• Title/Summary/Keyword: K-Code

Search Result 8,835, Processing Time 0.045 seconds

Separation of Kernel Space and User Space in Zephyr Kernel (Zephyr 커널에서 커널 공간과 사용자 공간의 분리 구현)

  • Kim, Eunyoung;Shin, Dongha
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.13 no.4
    • /
    • pp.187-194
    • /
    • 2018
  • The operating system for IoT should have a small memory footprint and provide low power state, real-time, multitasking, various network protocols, and security. Although the Zephyr kernel, an operating system for IoT, released by the Linux Foundation in February 2016, has these features but errors generated by the user code can generate fatal problems in the system because the Zephyr kernel adopts a single-space method that both the user code and kernel code execute in the same space. In this research, we propose a space separation method, which separates kernel space and user space, to solve this problem. The space separation that we propose consists of three modifications in Zephyr kernel. The first is the code separation that kernel code and user code execute in each space while using different stacks. The second is the kernel space protection that generates an exception by using the MPU (Memory Protection Unit) when the user code accesses the kernel space. The third is the SVC based system call that executes the system call using the SVC instruction that generates the exception. In this research, we implemented the space separation in Zephyr v1.8.0 and evaluated safety through abnormal execution of the user code. As the result, the kernel was not crashed by the errors generated by the user code and was normally executed.

Bar-Code Shape UHF RFID Tag Antenna (바코드 모양의 UHF RFID 태그 안테나 설계)

  • Jeon, Byung-Don;Chung, You-Chung
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.23 no.1
    • /
    • pp.131-134
    • /
    • 2012
  • A bar-code shape UHF RFID tag antenna is designed and fabricated with silver conductive ink. It can be recognize by both bar-code scanner and RFID reader. The bar-code shape is taken from a general box of a product, and the product code of the bar-code is used for the antenna design. The tag antenna is fabricated with silver conductive ink using a T-matching structure. The designed tag antenna is satisfied with bar-code system and RFID system simultaneously. The input reflection coefficient characteristics and the reading range pattern are measured. The peak reading range is about 111 cm, which is long enough.

A Study of Multiple Compression for Malicious Code Execution and Concealment (악성코드 실행과 은닉을 위한 다중 압축 연구)

  • Yi, Jeong-Hoon;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.299-302
    • /
    • 2010
  • Recently, the malicious code is not easily detectable in the vaccine for the virus, malicious code as a compressed file by modulation pattern is the tendency to delay. Among the many antivirus engines on the market a compressed file that can be modulated by malicious code, and test whether the pattern will need to know. We cover a multi-compressed files, malicious code modulated secreted by examining patterns of test engine is being detected is through a computer simulation. Analysis of secreted activities of malicious code and infect the host file tampering with the system driver files and registry, it gets registered is analyzed. this study will contribute hidden malicious code inspection and enhance vaccine efficacy in reducing the damage caused by malicious code.

  • PDF

UEP Turbo Encoder for H.264/AVC (H.264/AVC를 위한 UEP Turbo Encoder)

  • Kim, June;Kim, Youngseop;Park, In-Ho
    • Journal of the Semiconductor & Display Technology
    • /
    • v.14 no.1
    • /
    • pp.51-53
    • /
    • 2015
  • H.264/AVC is international video coding standard, which shows improved code and efficiency than the existing video standards. H.264/AVC proposes data partitioning method that considerably to be an effective layering technique which separates important addressing data from the residual data. UEP(Unequal Error Protection) turbo code of H.264/AVC uses retransmission system to get the UEP effectively. However, Data partitioning system of H.264/AVC is inefficient method in turbo code of H.264/AVC. Based on this observation, we propose the new UEP turbo code algorithm that reconstructs input sequence of turbo code without retransmission system.

An Implementation of Time Code Generator for Sending Real Time Information (실 시각정보 전송을 위한 시각코드발생기 제작)

  • Kim, Young-Beom;Park, Young-Tae;Lee, Young-Kyu
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.6 no.3
    • /
    • pp.9-13
    • /
    • 2007
  • In this paper, we propose a system that can be used to provide the national standard time for the general public with ease by using the self-implemented independent time-code generator for transmitting standard time information through both the wired and the wireless networks. The newly proposed time code is different from conventional methods in the point that it has a structural advantage of having an ability of obtaining reliable data by repeatedly transmitting the same information. We observe that it is sufficiently possible to transmit the time information with a microsecond level because measurement result shows that the system uncertainty is about few nanosecond of time-error fluctuation through the self characteristic measurement of total system including the time-code generator and decoder system receiving time-information.

