• Title/Summary/Keyword: Desktop Bus

Search Result 5, Processing Time 0.022 seconds

Automatic Detection and Analysis of Desktop Bus'(D-Bus) Privilege Bypass in Tizen (타이젠 용 데스크톱 버스 (D-Bus) 권한 우회 취약점 분석 및 자동 탐지)

  • Kim, Dongsung;Choi, Hyoung-Kee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1023-1030
    • /
    • 2020
  • Wearable devices, such as a smart watch and a wrist band, store owner's private information in the devices so that security in a high level is required. Applications developed by third parties in Tizen request for an access to designated services through the desktop bus (D-Bus). The D-Bus verifies application's privileges to grant the request for an access. We developed a fuzzing tool, so-called DAN (the D-bus ANalyzer), to detect errors in implementations for privilege verifications and access controls within Tizen's system services. The DAN has found a number of vulnerable services which granted accesses to unauthorized applications. We built a proof-of-concept application based on those findings to demonstrate a bypass in the privilege examination.

Data Visualization Design of Bus Information Terminal using Smart Client Platform (Smart Client 기반 BIT 시각화 설계)

  • Kim, Joohwan;Nam, Doohee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.4
    • /
    • pp.55-60
    • /
    • 2013
  • Smart client is a term describing an application environment which delivers applications over a web HTTP connection and does not require installation and/or updates. The term "Smart Client" is meant to refer to simultaneously capturing the benefits of a "thin client" (zero-install, auto-update) and a "fat client" (high performance, high productivity). A "Smart Client" application can be created in several very different technologies. Over the past few years, ITS has started to move towards smart clients, also called rich clients. The trend is a move from traditional client/server architecture to a Web-based model. More similar to a fat client vs. a thin client, smart clients are Internet-connected devices that allows a user's local applications to interact with server-based applications through the use of Web services. Smart Client applications in BIT bridge the gap between web applications and desktop applications. They provide the benefits of a web applicationwhile still providing the snappy look and feel inherent to desktop applications.

Development of Enhanced Contingency Screening and Selection Algorithm for On-line Transient Security Assessment (과도안전도 평가를 위한 개선된 상정고장 선택 및 여과 알고리즘 개발)

  • Kim Yong-Hak;Song Sung-Geun;Nam Hae-Kon
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.54 no.6
    • /
    • pp.306-314
    • /
    • 2005
  • In this paper, a new approach that is based on EEAC & only with network solutions for CS&S in the transient stability assessment is developed. The proposed CS&S algorithm in conjunction with EEAC to include the capability of performing on-line TSA without TDS is used to calculate the critical clearing time for stability index. In this algorithm, all generators are represented by classical models and all loads are represented by constant impedance load models. The accelerating & synchronizing power coefficient as an index is determined at its disturbance through solving network equation directly. As mentioned above, a new index for generator is generally used to determine the critical generators group. The generator rotor angle is fixed for non-critical generators group, but has equal angle increments for critical generators group. Finally, the critical clearing time is calculated from the power-angle relationship of equivalent OMIB system. The proposed CS&S algorithm currently being implemented is applied to the KEPCO system. The CS&S result was remarkably similar to TSAT program and SIME. Therefore, it was found to be suitable for a fast & highly efficient CS&S algorithm in TSA. The time of CS&S for the 139 contingencies using proposed CS&S algorithm takes less than 3 seconds on Pentium 4, 3GHz Desktop.

Bluetooth Tunneling Method for Wireless Docking System Based on Wi-Fi Direct (Wi-Fi Direct 기반 무선 Docking 시스템을 위한 Bluetooth Tunneling 연구)

  • Lee, Jaeho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.3
    • /
    • pp.585-594
    • /
    • 2017
  • Wireless Docking system can provide enhanced convenience to user experience of handheld device such as smart phone by using previously deployed peripheral devises such as monitor and keyboard. In this environment, user can easily use the handheld device with variable peripheral devices at any docking system place. This system would be composed of peripherals except host computing device contrarily to previous desktop and laptop environment. For this system, Wi-Fi Alliance has been developing standard technology based on Wi-Fi Direct(Wi-Fi Peer-to-Peer Technical Specifications v1.2, 2010) technology. However, this system can make a problem which may lead to complex connectivity on handheld device due to non-compatible communication interface. To address given problem, we designed a new method of Bluetooth tunneling technology via previous Wi-Fi Direct communication, and evaluated it with experiment results.

A Study on Manipulating Method of 3D Game in HMD Environment by using Eye Tracking (HMD(Head Mounted Display)에서 시선 추적을 통한 3차원 게임 조작 방법 연구)

  • Park, Kang-Ryoung;Lee, Eui-Chul
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.45 no.2
    • /
    • pp.49-64
    • /
    • 2008
  • Recently, many researches about making more comfortable input device based on gaze detection technology have been done in human computer interface. However, the system cost becomes high due to the complicated hardware and there is difficulty to use the gaze detection system due to the complicated user calibration procedure. In this paper, we propose a new gaze detection method based on the 2D analysis and a simple user calibration. Our method used a small USB (Universal Serial Bus) camera attached on a HMD (Head-Mounted Display), hot-mirror and IR (Infra-Red) light illuminator. Because the HMD is moved according to user's facial movement, we can implement the gaze detection system of which performance is not affected by facial movement. In addition, we apply our gaze detection system to 3D first person shooting game. From that, the gaze direction of game character is controlled by our gaze detection method and it can target the enemy character and shoot, which can increase the immersion and interest of game. Experimental results showed that the game and gaze detection system could be operated at real-time speed in one desktop computer and we could obtain the gaze detection accuracy of 0.88 degrees. In addition, we could know our gaze detection technology could replace the conventional mouse in the 3D first person shooting game.