• Title/Summary/Keyword: OS security product

Search Result 10, Processing Time 0.034 seconds

A Study on Assumptions for Operational Environment of OS Security Enhancement System

  • Kim, Tai-Hoon;Kim, Min-Chul;Baik, Nam-Kyun;Kim, Jae-Sung
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.2093-2096
    • /
    • 2003
  • Trusted operating systems (OS) provide the basic security mechanisms and services that allow a computer system to protect, distinguish, and separate classified data. Trusted operating systems have been developed since the early 1980s and began to receive National Security Agency (NSA) evaluation in 1984. The researches about trusted OS are proceeding over the world, and new product type using the loadable security kernel module (LSKM) or dynamic link library (DLL) is being developed. This paper proposes a special type of product using LSKM and specific conditions for operational environment should be assumed.

  • PDF

The Study on the security of Smartphone (스마트폰 보안 기술 분석)

  • Lee, Young Sook;Kim, Jee Yeon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.2
    • /
    • pp.91-105
    • /
    • 2010
  • With the release Apple's iPhone, smartphone is enjoying a tremendous popularity. Security experts pointed the smartphone security risks and KCC(Korea Communications Commission) published safety rules for smartphone users. In this paper we surveyed market and product trends of smartphone and analyzed the security technology of smartphoen OS including Symbian, iPhone OS, Windows Mobile and Android.

A Study on Data Acquisition and Analysis Methods for Mac Memory Forensics (macOS 메모리 포렌식을 위한 데이터 수집 및 분석 방법에 대한 연구)

  • Jung Woo Lee;Dohyun Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.2
    • /
    • pp.179-192
    • /
    • 2024
  • macOS presents challenges for memory data acquisition due to its proprietary system architecture, closed-source kernel, and security features such as System Integrity Protection (SIP), which are exclusive to Apple's product line. Consequently, conventional memory acquisition tools are often ineffective or require system rebooting. This paper analyzes the status and limitations of existing memory forensics research and tools related to macOS. We investigate methods for memory acquisition and analysis across various macOS versions. Our findings include the development of a practical memory acquisition and analysis process for digital forensic investigations utilizing OSXPmem and dd tools for memory acquisition without system rebooting, and Volatility 2, 3 for memory data analysis.

Efficient method for finding patched vulnerability with code filtering in Apple iOS (코드 필터링 기법을 이용한 iOS 환경에서의 패치 분석 방법론)

  • Jo, Je-gyeong;Ryou, Jae-cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1021-1026
    • /
    • 2015
  • Increasing of damage by phishing, government and organization response more rapidly. So phishing use malware and vulnerability for attack. Recently attack that use patch analysis is increased when Microsoft announce patches. Cause of that, researcher for security on defense need technology of patch analysis. But most patch analysis are develop for Microsoft's product. Increasing of mobile environment, necessary of patch analysis on mobile is increased. But ordinary patch analysis can not use mobile environment that there is many file and small size. So we suggest this research that use code filtering instead of Control Flow Graph and Abstract Syntax Tree.

Context cognition technology through integrated cyber security context analysis (통합 사이버 보안 상황분석을 통한 관제 상황인지 기술)

  • Nam, Seung-Soo;Seo, Chang-Ho;Lee, Joo-Young;Kim, Jong-Hyun;Kim, Ik-Kyun
    • Journal of Digital Convergence
    • /
    • v.13 no.1
    • /
    • pp.313-319
    • /
    • 2015
  • As the number of applications using the internet the rapidly increasing incidence of cyber attacks made on the internet has been increasing. In the equipment of L3 DDoS attack detection equipment in the world and incomplete detection of application layer based intelligent. Next-generation networks domestic product in high-performance wired and wireless network threat response techniques to meet the diverse requirements of the security solution is to close one performance is insufficient compared to the situation in terms of functionality foreign products, malicious code detection and signature generation research primarily related to has progressed malware detection and analysis of the research center operating in Window OS. In this paper, we describe the current status survey and analysis of the latest variety of new attack techniques and analytical skills with the latest cyber-attack analysis prejudice the security situation.

Context cognition technology through integrated cyber security context analysis (통합 사이버 보안 상황분석을 통한 관제 상황인지 기술)

  • Nam, Seung-Soo;Seo, Chang-Ho;Lee, Joo-Young;Kim, Jong-Hyun;Kim, Ik-Kyun
    • Smart Media Journal
    • /
    • v.4 no.4
    • /
    • pp.80-85
    • /
    • 2015
  • As the number of applications using the internet the rapidly increasing incidence of cyber attacks made on the internet has been increasing. In the equipment of L3 DDoS attack detection equipment in the world and incomplete detection of application layer based intelligent. Next-generation networks domestic product in high-performance wired and wireless network threat response techniques to meet the diverse requirements of the security solution is to close one performance is insufficient compared to the situation in terms of functionality foreign products, malicious code detection and signature generation research primarily related to has progressed malware detection and analysis of the research center operating in Window OS. In this paper, we describe the current status survey and analysis of the latest variety of new attack techniques and analytical skills with the latest cyber-attack analysis prejudice the security situation.

Implementation and Evaluation of Multi-level Secure Linux (다중등급 보안 리눅스 구현 및 시험평가)

  • 손형길;박태규;이금석
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.3
    • /
    • pp.311-321
    • /
    • 2003
  • A current firewall or IDS (intrusion detection system) of the network level suffers from many vulnerabilities in internal computing servers. For a secure Linux implementation using system call hooking, this paper defines two requirements such as the multi-level security function of TCSEC B1 and a prevention of hacking attacks. This paper evaluates the secure Linux implemented in terms of the mandatory access control, anti-hacking and performance overhead, and thus shows the security, stability and availability of the multi-level secure Linux. At the kernel level this system protects various hacking attacks such as using Setuid programs, inserting back-door and via-attacks. The performance degradation is an average 1.18% less than other secure OS product.

