• Title/Summary/Keyword: Internet Life Memory

Search Result 18, Processing Time 0.024 seconds

A method for optimizing lifetime prediction of a storage device using the frequency of occurrence of defects in NAND flash memory (낸드 플래시 메모리의 불량 발생빈도를 이용한 저장장치의 수명 예측 최적화 방법)

  • Lee, Hyun-Seob
    • Journal of Internet of Things and Convergence
    • /
    • v.7 no.4
    • /
    • pp.9-14
    • /
    • 2021
  • In computing systems that require high reliability, the method of predicting the lifetime of a storage device is one of the important factors for system management because it can maximize usability as well as data protection. The life of a solid state drive (SSD) that has recently been used as a storage device in several storage systems is linked to the life of the NAND flash memory that constitutes it. Therefore, in a storage system configured using an SSD, a method of accurately and efficiently predicting the lifespan of a NAND flash memory is required. In this paper, a method for optimizing the lifetime prediction of a flash memory-based storage device using the frequency of NAND flash memory failure is proposed. For this, we design a cost matrix to collect the frequency of defects that occur when processing data in units of Drive Writes Per Day (DWPD). In addition, a method of predicting the remaining cost to the slope where the life-long finish occurs using the Gradient Descent method is proposed. Finally, we proved the excellence of the proposed idea when any defect occurs with simulation.

An Effective Data Distribution Scheme in Sensor Network for Internet of Things (사물인터넷을 위한 센서 네트워크에서 효율적인 데이터 분산 기법)

  • Kim, Jeong-Won
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.7
    • /
    • pp.769-774
    • /
    • 2015
  • Sensor network as an infrastructure of IoT(Internet of Things) has reliability issue because sensor nodes have limited memory as well as bounded battery. To improve the reliability of network, this paper proposes a data distribution scheme. The proposed algorithm distributes the data which each sensor node periodically produces into neighbor nodes that have enough memory as well as battery. This distribution process goes on more than 1 hop for overcoming unexpected spatial crash. Through simulation, we have confirmed that the proposed scheme can improve the resilience of IoT without affecting the life time of sensor network.

Defending Non-control-data Attacks using Influence Domain Monitoring

  • Zhang, Guimin;Li, Qingbao;Chen, Zhifeng;Zhang, Ping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.8
    • /
    • pp.3888-3910
    • /
    • 2018
  • As an increasing number of defense methods against control-data attacks are deployed in practice, control-data attacks have become challenging, and non-control-data attacks are on the rise. However, defense methods against non-control-data attacks are still deficient even though these attacks can produce damage as significant as that of control-data attacks. We present a method to defend against non-control-data attacks using influence domain monitoring (IDM). A definition of the data influence domain is first proposed to describe the characteristics of a variable during its life cycle. IDM extracts security-critical non-control data from the target program and then instruments the target for monitoring these variables' influence domains to ensure that corrupted variables will not be used as the attackers intend. Therefore, attackers may be able to modify the value of one security-critical variable by exploiting certain memory corruption vulnerabilities, but they will be prevented from using the variable for nefarious purposes. We evaluate a prototype implementation of IDM and use the experimental results to show that this method can defend against most known non-control-data attacks while imposing a moderate amount of performance overhead.

Performance Improvement of Current-mode Device for Digital Audio Processor (디지털 오디오 프로세서용 전류모드 소자의 성능 개선에 관한 연구)

  • Kim, Seong-Kweon;Cho, Ju-Phil;Cha, Jae-Sang
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.5
    • /
    • pp.35-41
    • /
    • 2008
  • This paper presents the design method of current-mode signal processing for high speed and low power digital audio signal processing. The digital audio processor requires a digital signal processing such as fast Fourier transform (FFT), which has a problem of large power consumption according to the settled point number and high speed operation. Therefore, a current-mode signal processing with a switched Current (SI) circuit was employed to the digital audio signal processing because a limited battery life should be considered for a low power operation. However, current memory that construct a SI circuit has a problem called clock-feedthrough. In this paper, we examine the connection of dummy MOS that is the common solution of clock-feedthrough and are willing to calculate the relation of width between dummy MOS for a proposal of the design methodology for improvement of current memory. As a result of simulation, in case of that the width of memory MOS is 20um, ratio of input current and bias current is 0.3, the relation of width between switch MOS and dummy MOS is $W_{M4}=1.95W_{M3}+1.2$ for the width of switch MOS is 2~5um, it is $W_{M4}=0.92W_{M3}+6.3$ for the width of switch MOS is 5~10um. Then the defined relation of MOS transistors can be a useful design guidance for a high speed low power digital audio processor.

  • PDF

An Attack of Defeating Keyboard Encryption Module using Javascript Manipulation in Korean Internet Banking (자바스크립트 변조를 이용한 국내 인터넷 뱅킹 키보드 암호화 모듈 우회 공격)

  • Lee, Sung-hoon;Kim, Seung-hyun;Jeong, Eui-yeob;Choi, Dae-seon;Jin, Seung-hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.941-950
    • /
    • 2015
  • Internet banking is widely used in our life with the development of the internet. At the same time, phishing attacks to internet banking have been increased by using malicious object to make unfair profit. People using internet banking service in Korea is required to install security modules such as anti-virus and keyboard protection. However phishing attack technique has been progressed and the advanced technique such as memory hacking defeats the security module of internet banking service. In this paper, we describe internet banking security modules provided by Korean internet banks and analyze how keyboard encryption module works. And we propose an attack to manipulate account transfer information using javascript. Although keyboard protection module provides two functions that protect leakage and manipulation of account transfer information submitted by users against the malicious program of hackers. Our proposed technique can manipulate the account transfer information and result html pages.

