• 제목/요약/키워드: Embedded System Security

Search Result 225, Processing Time 0.035 seconds

Implementation of system security platform based on Cortex-M3 (Cortex-M3기반 System 보안 플랫폼 구현에 대한 연구)

  • Park, Jung-kil;Kim, Young-kil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.317-320
    • /
    • 2016
  • In embedded system, if firmware code is opened by other company, must devise hardware copy prevention. That guard valuable product. Not used security IC, Suggested platform is source code open method that prevent core code and hardware copy. And that open firmware code for other company programmer. Suggest system security platform based on Corex-M3. that consist of IAP(In-application programing) and APP(Applicataion). IAP contain core code and security confirm code. APP is implement by other company developer using core function prototype.

  • PDF

Nuclear-related Software analysis based on secure coding (시큐어 코딩 중심으로 본 원자력 관련 소프트웨어)

  • Jung, Da-Hye;Choi, Jin-Young;Lee, Song-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.243-250
    • /
    • 2013
  • We have entered into an era of smart software system where the many kinds of embedded software, especially SCADA and Automotive software not only require high reliability and safety but also high-security. Removing software weakness during the software development lifecycle is very important because hackers exploit weaknesses which are source of software vulnerabilities when attacking a system. Therefore the coding rule as like core functions of MISRA-C should expand their coding focus on security. In this paper, we used CERT-C secure coding rules for nuclear-related software being developed to demonstrate high-safety software, and proposed how to remove software weakness during development.

Elevator error detecting Using Intelligence Algorithm (지능형 알고리즘을 이용한 엘리베이터의 에러검출)

  • Kang, Doo-Young;Kim, Hyung-Gwon;Javid, Hossain;Ahn, Tae-Chon
    • Proceedings of the KIEE Conference
    • /
    • 2005.07d
    • /
    • pp.2741-2743
    • /
    • 2005
  • In this paper, Elevator is designed for real time security & management. Security & Management System is designed for wireless communication between an Elevator and an manager, between Elevation and an manager. Also, to have remote control capability, embedded system platform with TCP/IP techniques are applied to process control system with independent open structure for the precise data transmission and without constraint of operating system. Security and Management system is designed to solve problem of network port by Bluetooth module. Moved recording, unworked table, life of device and replacement time of device are made database, database is applied to Fuzzy Rule for pre-detection unworked Elevator. Security & Management system is designed safety and convenience for customers using Elevator as well as rapidly treatment with unworked Elevator.

  • PDF

A Verified Formal Specification of A Secured Communication Method For Smart Card Applications

  • Kim, Donald D.
    • Journal of Appropriate Technology
    • /
    • v.7 no.2
    • /
    • pp.172-187
    • /
    • 2021
  • In remote villages without access to modern IT technology, simple devices such as smartcards can be used to carry out business transactions. These devices typically store multiple business applications from multiple vendors. Although devices must prevent malicious or accidental security breaches among the applications, a secure communication channel between two applications from different vendors is often required. In this paper, first, we propose a method of establishing secure communication channels between applications in embedded operating systems that run on multi-applet smart cards. Second, we enforce the high assurance using an intransitive noninterference security policy. Thirdly, we formalize the method through the Z language and create the formal specification of the proposed secure system. Finally, we verify its correctness using Rushby's unwinding theorem.

API Server Transport Layer Security Packets Real-Time Decryption and Visualization System in Kubernetes (쿠버네티스 API server의 Transport Layer Security 패킷 실시간 복호화 및 시각화 시스템)

  • Kim, Tae-Hyun;Kim, Tae-Young;Choi, Me-Hee;Jin, Sunggeun
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.16 no.3
    • /
    • pp.99-105
    • /
    • 2021
  • The cloud computing evolution has brought us increasing necessity to manage virtual resources. For this reason, Kubernetes has developed to realize autonomous resource management in a large scale. It provides cloud computing infrastructure to handle cluster creations and deletions in a secure virtual computing environment. In the paper, we provide a monitoring scheme in which users can observe securely encrypted protocols while each Kubernetes component exchanges their packets. Eventually, users can utilize the proposed scheme for debugging as well as monitoring.