Static Identification of Firmware Linux Kernel Version by using Symbol Table (심볼 테이블을 이용한 펌웨어 리눅스 커널 버전 정적 식별 기법)

  • Kim, Kwang-jun;Cho, Yeo-jeong;Kim, Yun-jeong;Lee, Man-hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.1
    • /
    • pp.67-75
    • /
    • 2022
  • When acquiring a product having an OS, it is very important to identify the exact kernel version of the OS. This is because the product's administrator needs to keep checking whether a new vulnerability is found in the kernel version. Also, if there is an acquisition requirement for exclusion or inclusion of a specific kernel version, the kernel identification becomes critical to the acquisition decision. In the case of the Linux kernel used in various equipment, sometimes it becomes difficult to pinpoint the device's exact version. The reason is that many manufacturers often modify the kernel to produce their own firmware optimized for their device. Furthermore, if a kernel patch is applied to the modified kernel, it will be very different from its base kernel. Therefore, it is hard to identify the Linux kernel accurately by simple methods such as a specific file existence test. In this paper, we propose a static method to classify a specific kernel version by analyzing function names stored in the symbol table. In an experiment with 100 Linux devices, we correctly identified the Linux kernel version with 99% accuracy.

Lignocellulolytic Enzymes Production by Four Wild Filamentous Fungi for Olive Stones Valorization: Comparing Three Fermentation Regimens

  • Soukaina Arif;Hasna Nait M'Barek;Boris Bekaert;Mohamed Ben Aziz;Mohammed Diouri;Geert Haesaert;Hassan Hajjaj
    • Journal of Microbiology and Biotechnology
    • /
    • v.34 no.5
    • /
    • pp.1017-1028
    • /
    • 2024
  • Lignocellulolytic enzymes play a crucial role in efficiently converting lignocellulose into valuable platform molecules in various industries. However, they are limited by their production yields, costs, and stability. Consequently, their production by producers adapted to local environments and the choice of low-cost raw materials can address these limitations. Due to the large amounts of olive stones (OS) generated in Morocco which are still undervalued, Penicillium crustosum, Fusarium nygamai, Trichoderma capillare, and Aspergillus calidoustus, are cultivated under different fermentation techniques using this by-product as a local lignocellulosic substrate. Based on a multilevel factorial design, their potential to produce lignocellulolytic enzymes during 15 days of dark incubation was evaluated. The results revealed that P. crustosum expressed a maximum total cellulase activity of 10.9 IU/ml under sequential fermentation (SF) and 3.6 IU/ml of β-glucosidase activity under submerged fermentation (SmF). F. nygamai recorded the best laccase activity of 9 IU/ml under solid-state fermentation (SSF). Unlike T. capillare, SF was the inducive culture for the former activity with 7.6 IU/ml. A. calidoustus produced, respectively, 1,009 ㎍/ml of proteins and 11.5 IU/ml of endoglucanase activity as the best results achieved. Optimum cellulase production took place after the 5th day under SF, while ligninases occurred between the 9th and the 11th days under SSF. This study reports for the first time the lignocellulolytic activities of F. nygamai and A. calidoustus. Furthermore, it underlines the potential of the four fungi as biomass decomposers for environmentally-friendly applications, emphasizing the efficiency of OS as an inducing substrate for enzyme production.

Finding Smartphone's Factors which Affect Satisfaction or Dissatisfaction based on KANO Model (KANO 모델을 활용한 스마트폰의 만족 및 불만족 요인 분석)

  • Lee, Sang-Gun;Lee, Sin-Seok;Kang, Ju-Young
    • The Journal of Information Systems
    • /
    • v.20 no.3
    • /
    • pp.257-277
    • /
    • 2011
  • The current study categorizes factors of smartphone into three, using KANO model: attractive factors which cause only product satisfaction, must-be factors for dissatisfaction, and one-dimensional factors for both. Based on it, it presents a new model for the effects that smartphone factors have on satisfaction or dissatisfaction. The purpose is to theoretically explain that smartphone factors on which companies and users place a high value can actually affect satisfaction or dissatisfaction. After choosing 15 factors out of 25 which had been selected through literature study, these were divided into attractive, must-be, and one-dimensional ones. 93 out of 109 questionnaires returned were used for analysis. After frequency analysis using SPSS were conducted on the surveys, the factors were grouped, based on KANO table. The grouping results are as follows. Attractive factors include 'expansion slots for external memory, battery desorption, brand awareness, mobile banking and internet telephony'. Must-be ones include 'multi-touch, information security, entertainment, information retrieval, location based service and SNS. Finally, 'screen visibility, size of internal memory, the amount of internal memory, battery life, and response to after-sales service' are classified as one-dimensional factors. A critical finding of this paper is that since the results are different depending on the operating system of smartphones, it must be taken into consideration in studies on smartphones. The wide and rapid spread of smartphones has changed people's lifestyle as well as business environment, which forces companies to compete with each other to adapt to the changed circumstances. In this competitive system, studies on smartphone factors of satisfaction and dissatisfaction are essential for firms to establish a new strategy. From this point of view, the present paper is expected to be a basic material for enterprises not only to develop goods and services that maximize customer satisfaction and minimize dissatisfaction, but also to establish the future business strategy.