• Title/Summary/Keyword: Kernel Level

검색결과 292건 처리시간 0.03초

Fermentation Pattern and Enzymatic Activity in Caecum of Rabbits Fed Processed Neem (Azadirachta indica) Kernel Meal Incorporated Diets

  • Gowda, S.K.;Sastry, V.R.B.;Sahoo, A.;Katiyar, R.C.
    • Asian-Australasian Journal of Animal Sciences
    • /
    • 제10권4호
    • /
    • pp.398-401
    • /
    • 1997
  • A caecal fermentation study was conducted in 30 Angora rabbits equally placed under five whole diets (75 concentrate : 25 roughage) supplemented with processed Neem (Azadirachta indica) kernel meal (NKM ; 2% urea or 1.5% NaOH, W/W), replacing isonitrogenously either at 50 or 100% level of deoiled peanut (Arachis hypogea) meal, for 18 wk period. The total volatile fatty acids level was depressed (p < 0.05) in all the experimental groups (0.02 to 0.04 mEq/g) and ammonia-nitrogen was lowest (p < 0.05; $24.9{\mu}mol/g$) in rabbits fed NaOH treated NKM supplemented diet. Enzyme activity (unit/g) of carboxy methyl-cellulase, ${\alpha}$-amylase, protease and urease exhibited much variation and did not differ significantly. Hence, the results could not confirm a possible adverse effect of feeding NKM on caecal fermentation.

Development of a Web Accelerator in the Kernel

  • Park, Jong-Gyu;Lim, Han-Na;Kim, Hag-Bae
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2001년도 ICCAS
    • /
    • pp.70.3-70
    • /
    • 2001
  • In this paper, we suggest a kernel level multi thread web accelerator (called the SCALA-AX), which significantly improves the performance of the web soerver. In comparison with a conventional proxy web cache that is generally called a caching server and a simple content-copy based system, the primary functions and goals of SCALA-AX are designed to maximize the content services of a front end web server with high performance. Specifically, the SCALA-AX runs on the kernel level of a web sorrel, based on the newest caching techniques. Moreover, the SCALA-AX supports the http 1.1 protocol and allows the dynamic pages as well as static pages to be processed.

  • PDF

함수 단위 동적 커널 업데이트를 위한 보안 정책 및 기법의 설계 (Policy and Mechanism for Safe Function-level Dynamic Kernel Update)

  • 박현찬;유혁
    • 한국정보과학회논문지:컴퓨팅의 실제 및 레터
    • /
    • 제14권8호
    • /
    • pp.808-812
    • /
    • 2008
  • 최근 시스템의 복잡도가 증가함에 따라 보안 취약점 문제가 더욱 많이 발생하고 있다. 이를 해결하기 위해 보안 패치가 배포되고 있지만, 시스템 서비스의 중단이 필요하고 패치 자체의 안정성이 검증되지 못해 패치의 적용이 늦어지는 문제가 발생한다. 우리는 이러한 문제를 해결하기 위해 업데이트성이 없는 커널을 위한 함수 단위 동적 업데이트 시스템인 DUNK를 설계하였다. DUNK는 서비스 중단 없는 업데이트를 가능케 하고, 보안 기법인 MAFIA를 통해 안전한 업데이트를 수행한다 MAFIA는 바이너리 패치 코드의 접근 행위를 분석함으로써 패치된 함수가 기존 함수의 접근 권한을 상속받도록 하고, 이를 검증하는 기술을 제공한다. 본 논문에서는 DUNK의 설계와 MAFIA의 알고리즘 및 수행에 대해 기술한다.

