• Title/Summary/Keyword: Private Memory

Search Result 55, Processing Time 0.028 seconds

A Study for Protecting the Virtual Memory of Applications (어플리케이션의 가상 메모리 보호를 위한 연구)

  • Kim, Dong-Ryul;Moon, Jong-sub
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.11 no.6
    • /
    • pp.335-341
    • /
    • 2016
  • As information technology advances rapidly, various smart devices are becoming an essential element in our lives. Smart devices are providing services to users through applications up on the operating system. Operating systems have a variety of rules, such as scheduling applications and controlling hardwares. Among those rules, it is significant to protect private information in the information-oriented society. Therefore, isolation task, that makes certain memory space separated for each application, should highly be guaranteed. However, modern operating system offers the function to access the memory space from other applications for the sake of debugging. If this ability is misused, private information can be leaked or modified. Even though the access authority to memory is strictly managed, there exist cases found exploited. In this paper, we analyze the problems of the function provided in the Android environment that is the most popular and opened operating system. Also, we discuss how to avoid such kind of problems and verify with experiments.

Management Method for Private Key File of PKI using Container ID of USB memory (USB 메모리의 컨테이너ID를 이용한 PKI 기반의 개인키 파일의 안전한 관리 방안)

  • Kim, Seon-Joo;Joe, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.10
    • /
    • pp.607-615
    • /
    • 2015
  • Mosts user of internet and smart phone has certificate, and uses it when money transfer, stock trading, on-line shopping, etc. Mosts user stores certificate in a hard disk drive of PC, or the external storage medium. In particular, the certification agencies are encouraged for user to store certificate in external storage media such as USB memory rather than a hard disk drive. User think that the external storage medium is safe, but when it is connect to a PC, certificate may be copied easily, and can be exposed to hackers through malware or pharming site. Moreover, if a hacker knows the user's password, he can use user's certificate without restrictions. In this paper, we suggest secure management scheme of the private key file using a password of the encrypted private key file, and a USB Memory's hardware information. The private key file is protected safely even if the encrypted private key file is copied or exposed by a hacker. Also, if the password of the private key file is exposed, USB Memory's container ID, additional authentication factor keeps the private key file safe. Therefore, suggested scheme can improve the security of the external storage media for certificate.

A Study on the Methods to Manage Private Records Utilizing AtoM (Access to Memory): Focused on 'Archive Village' (AtoM을 활용한 민간기록물 관리방안 -'기록사랑마을' 중심으로-)

  • Yuk, Hye-In;Kim, Yong;Jang, Jun-Kab
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.26 no.2
    • /
    • pp.79-105
    • /
    • 2015
  • This study aims to propose management plans for 'Archive Village' that are operating in order to protect important private records and archives. Since 2008, Archive Villages from National Archives of Korea have had nearly 3,000 more records by 2014. However, many users have had difficulties to know the status of the recorded material, even less access to record's informations. This problem arising is that it is difficult to manage and use records. The purpose of this study is to propose a plan for the management of records, which is to realize the 'Computerization of records' official opinion, one of which was raised in the previous study. Because the project is facing the issue of 'human resources and costs', 'the burden of system construction'. This study is implemented records management system considering the problems noted above, utilizing AtoM (Access to Memory).

Bus Splitting Techniques for MPSoC to Reduce Bus Energy (MPSoC 플랫폼의 버스 에너지 절감을 위한 버스 분할 기법)

  • Chung Chun-Mok;Kim Jin-Hyo;Kim Ji-Hong
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.9
    • /
    • pp.699-708
    • /
    • 2006
  • Bus splitting technique reduces bus energy by placing modules with frequent communications closely and using necessary bus segments in communications. But, previous bus splitting techniques can not be used in MPSoC platform, because it uses cache coherency protocol and all processors should be able to see the bus transactions. In this paper, we propose a bus splitting technique for MPSoC platform to reduce bus energy. The proposed technique divides a bus into several bus segments, some for private memory and others for shared memory. So, it minimizes the bus energy consumed in private memory accesses without producing cache coherency problem. We also propose a task allocation technique considering cache coherency protocol. It allocates tasks into processors according to the numbers of bus transactions and cache coherence protocol, and reduces the bus energy consumption during shared memory references. The experimental results from simulations say the bus splitting technique reduces maximal 83% of the bus energy consumption by private memory accesses. Also they show the task allocation technique reduces maximal 30% of bus energy consumed in shared memory references. We can expect the bus splitting technique and the task allocation technique can be used in multiprocessor platforms to reduce bus energy without interference with cache coherency protocol.

공유 메모리를 갖는 다중 프로세서 컴퓨터 시스팀의 설계 및 성능분석

  • Choe, Chang-Yeol;Park, Byeong-Gwan;Park, Seong-Gyu;O, Gil-Rok
    • ETRI Journal
    • /
    • v.10 no.3
    • /
    • pp.83-91
    • /
    • 1988
  • This paper describes the architecture and the performance analysis of a multiprocessor system, which is based on the shared memory and single system bus. The system bus provides the pended protocol for the multiprocessor environment. Analyzing the processor utilization, address/data bus utilization and memory conflicts, we use a simulation model. The hit ratio of private cache memory is a major factor on the linear increase of the performance of a shared memory based multiprocessor system.

