• Title/Summary/Keyword: OS(Operating System)

Search Result 288, Processing Time 0.028 seconds

The Acquisition Methodology Study of User Trace Data in Mac OS X (Mac OS X 운영체제상의 사용자 흔적정보 수집방안 연구)

  • Choi, Joon-Ho;Lee, Sang-Jin
    • The KIPS Transactions:PartC
    • /
    • v.17C no.4
    • /
    • pp.335-346
    • /
    • 2010
  • Mac OS X is the Computer Operating System that develop in Apple Inc. Mac OS X is the successor to Mac OS 9 Version which had been Apple's primary operating system since 1984. Recently, Mac OS X 10.6 (Snow Leopard) has been manufactured and is distributed to user. Apple's Mac OS X Operating System is occupying about 10% in the world Operating System market share. But, Forensic tools that is utilized on digital forensic investigation can not forensic analysis about Mac OS X properly. To do forensic investigation about Mac OS X, information connected with user's action and trace can become important digital evidence in Operating System. This paper presents way about user trace data acquisition methodology in Mac OS X.

Embedded Operating System using the Single Address Space(SAS) Architecture (Single Address Space(SAS) Architecture를 이용한 Embedded Operating System)

  • An, Gwang-Hyeok
    • Proceedings of the KIEE Conference
    • /
    • 2003.11c
    • /
    • pp.608-611
    • /
    • 2003
  • A large part of the embedded system, compared with the PC, have low performance CPU and small memory. So the embedded operating system fits the condition of that hardware system. A Single Address Space (SAS) OS has the operating system and all applications in the single address space. The SAS architecture enhances sharing and co-operation, because addresses have a unique interpretation. Thus, pointer-based date structures can be directly communicated and shared between programs at any time, and can be stored directly on storage. The key point of the SAS OS on the embedded system is the low overhead inter-action between programs in process and usage. So SAS OS can be ported on the low performance CPU. In this paper, we design the SAS OS (named emNOS, Embedded Network Operating System) on the ARMTTDMI processor. Finally we show the benefits of the SAS OS on the embedded system.

  • PDF

Embedded Operating Systems;Windows CE, Embedded Linux, pSOS, uC/OS

  • Park, Kwang-Hyun;Jeon, Jae-Wook
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1976-1981
    • /
    • 2003
  • Except a desktop computer and workstation, an embedded system is a system containing microprocessors. While a desktop computer and a workstation are designed for a general purpose, an embedded system is designed for a dedicated purpose. Thus, an embedded system must meet some constraints such as low power consumption, low cost, small size, real-time, or user-defined ones. A simple and low cost embedded system may be able to be designed without using embedded operating systems (OS). However, considered design time and effort, some embedded system had better be designed with using embedded OS. Under given constraints and purpose of some embedded systems, one embedded OS can save more time, cost, and effort in designing those embedded systems than others. This paper compares four embedded OSs, Windows CE, Embedded Linux, pSOS, and uC/OS. It analyzes several issues of embedded OS such as process scheduling, inter-process communication (IPC), memory management, and network support. Also, it describes the product of each embedded OS.

  • PDF

A Concept and Operational Assumptions of OS Security Enhancement System (운영체제보안시스템의 개념 및 운영 가정사항)

  • Tai-hoon Kim;Sang-ho Kim;Jae-sung Kim
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2003.11a
    • /
    • pp.119-125
    • /
    • 2003
  • Trusted operating systems (OS) provide the basic security mechanisms and services that allow a computer system to protect, distinguish, and separate classified data. This paper proposes a new concept of operating system security enhancement system which uses loadabel security kernel module (LSKM) or dynamic link library(DLL) and specific conditions for operational environment should be assumed.

  • PDF

Design and Implementation of TinyOS Supporting Sensor Transparency of Sensor Nodes (센서노드의 센서 투명성을 지원하는 TinyOS의 확장)

  • So, Sun-Sup;Eun, Seong-Bae;Kim, Byung-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.9
    • /
    • pp.2127-2133
    • /
    • 2010
  • In this paper, we proposed an architecture for supporting sensor transparency in sensor node operating systems, design the standard APIs (Application Programming Interfaces) and sensor device abstraction to provide the sensor transparency and implemented the sensor transparency in the TinyOS, the most well known sensor node operating system. With the proposed sensor node operating system which can support the sensor transparency, application developers can develop the target applications independent to each sensor device by using the standard APIs provided by the sensor node operating system and the sensor device manufacturers also can develop sensor device drivers by using the standard hardware interfaces and HAL (Hardware Adaptation Layer) interfaces independent to the specific hardware platform of sensor nodes.