Evaluation Guide of OSS-embedded Information Security System derived from CC/CEM (CC/CEM에서 유도한 오픈소스 내포형 정보보호시스템의 평가지침)

  • 강연희;김정대;최성자;이강수;윤여웅;이병권
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.397-399
    • /
    • 2004
  • 오늘날 조직에서 공개된 소프트웨어를 이용한 오픈소스 내포형 정보보호시스템(OSS-embedded Information Security System) 개발이 증가되고 있으며 소스의 상당부분을 오픈소스 소프트웨어(OSS : Open source Software)를 이용함으로써 복잡한 IT환경 속에서 효율성 증대와 고가의 라이센스에 대한 비용 절감 효과 등을 통해 높은 시장성이 예상된다. 그러므로 오픈소스 내포형 정보보호시스템에 대한 평가 제출물 준비 및 평가에 대한 기준을 정의할 필요가 있으며 공통평가기준(CC : Common Criteria)과 공통평가방법론(CEM : Common Evaluation Methodology)에서 유도한 OSS 평가요구사항을 분석하고자 한다.

  • PDF

Analyses of RFID Application and Its Security Problems Embedded in Internet of Things(IoT) (사물 인터넷망에서의 RFID 응용 기술 및 보안 문제 분석)

  • Kim, Jung Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.473-474
    • /
    • 2014
  • Radio frequency identification system (RFID) is an automatic technology and aids machines or computers to identify objects, record metadata or control individual target through wireless waves. Connecting RFID reader to the terminal of Internet, the readers can identify, track and monitor the objects attached with tags globally, automatically, and in real time, if needed. This is the so-called Internet of Things (IOT). RFID is often seen as a prerequisite for the IOT. This paper surveys the technologies of RFID and IOT, discusses the applications and challenges of RFID technology used in IoT.

  • PDF

Development of the remote control system for Internet-based mobile robot using Embedded Linux and Qt

  • Park, Tae-Gyu;Jeon, Jae-Wook
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.622-627
    • /
    • 2003
  • The existing remote control system have some inherent disadvantage of direct control in the limit range. In some special cases, for example, a power apparatus, an unmanned factory, a nuclear factory, a security management system, the tele-operation is needed to control remote robot without limit space. This field is based on the Internet communication. Because the Internet is constructed all over the world. And it is possible that we control remote mobile robot in the long distance. In this paper, we developed a remote control system. This system is divided into two primary parts. These are local site and remote site. There are the moving robot and web server in the remote site and there is the robot control device in local site. The moving robot is moved by two stepper motors and the robot control device consists of SA-1100 micro controller and embedded Linux. And this controller is an embedded system. Public personal computer which is connected the Internet is used for the web server. The web server provides the mobile robot control interface program to the remote controller and captures the image for feedback information. In the whole system, a robot control device is connected with moving robot and web server through the Internet. So the operator can control the moving robot in the distance through the Internet.

  • PDF

An implementation of wireless sensor network for security system using Bluetooth (블루투스를 이용한 보안을 위한 무선 센서네트워크의 구현)

  • Kim, Jae-Wan;Kim, Byoung-Kug;Eom, Doo-Seop
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.1501-1504
    • /
    • 2004
  • We describe a Bluetooth wireless sensor network for security systems, which includes the implementation issues about system architecture, power management, self-configuration of network, and routing. We think that the methods or algorithms described in this paper can be easily applied to other embedded Bluetooth applications for wireless networks.

  • PDF

Development of Malicious Traffic Detection and Prevention System by Embedded Module on Wireless LAN Access Point (무선 LAN Access Point에서 임베디드 형태의 유해 트래픽 침입탐지/차단 시스템 개발)

  • Lee, Hyung-Woo;Choi, Chang-Won
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.12
    • /
    • pp.29-39
    • /
    • 2006
  • With the increasing popularity of the wireless network, the vulnerability issue on IEEE 802.1x Wireless Local Area Network (WLAN) are more serious than we expected. Security issues range from mis-configured wireless Access Point(AP) such as session hijacking to Denial of Service(DoS) attack. We propose a new system based on intrusion detection or prevention mechanism to protect the wireless network against these attacks. The proposed system has a security solution on AP that includes an intrusion detection and protection system(IDS/IPS) as an embedded module. In this paper, we suggest integrated wireless IDS/IPS module on AP with wireless traffic monitoring, analysis and packet filtering module against malicious wireless attacks. We also present that the system provides both enhanced security and performance such as on the university wireless campus network.

  • PDF