• Title/Summary/Keyword: Windows 운영체제

Search Result 220, Processing Time 0.028 seconds

The design and development of a middle\are platform supporting terminal mobility in the next generation wired/wireless integrated networks (차세대 유무선통합망에서의 QoS보장형 단말이동성 지원 통신 미들웨어 플랫폼 설계 및 개발)

  • 남진우;김원태;박용진
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04d
    • /
    • pp.632-634
    • /
    • 2003
  • 본 논문은 기존에 제안되어 있는 RSVP와 Mobile If물 바탕으로 무선 이동환경에서 QoS 보장과 단말의 이동성을 동시에 지원할 수 있는 통신미들웨어 플랫폼을 설계하고 개발한다. 목표시스템은 마이크로소프트사의 Windows CE 운영체제를 기반으로 하며, Windows CE 운영체제 및 PDA 하드웨어 시스템의 제한된 자원과 프로그래밍 API 지원에 따른 문제점을 해결한다. 이동환경에서의 RSVP를 위한 미들웨어상의 통신 모듈을 개발하고 Mobile IP 모듈과 연동하기 위한 방법을 설계하고 구현한다. 802.11b 무선랜 기반의 실험망을 구축하고, 개발된 PDA용 통신 미들웨어 플랫폼의 기능과 성능을 검증하고 그 활용방안을 제시한다.

  • PDF

The Trends of Secure Operating System Technology for Mobile Platform (모바일 단말 보안 운영체제 기술 동향)

  • Bae, Geun-Tae;Kim, Gi-Yeong
    • Electronics and Telecommunications Trends
    • /
    • v.23 no.4
    • /
    • pp.39-47
    • /
    • 2008
  • PC, 노트북 컴퓨터, 스마트폰, PDA, PMP, 텔레매틱스 단말 등 다양한 정보단말은 소형화, 모바일화, 복합화 추세에 있으며 이에 따라 다루는 정보, 접근하는 인터페이스, 서비스의 종류가 다양해지고 단말 자체의 이동성이 증가하여 보안 위험이 높아지고 있다. 또한 단말의 컴퓨팅 성능과 서비스의 질적 향상으로 모바일플랫폼이 데스크톱 환경 수준의 일반적인 환경으로 발전하게 되어 요구되는 보안 수준 역시 높아지고 있다. 본 고에서는 Linux, Windows 등 데스크톱 운영체제를 비롯하여 Wqnit 등 모바일 플랫폼까지 보안 요구사항과 기술 추세를 살펴보고 향후 발전방향에 대하여 논의해 보고자 한다.

OS-­platform structure proposal by development of Mobile Operating System and platform (모바일 운영체제와 플랫폼의 발전에 따른 OS­플랫폼 구조)

  • 구본준;김기천
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10c
    • /
    • pp.394-396
    • /
    • 2003
  • 스마트폰에 내장되고 있는 Symbian OS, Windows CE .NET, Palm OS와 같이 멀티태스킹을 기본적으로 지원하면서, 다양한 멀티미디어 데이터 서비스의 지원, IPv4, Bluetooth 와 같은 다양한 네트워킹 기술 지원, 데스크 탑 PC와의 데이터 호환 기능 등이 제공되는 최신의 모바일 운영체제들이 개발되면서 멀티미디어 중심의 이동통신 서비스의 변환을 촉진시키고 있다. 이러한 고성능의 모바일 OS들의 기능으로 인한 위피(WIPI)나 퀄컴사의 브루(Brew)와 같은 무선인터넷플랫폼과의 관계를 제시하고 향후 발전 방향과 구조를 제시하고자 한다.

  • PDF

Design and Implementation of Finger Keyboard with Video Camera (비디오 카메라를 이용한 핑거 키보드의 설계 및 구현)

  • Hwang, Kitae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.5
    • /
    • pp.157-163
    • /
    • 2016
  • This paper presents Finger Keyboard which detects the user's key types on a keyboard drawn on the paper using a video camera. The Finger Keyboard software was written in standard C/C++ language and thus easy to port to other computing environments. We installed a popular USB-type web camera on a Windows PC and implemented the Finger Keyboard as a Windows application which detects key typing and then injects the key code into the message queue of the Windows operating system. Also we implemented the Finger Keyboard on the Raspberry Pi 2 embedded computer with a dedicated camera and connected it to the Android device as an external keyboard through the Bluetooth. The result of experiments showed that the average ratio of recognition success is around 80% at the typing speed of 120 characters per minute.

A Development of Remote Control System using PDA based WINDOWS CE .NET (WINDOWS CE .NET 기반의 PDA를 이용한 원격제어시스템 개발)

  • Yang, Won-Seok;Lee, Yoo-Sang;Jeon, Jae-Wuk;Moon, Il-Hyeon;Jeon, Chang-Wan;Ahn, Dal;Lim, Jong-Sik;Choi, Kwan-Sun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.6
    • /
    • pp.1480-1490
    • /
    • 2007
  • This study implemented a remote control system using PDA based on WINDOWS CE. NET. In existing remote control systems, the user generally controls remote objects and obtain data using a computer, which is a local system connected to the internet, and the remote objects are connected to server computers. In order to control remote objects, the user has to have a computer, a space to use the Internet, and wired internet. The system proposed in this study uses an embedded board as a server and PDA as a client. Thus, the user can control remote objects at any place as long as wireless internet is available. In addition, because an embedded board is used as a server, the system has the characteristics of high performance and low power consumption. The proposed system provides not only remote control environment using PDA but also conventional control environment using a computer as a client. In case PDA is not available, remote objects still can be controlled from any place as long as there are wired internet and a computer.