A Practical Quality Model for Evaluation of Mobile Services Based on Mobile Internet Device (모바일 인터넷 장비에 기반한 모바일 서비스 평가를 위한 실용적인 품질모델)

  • Oh, Sang-Hun;La, Hyun-Jung;Kim, Soo-Dong
    • Journal of KIISE:Software and Applications
    • /
    • v.37 no.5
    • /
    • pp.341-353
    • /
    • 2010
  • Mobile Internet Device (MID) allows users to flexibly use various forms of wireless internet such as Wi-Fi, GSM, CDMA, and 3G. Using such Internet, MID users can utilize application services. MID usage is expected to grow due to the benefits of portability, Internet accessibility, and other convenience. However, it has resource constraints such as limited CPU power, small memory size, limited battery life, and small screen size. Consequently, MIDs are not capable to hold large-sized complex applications and to process a large amount of data in memory. An effective solution to remedy these limitations is to develop cloud services for the required application functionality, to deploy them on the server side, and to let MID users access the services through internet. A major concern on running cloud services for MIDs is the potential problems with low Quality of Service (QoS) due to the characteristics of MIDs. Even measuring the QoS of such services is more technically challenging than conventional quality measurements. In this paper, we first identify the characteristics of MIDs and cloud services for MIDs. Based on these observations, we derive a number of quality attributes and their metrics for measuring QoS of mobile services. A case study of applying the proposed quality model is presented to show its effectiveness and applicability.

Minimizing Security Hole and Improving Performance in Stateful Inspection for TCP Connections (TCP연결의 스테이트풀 인스펙션에 있어서의 보안 약점 최소화 및 성능 향상 방법)

  • Kim, Hyo-Gon;Kang, In-Hye
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.4
    • /
    • pp.443-451
    • /
    • 2005
  • Stateful inspection devices must maintain flow information. These devices create the flow information also for network attack packets, and it can fatally inflate the dynamic memory allocation on stateful inspection devices under network attacks. The memory inflation leads to memory overflow and subsequent performance degradation. In this paper, we present a guideline to set the flow entry timeout for a stateful inspection device to remove harmful embryonic entries created by network attacks. Considering Transmission Control Protocol (TCP) if utilized by most of these attacks as well as legitimate traffic, we propose a parsimonious memory management guideline based on the design of the TCP and the analysis of real-life Internet traces. In particular, we demonstrate that for all practical purposes one should not reserve memory for an embryonic TCP connection with more than (R+T) seconds of inactivity where R=0, 3, 9 and $1\leqq{T}\leqq{2}$ depending on the load level.

Dynamic storage management for mobile platform based on the characteristics of mobile applications (응용프로그램 특성을 고려한 모바일 플랫폼의 동적 메모리 관리기법)

  • You, Yong-Duck;Park, Sang-Hyun;Choi, Hoon
    • The KIPS Transactions:PartA
    • /
    • v.13A no.7 s.104
    • /
    • pp.561-572
    • /
    • 2006
  • Performance of the mobile devices greatly depends on the efficient resource management because they are usually resource-restricted. In particular, the dynamic storage allocation algorithms very important part of the mobile device's operating system and OS-like software platform. The existing dynamic storage allocation algorithms did not consider application's execution style and the type, life-time, and characteristics of memory objects that the application uses. Those algorithms, as a result, could not manage memory efficiently Therefore, this Paper analyzes the mobile application's execution characteristics and proposes anew dynamic storage allocation algorithm which saves the memory space and improves mobile application's execution speed. The test result shows that the proposed algorithm works 6.5 times faster than the linked-list algorithm[11], 2.5 times faster better than the Doug. Lea's algorithm[12] and 10.5 times faster than the Brent algorithm[14].

Design and Evaluation of the Internet-Of-Small-Things Prototype Powered by a Solar Panel Integrated with a Supercapacitor

  • Park, Sangsoo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.11
    • /
    • pp.11-19
    • /
    • 2021
  • In this paper, we propose a prototype platform combined with the power management system using, as an auxiliary power storage device, a supercapacitor that can be fast charged and discharged with high power efficiency as well as semi-permanent charge and discharge cycle life. For the proposed platform, we designed a technique which is capable of detecting the state of power cutoff or resumption of power supplied from the solar panel in accordance with physical environment changes through an interrupt attached to the micro-controller was developed. To prevent data loss in a computing environment in which continuous power supply is not guaranteed, we implemented a low-level system software in the micro-controller to transfer program context and data in volatile memory to nonvolatile memory when power supply is cut off. Experimental results shows that supercapacitors effectively supply temporary power as auxiliary power storage devices. Various benchmarks also confirm that power state detection and transfer of program context and data from volatile memory to nonvolatile memory have low overhead.

An experimental study about integrated service environment based on e-mail by using rich internet application concept (리치 인터넷 어플리케이션 개념을 적용한 전자메일 기반의 통합 서비스 환경 구현 사례 연구)

  • Kim, Bum-Jae;Shin, Yong-Tae
    • Journal of Digital Contents Society
    • /
    • v.7 no.4
    • /
    • pp.263-269
    • /
    • 2006
  • The trend of the web is moving from portal-centered to user-centered, and RIA(rich internet application) is considered best solution for usability and functionality of the next generation web. But the lack of reference document or technical guide for RIA implementation is a big obstacle for extension of RIA environment to practical business engineer or user. In this paper, I will suggest the implementation conceptand reference site for user-centered environment based on RIA concept. The suggested concept support wire/wireless environment, and use the e-mail that is already used by many company or portal. The contents of this paper will be very helpful to the practical engineer or portal/company that want to use or implement about RIA environment.

  • PDF