A study on Dirty Pipe Linux vulnerability

  • Tanwar, Saurav;Kim, Hee Wan
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제14권3호
    • /
    • pp.17-21
    • /
    • 2022
  • In this study, we wanted to examine the new vulnerability 'Dirty Pipe' that is founded in Linux kernel. how it's exploited and what is the limitation, where it's existed, and overcome techniques and analysis of the Linux kernel package. The study of the method used the hmark[1] program to check the vulnerabilities. Hmark is a whitebox testing tool that helps to analyze the vulnerability based on static whitebox testing and automated verification. For this purpose of our study, we analyzed Linux kernel code that is downloaded from an open-source website. Then by analyzing the hmark tool results, we identified in which file of the kernel it exists, cvss level, statistically depicted vulnerabilities on graph which is easy to understand. Furthermore, we will talk about some software we can use to analyze a vulnerability and how hmark software works. In the case of the Dirty Pipe vulnerability in Linux allows non-privileged users to execute malicious code capable of a host of destructive actions including installing backdoors into the system, injecting code into scripts, altering binaries used by elevated programs, and creating unauthorized user profiles. This bug is being tracked as CVE-2022-0847 and has been termed "Dirty Pipe"[2] since it bears a close resemblance to Dirty Cow[3], and easily exploitable Linux vulnerability from 2016 which granted a bad actor an identical level of privileges and powers.

소스 레벨 리눅스 커널 취약점에 대한 특성 분류 및 상관성 분석 (Characteristic Classification and Correlational Analysis of Source-level Vulnerabilities in Linux Kernel)

  • 고광선;장인숙;강용혁;이진석;엄영익
    • 정보보호학회논문지
    • /
    • 제15권3호
    • /
    • pp.91-101
    • /
    • 2005
  • 컴퓨터 운영체제가 가지는 취약점을 분석하고 분류하는 연구는 취약점을 이용한 익스플로잇을 방어할 수 있는 직접적인 보안기술에는 해당하지 않지만, 운영체제의 보안성 향상을 위한 보안기술 개발에 우선순위를 부여할 수 있다는 점에서 매우 중요한 연구 분야로 볼 수 있다. 그러나 최근 리눅스 운영체제에 대한 활용도에 비하여 리눅스 커널이 가지고 있는 취약점에 대한 연구는 몇몇 커뮤니티에서 운영하는 인터넷 사이트에 단순한 취약점 정보 및 분류기준만 제공되고 있을 뿐, 리눅스 커널이 가지는 근본적인 취약점에 대한 자세한 분석 작업은 수행되고 있지 않다. 따라서 본 논문에서는 1999년부터 2004년까지 6년 동안 SecurityFocus 사이트에 공개된 124개의 리눅스 커널 취약점에 대하여 커널 버전별로 몇 가지 항목을 기준으로 특성 분류 및 상관성 분석을 실시하고자 한다. 이러한 연구결과는 리눅스 커널 취약점을 악용한 익스플로잇의 공격 특성을 예측하고 주요 취약점이 커널 내부의 어떤 영역에서 발견되는지를 확인하는데 이용할 수 있다.

Relation Extraction Using Convolution Tree Kernel Expanded with Entity Features

  • Qian, Longhua;Zhou, Guodong;Zhu, Qiaomin;Qian, Peide
    • 한국언어정보학회:학술대회논문집
    • /
    • 한국언어정보학회 2007년도 정기학술대회
    • /
    • pp.415-421
    • /
    • 2007
  • This paper proposes a convolution tree kernel-based approach for relation extraction where the parse tree is expanded with entity features such as entity type, subtype, and mention level etc. Our study indicates that not only can our method effectively capture both syntactic structure and entity information of relation instances, but also can avoid the difficulty with tuning the parameters in composite kernels. We also demonstrate that predicate verb information can be used to further improve the performance, though its enhancement is limited. Evaluation on the ACE2004 benchmark corpus shows that our system slightly outperforms both the previous best-reported feature-based and kernel-based systems.

  • PDF

Design and Implementation of an Enhanced Secure Android-Based Smartphone using LIDS

  • Lee, Sang Hun
    • 디지털산업정보학회논문지
    • /
    • 제8권3호
    • /
    • pp.49-55
    • /
    • 2012
  • Recently, with the rapid development of android-based smartphones, it is becomes a major security issue that the case of Android platform is an open platform. so it is easy to be a target of mobile virus penetration and hacking. Even there are a variety of security mechanisms to prevent the vulnerable points of the Android platform but the reason of most of the security mechanisms were designed at application-level that highly vulnerable to the attacks directly to the operating system or attacks using the disadvantages of an application's. It is necessary that the complementary of the android platform kernel blocks the kernel vulnerability and the application vulnerability. In this paper, we proposed a secure system using linux-based android kernel applied to LIDS(Linux Intrusion Detection and Defense System) and applied a smart phone with s5pc110 chip. As a result, the unauthorized alteration of the application was prevented with a proposed secure system.

