• Title/Summary/Keyword: Kernel Level

Search Result 292, Processing Time 0.03 seconds

Fermentation Pattern and Enzymatic Activity in Caecum of Rabbits Fed Processed Neem (Azadirachta indica) Kernel Meal Incorporated Diets

  • Gowda, S.K.;Sastry, V.R.B.;Sahoo, A.;Katiyar, R.C.
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.10 no.4
    • /
    • pp.398-401
    • /
    • 1997
  • A caecal fermentation study was conducted in 30 Angora rabbits equally placed under five whole diets (75 concentrate : 25 roughage) supplemented with processed Neem (Azadirachta indica) kernel meal (NKM ; 2% urea or 1.5% NaOH, W/W), replacing isonitrogenously either at 50 or 100% level of deoiled peanut (Arachis hypogea) meal, for 18 wk period. The total volatile fatty acids level was depressed (p < 0.05) in all the experimental groups (0.02 to 0.04 mEq/g) and ammonia-nitrogen was lowest (p < 0.05; $24.9{\mu}mol/g$) in rabbits fed NaOH treated NKM supplemented diet. Enzyme activity (unit/g) of carboxy methyl-cellulase, ${\alpha}$-amylase, protease and urease exhibited much variation and did not differ significantly. Hence, the results could not confirm a possible adverse effect of feeding NKM on caecal fermentation.

Development of a Web Accelerator in the Kernel

  • Park, Jong-Gyu;Lim, Han-Na;Kim, Hag-Bae
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.70.3-70
    • /
    • 2001
  • In this paper, we suggest a kernel level multi thread web accelerator (called the SCALA-AX), which significantly improves the performance of the web soerver. In comparison with a conventional proxy web cache that is generally called a caching server and a simple content-copy based system, the primary functions and goals of SCALA-AX are designed to maximize the content services of a front end web server with high performance. Specifically, the SCALA-AX runs on the kernel level of a web sorrel, based on the newest caching techniques. Moreover, the SCALA-AX supports the http 1.1 protocol and allows the dynamic pages as well as static pages to be processed.

  • PDF

Policy and Mechanism for Safe Function-level Dynamic Kernel Update (함수 단위 동적 커널 업데이트를 위한 보안 정책 및 기법의 설계)

  • Park, Hyun-Chan;Yoo, Chuck
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.8
    • /
    • pp.808-812
    • /
    • 2008
  • In recent years, the software vulnerability becomes an important problem to the safety in operating system kernel. Many organizations endeavor to publish patches soon after discovery of vulnerability. In spite of the effort, end-system administrators hesitate to apply the patches to their system. The reasons of hesitation are the reboot disruption and the distrust of patches. To solve this problem we propose a dynamic update system for non-updatable kernel, named DUNK. The DUNK provides: 1) a dynamic update mechanism at function-level granularity to overcome the reboot disruption and 2) a safety verification mechanism to overcome the distrust problem, named MAFIA. In this paper, we describe the design of DUNK and detailed algorithm of MAFIA.

A study on Dirty Pipe Linux vulnerability

  • Tanwar, Saurav;Kim, Hee Wan
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.3
    • /
    • pp.17-21
    • /
    • 2022
  • In this study, we wanted to examine the new vulnerability 'Dirty Pipe' that is founded in Linux kernel. how it's exploited and what is the limitation, where it's existed, and overcome techniques and analysis of the Linux kernel package. The study of the method used the hmark[1] program to check the vulnerabilities. Hmark is a whitebox testing tool that helps to analyze the vulnerability based on static whitebox testing and automated verification. For this purpose of our study, we analyzed Linux kernel code that is downloaded from an open-source website. Then by analyzing the hmark tool results, we identified in which file of the kernel it exists, cvss level, statistically depicted vulnerabilities on graph which is easy to understand. Furthermore, we will talk about some software we can use to analyze a vulnerability and how hmark software works. In the case of the Dirty Pipe vulnerability in Linux allows non-privileged users to execute malicious code capable of a host of destructive actions including installing backdoors into the system, injecting code into scripts, altering binaries used by elevated programs, and creating unauthorized user profiles. This bug is being tracked as CVE-2022-0847 and has been termed "Dirty Pipe"[2] since it bears a close resemblance to Dirty Cow[3], and easily exploitable Linux vulnerability from 2016 which granted a bad actor an identical level of privileges and powers.

Characteristic Classification and Correlational Analysis of Source-level Vulnerabilities in Linux Kernel (소스 레벨 리눅스 커널 취약점에 대한 특성 분류 및 상관성 분석)

  • Ko Kwangsun;Jang In-Sook;Kang Yong-hyeog;Lee Jin-Seok;Eom Young Ik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.3
    • /
    • pp.91-101
    • /
    • 2005
  • Although the studies on the analysis and classification of source-level vulnerabilities in operating systems are not direct and positive solutions to the exploits with which the host systems are attacked, It is important in that those studies can give elementary technologies in the development of security mechanisms. But, whereas Linux systems are widely used in Internet and intra-net environments recently, the information on the basic and fundamental vulnerabilities inherent in Linux systems has not been studied enough. In this paper, we propose characteristic classification and correlational analyses on the source-level vulnerabilities in Linux kernel that are opened to the public and listed in the SecurityFocus site for 6 years from 1999 to 2004. This study may contribute to expect the types of attacks, analyze the characteristics of the attacks abusing vulnerabilities, and verify the modules of the kernel that have critical vulnerabilities.