  • PDF

Development of a Subchannel Analysis Code MATRA Applicable to PWRs and ALWRs

  • Yoo, Yeon-Jong;Hwang, Dae-Hyun;Sohn, Dong-Seong
    • Nuclear Engineering and Technology
    • /
    • v.31 no.3
    • /
    • pp.314-327
    • /
    • 1999
  • A subchannel analysis code MATRA applicable to PWRs and ALWRs has been developed to be run on an IBM PC or HP WS based on the existing CDC CYBER mainframe version of COBRA-Rf-1. This MATRA code is a thermal-hydraulic analysis code based on the subchannel approach for calculating the enthalpy and How distribution in fuel assemblies and reactor cores for both steady-state and transient conditions. HATRA has been provided with an improved structure, various functions, and models to give more convenient user environment and to enhance the code accuracy. Among them, the pressure drop model has been improved to be applied to non-square-lattice rod arrays, and the models for the lateral transport between adjacent subchannels have been improved to enhance the accuracy in predicting two-phase flow phenomena. The predictions of MATRA were compared with the experimental data on the flow and enthalpy distribution in some sample rod-bundle cases to evaluate the performance of MATRA. All the results revealed that the predictions of MATRA were better than those of COBRA-IV-I.

  • PDF

A study stack allocation on JIT Code Generator for reducing register load traffic (레지스터 로드 트래픽 감소를 위한 JIT Code Generator에 스택할당 정책 적용 방안 연구)

  • Song, Kyung-Nam;Kim, Hyo-Nam;Won, Yoo-Hun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.10b
    • /
    • pp.1541-1544
    • /
    • 2001
  • Java virtual machine의 성능을 향상시키기 위해 "JIT(Just-in-Time)"code generator가 고안되었다[3], JIT code generator는 스택기반의 자바 바이트 코드를 레지스터 기반의 native machine code로 변환해 주는 역할을 수행하여 바이트 코드의 번역시간을 줄여준다. 그러나 JIT 는 많은 레지스터의 사용을 야기시키므로 효율적인 레지스터 allocation 정책이 필요하고 스택과 레지스터 간의 traffic 을 가중시킨다. 그러므로 본 논문에서는 자바 바이트 코드의 효율적인 stack allocation 정책을 JIT code generator에 적용함으로 레지스터와의 traffic을 줄이는 방법을 제시하였다.

  • PDF

Development and Application of a Computer Code for Prediction of Indoor Pollutant Dispersion (새집증후군 저감대책을 위한 실내 오염물질 확산 해석 코드 개발 및 적용)

  • Jeon, Hyun-Jun;Yang, Kyung-Soo;Choi, Choon-Bum
    • Korean Journal of Air-Conditioning and Refrigeration Engineering
    • /
    • v.22 no.11
    • /
    • pp.735-744
    • /
    • 2010
  • An efficient code has been developed to predict dispersion of indoor air pollutants. The computing capability of the code has been compared with that of a commercial code in a benchmark test. After that, the code has been employed to compute dispersion of a pollutant released from a new furniture, a kind of Sick Building Syndrome(SBS). A sofa which generates formaldehyde is implemented by using an immersed boundary method. Large Eddy Simulation (LES) is employed to obtain time-dependent velocity and concentration fields. LES has been regarded as an academic tool, but the newly-developed code reveals a possibility of application of LES to practical problems, especially dispersion of indoor pollutants.

LS code pair setting and sequential allocation methods

  • Wook, Roh-Dong
    • Proceedings of the IEEK Conference
    • /
    • 2001.06a
    • /
    • pp.221-224
    • /
    • 2001
  • A new code: LS code was proposed for IMT-2000 CDMA system. The code has special properties during a certain time of interval: 1) perfect autocorrelation 2) perfect crosscorrelation. The perfect autocorrelation means that the autocorrelation has nMaximum for zero time-offset and zero for other times during a certain time. Moreover the perfect crosscorrelation means that the crosscorrelation has zero during a time of interest. In the LAS-DMA system, the LS code is only used in the spreading of data bits in contrast to the conventional CDMA system. Therefore the LS code pair setting and allocation order should be dealt with carefully considering the special properties of LS code. This paper is intended as an investigation of the setting LS code pair and the sequential allocation method. Firstly, the optimum LS code pair set is proposed in order to minimize PAPR. Secondly, the sequential allocation method is studied to either minimize PAPR or expand IFW.

  • PDF

Code-Reuse Attack Detection Using Kullback-Leibler Divergence in IoT

  • Ho, Jun-Won
    • International journal of advanced smart convergence
    • /
    • v.5 no.4
    • /
    • pp.54-56
    • /
    • 2016
  • Code-reuse attacks are very dangerous in various systems. This is because they do not inject malicious codes into target systems, but reuse the instruction sequences in executable files or libraries of target systems. Moreover, code-reuse attacks could be more harmful to IoT systems in the sense that it may not be easy to devise efficient and effective mechanism for code-reuse attack detection in resource-restricted IoT devices. In this paper, we propose a detection scheme with using Kullback-Leibler (KL) divergence to combat against code-reuse attacks in IoT. Specifically, we detect code-reuse attacks by calculating KL divergence between the probability distributions of the packets that generate from IoT devices and contain code region addresses in memory system and the probability distributions of the packets that come to IoT devices and contain code region addresses in memory system, checking if the computed KL divergence is abnormal.