  • PDF

Performance Comparison and Analysis of Container-based Host Operating Systems for sending and receiving High-capacity data on Server Systems

  • Kim, Sungho;Kwon, Oeon;Kim, Jung Han;Byeon, JiHyeon;Hwang, Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.7
    • /
    • pp.65-73
    • /
    • 2022
  • Recently, as the Windows system supports the Windows subsystem for Linux (WSL), various researchers have studied to apply a docker container on various systems such as server systems, workstation system and so on. However, in various existing researchers, there is a lack of performance-related indicators to apply the system to each operating system (linux system and windows system). In this paper, we compared a performance comparison and analysis of container-based host operating systems. We configured experimental environments of operating systems for microsoft windows systems and linux systems based on a docker container support. In experimental results, the containers of linux systems reduced the average data latency of dataset 1-6 by 3.9%, 62.16%, 1552.38%, 7.27%, 60.83%, and 1567.2%, compared to the containers on microsoft windows systems.

A Study on Injection Attacks and Defenses on Microsoft Windows (MS Windows에서 인젝션 공격 및 방어 기법 연구)

  • Seong, HoJun;Cho, ChangYeon;Lee, HoWoong;Cho, Seong-Je
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.2
    • /
    • pp.9-23
    • /
    • 2020
  • Microsoft's Windows system is widely used as an operating system for the desktops and enterprise servers of companies or organizations, and is a major target of cyber attacks. Microsoft provides various protection technologies and strives for defending the attacks through periodic security patches, however the threats such as DLL injection and process injection still exist. In this paper, we analyze 12 types of injection techniques in Microsoft Windows, and perform injection attack experiments on four application programs. Through the results of the experiments, we identify the risk of injection techniques, and verify the effectiveness of the mitigation technology for defending injection attacks provided by Microsoft. As a result of the experiments, we have found that the current applications are vulnerable to several injection techniques. Finally, we have presented the mitigation techniques for these injection attacks and analyzed their effectiveness.

A Protection Technique for Kernel Functions under the Windows Operating System (윈도우즈 운영체제 기반 커널 함수 보호 기법)

  • Back, Dusung;Pyun, Kihyun
    • Journal of Internet Computing and Services
    • /
    • v.15 no.5
    • /
    • pp.133-139
    • /
    • 2014
  • Recently the Microsoft Windows OS(operating system) is widely used for the internet banking, games etc. The kernel functions provided by the Windows OS can perform memory accesses, keyboard input/output inspection, and graphics output of any processes. Thus, many hacking programs utilizes those for memory hacking, keyboard hacking, and making illegal automation tools for game programs. Existing protection mechanisms make decisions for existence of hacking programs by inspecting some kernel data structures and the initial parts of kernel functions. In this paper, we point out drawbacks of existing methods and propose a new solution. Our method can remedy those by modifying the system service dispatcher code. If the dispatcher code is utilized by a hacking program, existing protection methods cannot detect illegal operations. Thus, we suggest that protection methods should investigate the modification of the dispatcher code as well as kernel data structures and the initial parts of kernel functions.

What Motivates Users to Upgrade the Operating Systems? (운영체제 업그레이드 의도에 관한 연구: 마이크로소프트 윈도우 사용자를 중심으로)

  • Kim, Jeahyun;Kim, Jongki
    • Informatization Policy
    • /
    • v.23 no.1
    • /
    • pp.38-55
    • /
    • 2016
  • This study discusses the operating systems upgrade to motivation of windows users. To discuss this issues, research hypotheses were set based on Unified Theory of Acceptance Use of Technology(UTAUT) and Theory of Reasoned Action(TRA). The data were collected from undergraduate students. Total of 199 data were used for the analysis. The results of the analysis were summarized into two ways. first, performance expectancy and effort expectancy has a positive influence on attitude towards upgrade the operating systems. Second, social influence, facilitating conditions, and attitude had a positive influence on intention towards upgrade the operating systems. Thus, when users perceived a high degree of performance expectancy, effort expectancy, social influence, and facilitating conditions towards upgrade the operating systems, they evaluated more positively the upgrade the operating systems.

Vulnerability analysis on the ARMv7 Thumb Architecture (ARMv7 Thumb Architecture 취약성 분석)

  • Kim, Si-Wan;Seong, Ki-Taek
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.5
    • /
    • pp.1003-1008
    • /
    • 2017
  • The Internet of Things has attracted considerable research attention in recent years. In order for the new IoT technology to be widely used, the reliability and protection of information is required. IoT systems are very vulnerable to physical security due to their easy accessibility. Along with the development of SoC technology, many operating systems have been developed and many new operating systems have been introduced. In this paper, we describe the vulnerability analysis results for operating systems running on the ARMv7 Thumb Architecture hardware platform. For the recently introduced "Windows 10 IoT Core" operating system, I implemented the Zero-Day Attack by implanting the penetration code developed through the research into a specific IoT system. The virus detection test for the resulting penetration code was validated by referral to the "virustotal" site.