• Title/Summary/Keyword: Kernel Module

Search Result 121, Processing Time 0.022 seconds

Design of the Kernel Hardening in USB Driver for Linux DLM Function (리눅스 운영체제에서 DLM을 이용한 USB 디바이스 커널 하드닝 설계)

  • Jang, Seung-Ju
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.12
    • /
    • pp.2579-2585
    • /
    • 2009
  • It is an important problem without system breaking. Like this, to make a computer system operate normally, various commercial fault tolerant techniques are used. Almost commercial products of fault tolerant system consume much cost. This paper proposes kernel hardening technique that are reducing panic using DLM modue in Linux USB driver. I experimented the design technique in Linux O.S. By the experiment, the suggesting technique which includes USB module with DLMis working well.

Design of the Encryption Module for File System in the Solaris Kernel (Solaris 운영체제에서 파일 시스템 암호 모듈 설계)

  • Jang Seung Ju
    • The KIPS Transactions:PartC
    • /
    • v.12C no.2 s.98
    • /
    • pp.201-206
    • /
    • 2005
  • This paper designs Cryptography File System to support encrypting function. The CFS is supported in Solaris Kernel to encrypt or decrypt a plaintext or an encrypted text by using the dynamic linking mechanism. The Cryptography File System supports safe use of computer system even if an intruder gets a file by connecting with network. If he/she does not have a Cryptography File System module in the Solaris Kernel, he/she cannot read that file. The Cryptography File System was experimented into the Solaris kernel.

Mobile Devices Control System using LSM (리눅스 보안 모듈을 이용한 모바일 장치 통제 시스템)

  • Bae, Hee-sung;Kim, So-yeon;Park, Tae-kyou
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.1
    • /
    • pp.49-57
    • /
    • 2017
  • With the prevalence of mobile devices, many organizations introduce MDM BYOD and try to increase the level of security with them. However, device control of mobile devices in application level cannot be a solution against the fundamental problems. In this paper, we propose a more flexible and more secure method to control the hardware devices using Linux Security Module in the kernel level with the mandatory access control.

Pose Estimation with Binarized Multi-Scale Module

  • Choi, Yong-Gyun;Lee, Sukho
    • International journal of advanced smart convergence
    • /
    • v.7 no.2
    • /
    • pp.95-100
    • /
    • 2018
  • In this paper, we propose a binarized multi-scale module to accelerate the speed of the pose estimating deep neural network. Recently, deep learning is also used for fine-tuned tasks such as pose estimation. One of the best performing pose estimation methods is based on the usage of two neural networks where one computes the heat maps of the body parts and the other computes the part affinity fields between the body parts. However, the convolution filtering with a large kernel filter takes much time in this model. To accelerate the speed in this model, we propose to change the large kernel filters with binarized multi-scale modules. The large receptive field is captured by the multi-scale structure which also prevents the dropdown of the accuracy in the binarized module. The computation cost and number of parameters becomes small which results in increased speed performance.

CERTAIN DISCRIMINATIONS OF PRIME ENDOMORPHISM AND PRIME MATRIX

  • Bae, Soon-Sook
    • East Asian mathematical journal
    • /
    • v.14 no.2
    • /
    • pp.259-268
    • /
    • 1998
  • In this paper, for a commutative ring R with an identity, considering the endomorphism ring $End_R$(M) of left R-module $_RM$ which is (quasi-)injective or (quasi-)projective, some discriminations of prime endomorphism were found as follows: each epimorphism with the irreducible(or simple) kernel on a (quasi-)injective module and each monomorphism with maximal image on a (quasi-)projective module are prime. It was shown that for a field F, any given square matrix in $Mat_{n{\times}n}$(F) with maximal image and irreducible kernel is a prime matrix, furthermore, any given matrix in $Mat_{n{\times}n}$(F) for any field F can be factored into a product of prime matrices.