  • PDF

How Does Television Talk Show, (Channel A) Reconstruct North Korean Women Defectors' Personal Memories? (텔레비전 토크쇼 <이제 만나러 갑니다>(채널 A)의 탈북 여성들의 사적 기억 재구성 방식과 그 의미에 대하여)

  • Tae, Ji-Ho;Whang, In-Sung
    • Korean journal of communication and information
    • /
    • v.60
    • /
    • pp.104-124
    • /
    • 2012
  • The purpose of this study is to explore how North Korean woman defectors' memories of their past lives are represented in Korean television talk show, (Channel A, 2011~) and its social implications. In order to carry out this task, this study first discusses the emergence of the concept of 'memory' in its relations with 'collective memory', 'cultural memory' and 'history', and its social appropriation in media such as television. And, the ideological aspects of the recent trend of television talk show that deals with people's private memories were also discussed. The study used the method of structural narrative analysis. The findings are the following. First of all, North Korean woman defectors' memories in collide with the dominant public memories in South Korea. In any case, it has been found that the show tended to make North Korea and their defectors as exotic 'others' and thereby reinforce the existing public memory. After all, this study argues that the representation of the defectors' memories in the talk show only results in stressing the melodramatic narrative emotionally packaged with 'laughing' and 'crying' without any sincere consideration of them.

  • PDF

Efficient Cache Architecture for Transactional Memory (트랜잭셔널 메모리를 위한 효율적인 캐시 구조)

  • Choi, Dong-Min;Kim, Seung-Hun;Ro, Won-Woo
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.4
    • /
    • pp.1-8
    • /
    • 2011
  • Traditional transactional memory systems are no longer able to guarantee the performance of diverse applications with overflowed transactions since there is the drawback that tracking the data for logging is difficult. Especially, this mechanism has a disadvantage of increasing communication delay for sustaining the state which is required to detect the conflict on the overflowed transactions from the first level cache in the transactional memory systems. To address this point, we have focused on the cache architecture of the systems to reduce the overhead caused by overflows and cache misses. In this paper, we present Supportive Cache which reduces additional overhead during transactions. Supportive Cache performs a parallel look-up with L1 private cache and uses the same replacement policy as L1 private cache. We evaluate the performance of the proposed design by comparing LogTM-SE with and without Supportive Cache. The simulation results show that our system improves the performance by 37% on average, compared to the original LogTM-SE which uses the same hardware resource.

Private Key Management Scheme Using Secret Sharing and Steganography (비밀 분산 및 스테가노그래피를 이용한 개인 키 보관 기법)

  • Lee, Jaeheung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.4
    • /
    • pp.35-41
    • /
    • 2017
  • This paper introduces a new method for storing a private key. This method can be achieved by dividing the private key into "n" pieces by a (k, n) secret sharing method, and then storing each piece into photo files utilizing a steganography method. In this way, a user can restore a private key as long as he can remember the locations of "k" photos among the entire photo files. Attackers, meanwhile, will find it extremely difficult to extract the private key if a user has hidden the pieces of the private key into numerous photo files stored in the system. It also provides a high degree of user convenience, as the user can restore the private key from his memory of k positions among n photo files. Coupled with this, a certain level of security can be guaranteed because the attacker cannot restore a private key, even if he knows k-1 photo file locations.

Study of Cache Performance on GPGPU

  • Choi, Kyu Hyun;Kim, Seon Wook
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.4 no.2
    • /
    • pp.78-82
    • /
    • 2015
  • General-purpose graphics processing units (GPGPUs) provide tremendous computational and processing power. Despite the latency hiding mechanism, a GPU architecture requires high memory bandwidth and lower latency between computational units and the memory system. For this reason, the current GPU architecture has private L1 caches in each core and a shared L2 cache to increase performance by reducing memory latency. But in some cases, this CPU-like cache design is not suitable for GPGPUs. In this paper, we analyze detailed cache performance related to GPGPU application characteristics, and suggest technical alternatives for the GPGPU architecture as future work.

Possibility of Chaotic Motion in the R&D Activities in Korea

  • Loh, Jeunghwee
    • Journal of Information Technology Applications and Management
    • /
    • v.21 no.3
    • /
    • pp.1-17
    • /
    • 2014
  • In this study, various characteristics of R&D related economic variables were studied to analyze complexity of science and technology activities in Korea, as reliance of R&D activities of the private sector is growing by the day. In comparison to other countries, this means that it is likely to be fluctuated by economic conditions. This complexity characteristic signifies that the result of science and technology activities can be greatly different from the anticipated results - depending on the influences from economic conditions and the results of science and technology activities which may be unpredictable. After reviewing the results of 17 variables related to science and technology characteristics of complex systems intended for time-series data - in the total R&D expenditure, and private R&D expenditure, numbers of SCI papers, the existence of chaotic characteristics were. using Lyapunov Exponent, Hurst Exponent, BDS test. This result reveals science and technology activity of the three most important components in Korea which are; heavy dependence on initial condition, the long term memory of time series, and non-linear structure. As stable R&D investment and result are needed in order to maintain steady development of Korea economy, the R&D structure should be less influenced by business cycles and more effective technology development policy for improving human resource development must be set in motion. And to minimize the risk of new technology, the construction of sophisticated technology forecasting system should take into account, for development of R&D system.