Research on Success and Failure of Mobile operating system using inductive learning based on ID3 algorithm (ID3 알고리즘 기반의 귀납적 추론을 활용한 모바일 OS의 성공과 실패에 대한 연구)

  • Jin, Dong-Su
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.328-331
    • /
    • 2013
  • As digital ecosystem has been rapidly transforming into the mobile based platform, several mobile operating system, which is in charge of user interface with mobile device has been appeared. This research suggest critical factors affecting success and failure of several commercial mobile operating systems from Palm OS appearing in 1996 to main mobile OSs appearing in 2013. For this, we analyse several mobile operating OS cases, elicit factors affecting success and failure of mobile OS, and conduct ID3 based inductive learning analyses based on elicted factors and values in case dataset. Through this, we draw rules in success and failure of mobile OS and suggest strategic implications for the commercial success of mobile OS.

  • PDF

How to Detect and Block Ransomware with File Extension Management in MacOS (MacOS에서 파일확장자 관리를 통한 랜섬웨어 탐지 및 차단 방법)

  • Youn, Jung-moo;Ryu, Jae-cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.251-258
    • /
    • 2017
  • Most malware, including Ransomware, is built for the Windows operating system. This is because it is more harmful to target an operating system with a high share. But in recent years, MacOS's operating system share has steadily increased. As people become more and more used, the number of malicious code running on the MacOS operating system is increasing. Ransomware has been known to Korea since 2015, and damage cases are gradually increasing. MacOS is no longer free from Ransomware, as Ransomware for MacOS was discovered in March 2016. In order to cope with future Ransomware, this paper used Ransomware's modified file extension to detect Ransomware. We have studied how to detect and block Ransomware processes by distinguishing between extensions changed by the user and extensions changed by the Ransomware process.

Design and Implement of a File System in Web-based Virtual OS (웹기반 가상 OS에서의 File System 설계 및 구현)

  • 심충섭;김진석
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.04a
    • /
    • pp.121-123
    • /
    • 2001
  • 최근 인터넷관련 기술은 사용의 편의성이 강조되고 있다. 이에 많은 연구자들은 언제 어디서나 사용자만의 컴퓨터환경을 제공하는 가상 OS(WebOS: Web Operating System)를 개발하였다[1,2,3]. 그러나 가상 OS를 구현할 때 기존 시스템(Unix, Linux, Windows등)의 File System을 사용하면 시스템의 정보를 사용자가 예측할 수 있기 때문에 시스템 안전성 문제가 발생할 수 있다. 본 논문에서는 기존 시스템의 File System을 이용하지 않고 가상의 File System을 사용함으로써 기존 시스템보다 안전하며 향후 가상 OS에서 개발되어질 프로그램들에 사용할 수 있는 DB구조의 File System을 설계 및 구현한다.

AIT: A method for operating system kernel function call graph generation with a virtualization technique

  • Jiao, Longlong;Luo, Senlin;Liu, Wangtong;Pan, Limin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.5
    • /
    • pp.2084-2100
    • /
    • 2020
  • Operating system (OS) kernel function call graphs have been widely used in OS analysis and defense. However, most existing methods and tools for generating function call graphs are designed for application programs, and cannot be used for generating OS kernel function call graphs. This paper proposes a virtualization-based call graph generation method called Acquire in Trap (AIT). When target kernel functions are called, AIT dynamically initiates a system trap with the help of a virtualization technique. It then analyzes and records the calling relationships for trap handling by traversing the kernel stacks and the code space. Our experimental results show that the proposed method is feasible for both Linux and Windows OSs, including 32 and 64-bit versions, with high recall and precision rates. AIT is independent of the source code, compiler and OS kernel architecture, and is a universal method for generating OS kernel function call graphs.

An Implementation of Task Switching and Interrupt Handling Mechanisms of OSEK Operating System based on ARM Processor (ARM 프로세서를 기반으로 한 OSEK 운영체제의 태스크 전환 및 인터럽트 핸들링 메커니즘 구현)

  • Rim, Seong-Rak;Kwon, O-Yong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.4
    • /
    • pp.1947-1953
    • /
    • 2011
  • OSEK/VDX is a joint project aiming at an industry standard for ECUs in vehicles and OSEK OS is a real-time operating system that meets OSEK/VDX specifications. In this paper, we suggest an implementation of task switching and interrupt handling mechanisms of OSEK operating system based on ARM processors. Considering the requirements of OSEK OS and characteristics of ARM processor, we have designed task switching and interrupt handling mechanisms. For evaluating the validation of the suggested mechanisms, we have checked the functional correctness on an experimental embedded board with ARM processor and calculated the time of task switching and interrupt handling.