 컬렉터의 알고리즘을 분석하여 두 언어의 개발환경의 차이를 비교 하였다. 또한 앞으로 Object C의 메모리 관리 정책에 대하여 서술하였다.

A Study on the Security Mechanisms of Mobile Operating Systems and the Detection of New Attack Paths (모바일 운영체제의 보안 매커니즘과 새로운 공격 경로 탐지)

  • A.S Kim;Jae-kyung Park
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.07a
    • /
    • pp.625-627
    • /
    • 2023
  • 본 논문은 모바일 운영체제의 보안 매커니즘을 조사하고, 현재까지 알려진 공격 경로뿐만 아니라 새로운 공격 경로를 탐지하기 위한 방법에 대해 연구하였다. 모바일 운영체제 보안은 사용자의 개인 정보와 중요한 데이터를 보호하는 데 매우 중요하며, 이에 대한 이해와 공격 경로의 탐지는 보안 강화에 필수적이다. 본 연구에서는 iOS와 Android를 중심으로 모바일 운영체제의 주요 보안 매커니즘을 분석하고, 샌드박스 환경, 권한 관리, 암호화 등의 보안 매커니즘에 대해 상세히 살펴보았다. 또한, 이전 연구들에서 파악된 공격 경로 외에도 새로운 공격 경로를 발견하고 탐지하기 위한 방법과 도구를 개발하였다.

  • PDF

Android Operating System: Security Features, Vulnerabilities, and Protection Mechanisms

  • AlJeraisy, Lulwa Abdulmajeed;Alsultan, Arwa
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.367-372
    • /
    • 2022
  • In the age of smartphones, users accomplish their daily tasks using their smartphones due to the significant growth in smartphone technology. Due to these tremendous expansions, attackers are highly motivated to penetrate numerous mobile marketplaces with their developed malicious apps. Android has the biggest proportion of the overall market share when compared to other platforms including Windows, iOS, and Blackberry. This research will discuss the Android security features, vulnerabilities and threats, in addition to some existing protection mechanisms.

Implementation of Smart TV Application using HTML5 and Health Bicycle (HTML5와 헬스자전거를 이용한 사용자 체감형 스마트TV Application 개발)

  • Park, Jin-Tae;Hwang, Hyun-Seo;Moon, Il-Young
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.1
    • /
    • pp.101-106
    • /
    • 2014
  • Smart TV is to form a market of new industries along with the smartphone that appeared in the early 2000s. With the development of IT technology and the emergence of smart phones, user to pursue the application of high satisfaction. The smartphone has to meet the needs of the user in a variety of applications. However, Smart TV which led to a decrease in the development of a member of the application that reflect the needs of the user. Smart TV is popularized, the approach may be used instead of the application of high specification, the smart TV feel to be a smart are required to meet the needs of the user. Therefore in this paper, using the latest IT technology to provide a smart TV applications. This provides a feeling in conjunction as a system of one smart TV, smartphone, the exercise bike like to travel the distance of the actual user. For this reason to use WebOS, HTML5, Web sockets, the technology of Android.

Network-to-Network Router VPN Support System (네트워크 간 VPN 지원 유무선 공유기 시스템)

  • Kim, Chang-Su;Yang, Seung-Eui;Jung, Hoe-kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.636-638
    • /
    • 2015
  • Take advantage of smart devices is time and place constraints beyond the Office, home, school and a Korean or foreign travel was being keep doing it yourself anywhere. But in order to build the infrastructure of these network-to-network VPN-only expert support and expensive equipment is needed for some reason does not go as far as small-to medium-sized institutions, popularised. In this paper, H/W wired/wireless router a cheap, open platforms, open network-only embedded OS is based on OpenSSH, OpenVPN, OpenWRT platforms to implement network VPN iproute support system design and implementation.

  • PDF

Security Improvement of File System Filter Driver in Windows Embedded OS

  • Seong, Yeon Sang;Cho, Chaeho;Jun, Young Pyo;Won, Yoojae
    • Journal of Information Processing Systems
    • /
    • v.17 no.4
    • /
    • pp.834-850
    • /
    • 2021
  • IT security companies have been releasing file system filter driver security solutions based on the whitelist, which are being used by several enterprises in the relevant industries. However, in February 2019, a whitelist vulnerability was discovered in Microsoft Edge browser, which allows malicious code to be executed unknown to users. If a hacker had inserted a program that executed malicious code into the whitelist, it would have resulted in considerable damage. File system filter driver security solutions based on the whitelist are discretionary access control (DAC) models. Hence, the whitelist is vulnerable because it only considers the target subject to be accessed, without taking into account the access rights of the file target object. In this study, we propose an industrial device security system for Windows to address this vulnerability, which improves the security of the security policy by determining not only the access rights of the subject but also those of the object through the application of the mandatory access control (MAC) policy in the Windows industrial operating system. The access control method does not base the security policy on the whitelist; instead, by investigating the setting of the security policy not only for the subject but also the object, we propose a method that provides improved stability, compared to the conventional whitelist method.

