• Title/Summary/Keyword: Kernel module

Search Result 121, Processing Time 0.021 seconds

Implementation and Evaluation of Secure Linux OS (보안 리눅스 운영체제 구현 및 시험 평가)

  • 김근호;김정래;이천희;박태규
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.317-321
    • /
    • 2002
  • 최근 Firewall, IDS와 같은 응용프로그램 수준의 보안 제품은 내부서버 자체의 취약성을 방어하지 못한다. 본 논문에서는 TCSEC C2급에 해당하는 보안성을 가지는 리눅스를 LKM(Loadable Kernel Module) 방법으로 B1급 수준의 다중등급 보안을 구현하였다, 따라서 구현된 다중등급 보안 리눅스 커널의 주요 기능을 기술하고, 시험 평가로서 강제적 접근제어, 성능 및 해킹 시험을 실시하였다. 구현된 보안 커널 기반의 리눅스 운영체제는 B1급의 요구사항을 만족하며, root의 권한 제한, DB를 이용한 실시간 감사추적, 해킹차단, 통합보안관리등의 추가적 기능을 제공한다.

  • PDF

A Study on the PC-Based Motion Controller Design for Multi-Axis Control (다축 제어용 PC-Based Motion Controller 설계에 관한 연구)

  • 안호균
    • Proceedings of the KIPE Conference
    • /
    • 2000.07a
    • /
    • pp.641-644
    • /
    • 2000
  • Recently As the performance of the personal computer has been improving rapidly lots of research for the pc-based numerical computer actively progress in an easy repair maintenance and improving the performance with less cost. This paper presents the design using complex programmable logic device(CPLD). The CPU of Motion Controller that function as the real time control of the independent multi-axis motion the error-detect module and external I/O control made use of 80C196KC, In this paper The PC-NC effectively distributed to the load of NCK(numerical computer kernel) and have the advantage of high speed and precision.

  • PDF

A Design of Remote keystroke monitoring For Honeypot (허니팟을 위한 원격 키스트로크 모니터링의 설계)

  • 이상인;박재홍;강홍식
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.367-369
    • /
    • 2004
  • 허니팟은 공격자들이 쉽게 공격할 수 있는 시스템이나 네트워크를 구성하여, 악성해커나 스크립트 키드들이 어떻게 시스템을 침입하고 공격하는지 감시할 수 있도록 구성되어 있는 시스템을 말한다. 일반적으로 허니팟은 방화벽과 로그 기록 등으로 감사기능을 수행하는데, 악성해커는 그 로그마저 복구할 수 없도록 삭제하는 경우도 있기 때문에 독립적인 추적 시스템이 필요하다. 본 논문에서는 LKM(Linux Kernel Module)기법을 이용한 키로거를 통해 공격자가 세션 상에서 입력하는 모든 키보드 내용을 기록하여 공격자의 행동을 쉽고 빠르게 분석하는 원격 키스트로크 모니터링 시스템을 설계해 보았다.

  • PDF

A Study on the Protection against Linux Kernel Module Backdooring (리눅스 커널 모듈 백도어 방지에 대한 연구)

  • 김성수;김기창
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10a
    • /
    • pp.634-636
    • /
    • 2001
  • 최근 국내에 공개 운영 체제인 리눅스 시스템의 증가함에 따라서 보안에 중요성이 커지고 있는데 LKM 백도어는 커널 소스를 변경 하기 때문에 강력한 기능을 가지고 있어, 악의적인 코드로 인해 시스템에 근피해를 입힐 수 있다. LKM백도어 방지에 대한 여러 가지 방법이 소개가 되었지만, 대부분의 경우 커널을 수정해야 하기 때문에 설치가 쉽지 않으며, 사용의 제약이 많다. 따라서 본 논문에서는 커널에 의존하지 않고 insmod안에 LKM을 탐지를 할 수 있는 시스템을 설계를 하며, 일반적인 모듈과 LKM 백도어 모듈을 구분하여 일반적인 모듈은 정상적인 진행을 하고, LKM 백도어에 대해서는 로딩을 할 수 없는 안정적인 사용을 할 수 있는 시스템을 제안 한다.

  • PDF

A Concept and Operational Assumptions of OS Security Enhancement System (운영체제보안시스템의 개념 및 운영 가정사항)

  • Tai-hoon Kim;Sang-ho Kim;Jae-sung Kim
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2003.11a
    • /
    • pp.119-125
    • /
    • 2003
  • Trusted operating systems (OS) provide the basic security mechanisms and services that allow a computer system to protect, distinguish, and separate classified data. This paper proposes a new concept of operating system security enhancement system which uses loadabel security kernel module (LSKM) or dynamic link library(DLL) and specific conditions for operational environment should be assumed.