Relation Extraction Using Convolution Tree Kernel Expanded with Entity Features

  • Qian, Longhua;Zhou, Guodong;Zhu, Qiaomin;Qian, Peide
    • Proceedings of the Korean Society for Language and Information Conference
    • /
    • 2007.11a
    • /
    • pp.415-421
    • /
    • 2007
  • This paper proposes a convolution tree kernel-based approach for relation extraction where the parse tree is expanded with entity features such as entity type, subtype, and mention level etc. Our study indicates that not only can our method effectively capture both syntactic structure and entity information of relation instances, but also can avoid the difficulty with tuning the parameters in composite kernels. We also demonstrate that predicate verb information can be used to further improve the performance, though its enhancement is limited. Evaluation on the ACE2004 benchmark corpus shows that our system slightly outperforms both the previous best-reported feature-based and kernel-based systems.

  • PDF

Design and Implementation of an Enhanced Secure Android-Based Smartphone using LIDS

  • Lee, Sang Hun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.3
    • /
    • pp.49-55
    • /
    • 2012
  • Recently, with the rapid development of android-based smartphones, it is becomes a major security issue that the case of Android platform is an open platform. so it is easy to be a target of mobile virus penetration and hacking. Even there are a variety of security mechanisms to prevent the vulnerable points of the Android platform but the reason of most of the security mechanisms were designed at application-level that highly vulnerable to the attacks directly to the operating system or attacks using the disadvantages of an application's. It is necessary that the complementary of the android platform kernel blocks the kernel vulnerability and the application vulnerability. In this paper, we proposed a secure system using linux-based android kernel applied to LIDS(Linux Intrusion Detection and Defense System) and applied a smart phone with s5pc110 chip. As a result, the unauthorized alteration of the application was prevented with a proposed secure system.

Fault Detection of a Proposed Three-Level Inverter Based on a Weighted Kernel Principal Component Analysis

  • Lin, Mao;Li, Ying-Hui;Qu, Liang;Wu, Chen;Yuan, Guo-Qiang
    • Journal of Power Electronics
    • /
    • v.16 no.1
    • /
    • pp.182-189
    • /
    • 2016
  • Fault detection is the research focus and priority in this study to ensure the high reliability of a proposed three-level inverter. Kernel principal component analysis (KPCA) has been widely used for feature extraction because of its simplicity. However, highlighting useful information that may be hidden under retained KPCs remains a problem. A weighted KPCA is proposed to overcome this shortcoming. Variable contribution plots are constructed to evaluate the importance of each KPC on the basis of sensitivity analysis theory. Then, different weighting values of KPCs are set to highlight the useful information. The weighted statistics are evaluated comprehensively by using the improved feature eigenvectors. The effectiveness of the proposed method is validated. The diagnosis results of the inverter indicate that the proposed method is superior to conventional KPCA.

Mobile Devices Control System using LSM (리눅스 보안 모듈을 이용한 모바일 장치 통제 시스템)

  • Bae, Hee-sung;Kim, So-yeon;Park, Tae-kyou
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.1
    • /
    • pp.49-57
    • /
    • 2017
  • With the prevalence of mobile devices, many organizations introduce MDM BYOD and try to increase the level of security with them. However, device control of mobile devices in application level cannot be a solution against the fundamental problems. In this paper, we propose a more flexible and more secure method to control the hardware devices using Linux Security Module in the kernel level with the mandatory access control.

Effects of energy level, reconstruction kernel, and tube rotation time on Hounsfield units of hydroxyapatite in virtual monochromatic images obtained with dual-energy CT

  • Jeong, Dae-Kyo;Lee, Sam-Sun;Kim, Jo-Eun;Huh, Kyung-Hoe;Yi, Won-Jin;Heo, Min-Suk;Choi, Soon-Chul
    • Imaging Science in Dentistry
    • /
    • v.49 no.4
    • /
    • pp.273-279
    • /
    • 2019
  • Purpose: This study was performed to investigate the effects of energy level, reconstruction kernel, and tube rotation time on Hounsfield unit (HU) values of hydroxyapatite (HA) in virtual monochromatic images (VMIs) obtained with dual-energy computed tomography (DECT)(Siemens Healthineers, Erlangen, Germany). Materials and Methods: A bone density calibration phantom with 3 HA inserts of different densities(CTWATER®; 0, 100, and 200 mg of HA/㎤) was scanned using a twin-beam DECT scanner at 120 kVp with tube rotation times of 0.5 and 1.0 seconds. The VMIs were reconstructed by changing the energy level (with options of 40 keV, 70 keV, and 140 keV). In order to investigate the impact of the reconstruction kernel, virtual monochromatic images were reconstructed after changing the kernel from body regular 40 (Br40) to head regular 40 (Hr40) in the reconstruction phase. The mean HU value was measured by placing a circular region of interests (ROIs) in the middle of each insert obtained from the VMIs. The HU values were compared with regard to energy level, reconstruction kernel, and tube rotation time. Results: Hydroxyapatite density was strongly correlated with HU values(correlation coefficient=0.678, P<0.05). For the HA 100 and 200 inserts, HU decreased significantly at increased energy levels(correlation coefficient= -0.538, P<0.05) but increased by 70 HU when using Hr40 rather than Br40 (correlation coefficient=0.158, P<0.05). The tube rotation time did not significantly affect the HU(P>0.05). Conclusion: The HU values of hydroxyapatite were strongly correlated with hydroxyapatite density and energy level in VMIs obtained with DECT.