  • PDF

The Implementation of User Image Recognition based on Embedded Linux (임베디드 리눅스 기반의 사용자 영상인식시스템 구현)

  • Park, Chang-Hee;Kang, Jin-Suk;Ko, Suk-Man;Kim, Jang-Hyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.2
    • /
    • pp.239-247
    • /
    • 2007
  • In this paper, we propose a system that the Linux is ported in embedded system with peripheral devices of CIS(CMOS Image Sensor) and GPS module. The system acquires GGA sentence from GPS module by recognizing camera and GPS is used module in Linux kernel. And then the received location information is used to include still image acquired through CIS According to this paper, We compose hardware for embedded system, attach board (including camera), port Linux BootLoader and Kernel. And. then we realize that it insert kernel in CIS control device driver and GPS module device driver.

a Design of Duplication Module in Linux (리눅스의 이중화 모듈 설계)

  • 정상진;한상숙;은성배
    • Proceedings of the IEEK Conference
    • /
    • 2003.07c
    • /
    • pp.2855-2858
    • /
    • 2003
  • In this paper, we have studied a design method to make Linux system enriched with a duplication facility. We have designed a duplication module which would be inserted into Linux. The design have to keep track of three foundations, such as fault detection, reconfiguration, a handling duplication data. To conclude, Linux duplication module is free put on a Linux kernel. so in the future, It can cope with a change in Linux duplication system flexiblely.

  • PDF

A Study on Security Kernel of Linux System (Linux 시스템의 보안커널에 관한 연구)

  • Han, Myung-Mook;Lee, Jun-Hwan
    • Convergence Security Journal
    • /
    • v.8 no.3
    • /
    • pp.25-31
    • /
    • 2008
  • SELinux, security operating system, is the security system which implements mandatory access control using linux security module on the traditional linux kernel supporting discretionary access control. But intrusion detection and logging are lacked when system intrusions are happened. This study proposes a SELinux security kernel which performs detection of access violation and privilege restriction using dynamic access control. It detects the intrusion using security check when the abnormal access of system is happened, and dynamically changes the system privilege for the intruder through privilege restriction. Finally we prevent reintrusion and explain the result of experiment.

  • PDF

Block Erection Simulation Using the Integrated System of Combined Discrete Event and Discrete Time Simulation Kernel (이산 사건 및 이산 시간 혼합형 시뮬레이션 커널의 통합 시스템을 이용한 블록 탑재 시뮬레이션)

  • Cha, Ju-Hwan;Roh, Myung-Il;Cho, Doo-Yeoun;Lee, Kyu-Yeul
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.46 no.3
    • /
    • pp.303-312
    • /
    • 2009
  • Recently, requests for the accurate process planning using modeling and simulation technique are increasing in many engineering fields including shipbuilding industry. In this study, Combined DEVS(Discrete EVent System specification) and DTSS(Discrete Time System Specification) simulation kernel is developed, and an integration strategy of dynamics simulation module and graphics module is also implemented. To evaluate the efficiency and applicability of the simulation kernel and integration strategy, these are applied to the block erection simulation of offshore structures.

Design of the Security Cryptography File System Based on the Dynamic Linking Module on the Linux O.S (Linux 운영체제 동적 모듈 개념을 이용한 보안 파일 시스템 모듈 설계)

  • Jang, Seung-Ju;Lee, Jeong-Bae
    • The KIPS Transactions:PartC
    • /
    • v.10C no.7
    • /
    • pp.929-936
    • /
    • 2003
  • We Propose the Suity Cryptography File System to encrypt or decrypt a plaintext or an encrypted tort by using the dynamic linking mechanism In the Linux kernel. The dynamic linking mechanism gives the flexibility of the kernel without changing the kernel. The Sorority Cryptography File System uses the blowfish algorithm to encrypt or decrypt a data. To overcome the overhead of the key server, I use key generating algorithm which is installed in the same Security Cryptography File System. The Security Cryptography file System is fitted into the Linux system.