  • PDF

REGULARITY AND SEMIPOTENCY OF HOM

  • Hakmi, Hamza
    • Korean Journal of Mathematics
    • /
    • v.22 no.1
    • /
    • pp.151-167
    • /
    • 2014
  • Let M, N be modules over a ring R and $[M,N]=Hom_R(M,N)$. The concern is study of: (1) Some fundamental properties of [M, N] when [M, N] is regular or semipotent. (2) The substructures of [M, N] such as radical, the singular and co-singular ideals, the total and others has raised new questions for research in this area. New results obtained include necessary and sufficient conditions for [M, N] to be regular or semipotent. New substructures of [M, N] are studied and its relationship with the Tot of [M, N]. In this paper we show that, the endomorphism ring of a module M is regular if and only if the module M is semi-injective (projective) and the kernel (image) of every endomorphism is a direct summand.

The Developement of Smart TV and Smart Home Platform based on HTML5 (HTML5를 기반으로 한 스마트 TV와 스마트 홈용 플랫폼 개발)

  • Kim, Gwang-Jun;Kang, Ki-Woong;Han, Kyu-Cheol;Jang, Seung-Jin;Yoon, Chan-Ho
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.9
    • /
    • pp.991-998
    • /
    • 2014
  • Embedded System operates hardware installed like processor, memory device, various input/output devices and software to control them. This thesis presents MPU module and Base board which are efficient industrial control through design and manufacture as developing S5PV210 CPU of SAMSUNG used by ARM Cortex-A8 based on Android which is Open mobile platform is installed to embedded system. Data for temperature and humidity which are received by CAN communication module proved the suitability and validity for the embedded platform design as implementing application program employed the native App with Linux Kernel based on the Android OS and application of HTML5.

Remote Measurement of the Automobile′s ECU Signals with KWP2000 using Bluetooth Module (Bluetooth 모듈을 이용한 KWP2000 차량 ECU신호의 원격 계측)

  • Choi Kwang-Hun;Kwon Tae-Kyu;Lee Seong-Cheol
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.21 no.10
    • /
    • pp.86-93
    • /
    • 2004
  • This paper presents the remote measurement of the ECU signals adopted with KWP 2000 protocol using the wireless communication technique of bluetooth. The bluetooth technology will be the most promising network paradigm which can open the new area in the information technology. Especially, bluetooth module is able to link all the electrical products and personal computers to cellular phone or PDA. This research has a try to design a wireless measurement model of ECU signal based on the car telemery system using bluetooth device. In order to measure the ECU signals, we designed the interface circuits which is able to communicate between the ECU system and the terminal circuits according to the ISO, SAE regulation of communication protocol standard. A microprocessor S3c341 OX is used for the system control and communication of ECU signals. The embedded system software is programmed to measure the ECU signals using the ARM compiler and ANCI C based on Micro/OS-II kernel to communicate between two bluetooth modules using bluetooth stack. The remote measurement of ECU signals using the bluetooth was designed and implemented to evaluate the performance of wireless network to the transmit measurement data. The possibility for the remote measurement of the self diagnosis signals of ECU adopted with KWP2000 protocol verified through the developed systems and algorithms in embedded system.

Real Time Framework Design based on Android Platform (안드로이드 플랫폼을 기반으로 한 실시간 프레임워크 설계)

  • Kang, Ki-Woong;Han, Kyu-Cheol;Jang, Seung-Jin;Lim, Se-Jung;Kim, Kwang-Jun;Jang, Chang-Soo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.11
    • /
    • pp.1255-1266
    • /
    • 2014
  • This thesis presents MPU module, Base board and sensor module which are efficient industrial control through design and manufacture as developing S5PV210 CPU of SAMSUNG used by ARM Cortex-A8 based on Android which is Open mobile platform is installed to embedded system. Data for temperature and humidity which are received by sensor module proved the suitability and validity for the real time framework design as implementing application program employed the smart phone App with hybrid application based on DB of web server.

Android Storage Access Control for Personal Information Security (개인정보를 위한 안드로이드 저장장치 접근제어)

  • You, Jae-Man;Park, In-Kyoo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.6
    • /
    • pp.123-129
    • /
    • 2013
  • Android file system is vulnerable to the external access of system resources via its arbitrary access mode and need user's control for SD and UMS medias due to its open architecture. In response to the device control, there is a drawback that its controlability is valid only in the case of embedded linux kernel with VDC function. Hence the solution is to directly implement VDC through system call, with another security module for device storage than system module being added to android system. In this paper the new method of android storage access control for personal information is proposed via VDC for mount system of storage. The access method for SD and UMS were implemented using VDC and mount mechanism. This access control system has been designed to control the granted users in kernel level if files are flowed out by copying. As a result, it was proved through testing that the access control system has exactly detected the write access operation.