Design MetaModel for MCF (Mobile Cross Framework) Based MDA (MDA기반 모바일 크로스 프레임워크를 위한 메타모델 설계)

  • Song, Yujin;Han, Deoksoo;Lee, Eunjoo
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.2
    • /
    • pp.292-298
    • /
    • 2019
  • Mobile-based software development methodology has been vigorously researched from using object-oriented development methodology and component-based development methodology previous structural developing methodology. There are two types of OS in mobile platform which are android and iOS. There is a problem that the application to be developed is developed depending on the device type. To resolve this problem, first, the system structure and design method should be managed effectively. Second, a basic design guide that can be commonly adapted to the each project is required. In this paper, we define a mobile cross platform meta model based on MDA-development methodology, focusing on reusability, portability and interoperability about non - dependent part of the mobile platform. If the proposed meta-model is applied to manage the related information and all the types of Mobile-Apps become available through independent mobile app development process, henceforward, it will be much of help establishing formulaic mobile-app developmental methodology.

A Study on Host Security for ICS (산업 제어시스템 호스트보안 연구)

  • Cho, Jin-ho;Park, Gwang-Cheol;Choi, Sunoh
    • Annual Conference of KIPS
    • /
    • 2019.10a
    • /
    • pp.440-441
    • /
    • 2019
  • 오늘날, 우리는 운영체제에 사용할 수 있는 기술과 보안 방어에 초점을 맞추고 있다. 사람이 현장에서 찾아야 하는 가장 일반적인 서버 빛 워크스테이션 운영체제에 대한 기본적인 지식을 제공하며 OS 의 주요 특징, 약점, 그리고 기본적인 보안 방어에 대해 이야기 한다.

KRAS Mutation as a Biomarker for Survival in Patients with Non-Small Cell Lung Cancer, A Meta-Analysis of 12 Randomized Trials

  • Ying, Min;Zhu, Xiao-Xia;Zhao, Yang;Li, Dian-He;Chen, Long-Hua
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.16 no.10
    • /
    • pp.4439-4445
    • /
    • 2015
  • Background: Because there is no clear consensus for the prognostic implication of KRAS mutations in patients with non-small cell lung cancer (NSCLC), we conducted a meta-analysis based on 12 randomized trials to draw a more accurate conclusion. Materials and Methods: A systematic computer search of articles from inception to May 1, 2014 using the PubMed, EMBASE, and Cochrane databases was conducted. The enrollment of articles and extraction of data were independently performed by two authors. Results: Our analysis was based on the endpoints overall survival (OS) and progression-free survival (PFS). Nine records (All for OS, 7 for PFS) comprising 12 randomized trials were identified with 3701 patients who underwent a test for KRAS mutations. In the analysis of the pooled hazard ratios (HRs) for OS (HR: 1.39; 95% confidence interval [CI] 1.23-1.56) and PFS (HR: 1.33; 95% CI 1.17-1.51), we found that KRAS mutations are related to poor survival benefit for NSCLC. According to a subgroup analysis stratified by disease stage and line of therapy, the combined HRs for OS and PFS coincided with the finding that the presence of a KRAS mutation is a dismal prognostic factor. However, the prognostic role of KRAS mutations are not statistically significant in a subgroup analysis of patients treated with chemotherapy in combination with cetuximab based on the endpoints OS (P=0.141) and PFS (P=0.643). Conclusions: Our results indicate that KRAS mutations are associated with inferior survival benefits for NSCLC but not for those treated with chemotherapies integrating cetuximab.

Executable Code Sanitizer to Strengthen Security of uC/OS Operating System for PLC (PLC용 uC/OS 운영체제의 보안성 강화를 위한 실행코드 새니타이저)

  • Choi, Gwang-jun;You, Geun-ha;Cho, Seong-je
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.365-375
    • /
    • 2019
  • A PLC (Programmable Logic Controller) is a highly-reliable industrial digital computer which supports real-time embedded control applications for safety-critical control systems. Real-time operating systems such as uC/OS have been used for PLCs and must meet real-time constraints. As PLCs have been widely used for industrial control systems and connected to the Internet, they have been becoming a main target of cyberattacks. In this paper, we propose an execution code sanitizer to enhance the security of PLC systems. The proposed sanitizer analyzes PLC programs developed by an IDE before downloading the program to a target PLC, and mitigates security vulnerabilities of the program. Our sanitizer can detect vulnerable function calls and illegal memory accesses in development of PLC programs using a database of vulnerable functions as well as the other database of code patterns related to pointer misuses. Based on these DBs, it detects and removes abnormal use patterns of pointer variables and existence of vulnerable functions shown in the call graph of the target executable code. We have implemented the proposed technique and verified its effectiveness through experiments.