Fault Detection of a Proposed Three-Level Inverter Based on a Weighted Kernel Principal Component Analysis

  • Lin, Mao;Li, Ying-Hui;Qu, Liang;Wu, Chen;Yuan, Guo-Qiang
    • Journal of Power Electronics
    • /
    • 제16권1호
    • /
    • pp.182-189
    • /
    • 2016
  • Fault detection is the research focus and priority in this study to ensure the high reliability of a proposed three-level inverter. Kernel principal component analysis (KPCA) has been widely used for feature extraction because of its simplicity. However, highlighting useful information that may be hidden under retained KPCs remains a problem. A weighted KPCA is proposed to overcome this shortcoming. Variable contribution plots are constructed to evaluate the importance of each KPC on the basis of sensitivity analysis theory. Then, different weighting values of KPCs are set to highlight the useful information. The weighted statistics are evaluated comprehensively by using the improved feature eigenvectors. The effectiveness of the proposed method is validated. The diagnosis results of the inverter indicate that the proposed method is superior to conventional KPCA.

리눅스 보안 모듈을 이용한 모바일 장치 통제 시스템 (Mobile Devices Control System using LSM)

  • 배희성;김소연;박태규
    • 정보보호학회논문지
    • /
    • 제27권1호
    • /
    • pp.49-57
    • /
    • 2017
  • 모바일 단말기의 확산과 더불어 많은 조직에서 직원과 방문자의 업무 효율과 보안을 위해 BYOD 개념을 MDM을 활용하여 구현하고 있다. 그러나 응용 수준에서의 단말기 장치 통제는 보안의 근본적 해결책이 될 수 없다는 문제점이 발생한다. 본 논문은 보다 근본적이고 유연한 보안 정책을 수립하는 방법으로서 모바일 단말기의 커널 수준에서 리눅스 보안 모듈(Linux Security Module)을 사용하여 강제적 접근 제어 방식으로 단말기 장치를 통제하는 방식과 절차를 제안한다.

Effects of energy level, reconstruction kernel, and tube rotation time on Hounsfield units of hydroxyapatite in virtual monochromatic images obtained with dual-energy CT

  • Jeong, Dae-Kyo;Lee, Sam-Sun;Kim, Jo-Eun;Huh, Kyung-Hoe;Yi, Won-Jin;Heo, Min-Suk;Choi, Soon-Chul
    • Imaging Science in Dentistry
    • /
    • 제49권4호
    • /
    • pp.273-279
    • /
    • 2019
  • Purpose: This study was performed to investigate the effects of energy level, reconstruction kernel, and tube rotation time on Hounsfield unit (HU) values of hydroxyapatite (HA) in virtual monochromatic images (VMIs) obtained with dual-energy computed tomography (DECT)(Siemens Healthineers, Erlangen, Germany). Materials and Methods: A bone density calibration phantom with 3 HA inserts of different densities(CTWATER®; 0, 100, and 200 mg of HA/㎤) was scanned using a twin-beam DECT scanner at 120 kVp with tube rotation times of 0.5 and 1.0 seconds. The VMIs were reconstructed by changing the energy level (with options of 40 keV, 70 keV, and 140 keV). In order to investigate the impact of the reconstruction kernel, virtual monochromatic images were reconstructed after changing the kernel from body regular 40 (Br40) to head regular 40 (Hr40) in the reconstruction phase. The mean HU value was measured by placing a circular region of interests (ROIs) in the middle of each insert obtained from the VMIs. The HU values were compared with regard to energy level, reconstruction kernel, and tube rotation time. Results: Hydroxyapatite density was strongly correlated with HU values(correlation coefficient=0.678, P<0.05). For the HA 100 and 200 inserts, HU decreased significantly at increased energy levels(correlation coefficient= -0.538, P<0.05) but increased by 70 HU when using Hr40 rather than Br40 (correlation coefficient=0.158, P<0.05). The tube rotation time did not significantly affect the HU(P>0.05). Conclusion: The HU values of hydroxyapatite were strongly correlated with hydroxyapatite density and energy level in VMIs obtained with DECT.