• Title/Summary/Keyword: Windows operating system

Search Result 240, Processing Time 0.035 seconds

Implementation of NON-ROS remote control software of TurtleBot 2 based Windows 10 IoT core (Windows 10 IoT Core 기반 Non-ROS TurtleBot2용 원격 제어 소프트웨어 구현)

  • Onesphore, Ingabire;Kim, Minyoung;Jang, Jongwook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.111-114
    • /
    • 2019
  • This paper intends to implement a software that controls TurtleBot 2 remotely. The moving of the robot TurtleBot 2 can be controlled using command control based on Windows 10 IoT core instead of the Robot Operating System (ROS). The implemented software allows the user to move remotely TurtleBot 2 in any specified direction and perform the monitoring such as reading feedback data from the robot. Through TCP/IP and serial communication technology, TurtleBot 2 can successfully receive command control and send feedback to the user. Using C# programming language, two Universal Windows Platform apps (client app and server app) have been implemented to allow communication between the user and TurtleBot 2. The result of this implementation has been verified and tested in an indoor platform.

  • PDF

Security Improvement of File System Filter Driver in Windows Embedded OS

  • Seong, Yeon Sang;Cho, Chaeho;Jun, Young Pyo;Won, Yoojae
    • Journal of Information Processing Systems
    • /
    • v.17 no.4
    • /
    • pp.834-850
    • /
    • 2021
  • IT security companies have been releasing file system filter driver security solutions based on the whitelist, which are being used by several enterprises in the relevant industries. However, in February 2019, a whitelist vulnerability was discovered in Microsoft Edge browser, which allows malicious code to be executed unknown to users. If a hacker had inserted a program that executed malicious code into the whitelist, it would have resulted in considerable damage. File system filter driver security solutions based on the whitelist are discretionary access control (DAC) models. Hence, the whitelist is vulnerable because it only considers the target subject to be accessed, without taking into account the access rights of the file target object. In this study, we propose an industrial device security system for Windows to address this vulnerability, which improves the security of the security policy by determining not only the access rights of the subject but also those of the object through the application of the mandatory access control (MAC) policy in the Windows industrial operating system. The access control method does not base the security policy on the whitelist; instead, by investigating the setting of the security policy not only for the subject but also the object, we propose a method that provides improved stability, compared to the conventional whitelist method.

Development of an Operating Software for the Manufacturing Cell of a Model Plant (제조 셀 모델 플랜트의 운영 소프트웨어의 개발)

  • Lee, Jun-Su;Kim, Jong-Keun;Jeong, Byung-Ho
    • IE interfaces
    • /
    • v.15 no.4
    • /
    • pp.364-373
    • /
    • 2002
  • This paper developed an operating software for the manufacturing cell of a model plant. The model plant, which was manufactured by Fishertechnik, consists of an assembly cell, a machining cell, and supplementary material handling equipments. Each I/O module of the model plant communicates with the INTERBUS controller devices via High-level Language Interface(HLI). The machining center has two machining cells, which consists of 4 machines respectively, two 3-axis portal transporters, and a rail guided vehicle(RGV). The Petri-Net was used to investigate the dynamics of each machining cell, e.g., the relation of material handling equipments and machines. The operating software was analyzed and designed by Object Oriented Technique. The software was implemented using Delphi 3.0 under Windows 95/NT operating system.

System for Anti-Piracy of Software under Windows Operating System (윈도우 운영 체제에서 불법 소프트웨어 방지 시스템)

  • Hwang, Ki-Tae;Kim, Nam-Yun
    • The KIPS Transactions:PartD
    • /
    • v.11D no.2
    • /
    • pp.423-434
    • /
    • 2004
  • This paper presents the software system that protects illegal installation and use of the commercial software. The server computer in this system stores the compressed versions for all software, while client computers install all software by downloading them from the server. Also the client computers periodically report to the server whether they have illegally installed software. This system introduces authentication and encryption/decryption using the session key under Windows Operating System to prevent interception of the software package from outside world and malicious modification of the transfer message between the server and the client. The proposed system in this Paper has several advantages such as providing real-time control of license and easy maintenance of the software as well as protecting illegal use of the software.

Implementation of Registry Virtualization on Windows (윈도우 운영체제에서 레지스트리 가상화 구현)

  • Shin, Dong-Ha
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.2
    • /
    • pp.19-26
    • /
    • 2010
  • The Windows registry is a hierarchical database where the configuration data of a system or application programs is stored. In this paper, we presented and implemented a registry virtualization algorithm and measured its performance. The registry virtualization algorithm presented in the paper is called Copy-One-level On Write-Open(COOWO) that is a modified version of general Copy On Whte(COW) method to make it suitable for registry virtualization. In this paper, we implemented the proposed algorithm as a dynamically loadable library in Windows and applied it to many Windows application programs. This paper is meaningful since we described a registry virtualization algorithm in detail in situation where we can not find papers that describe the registry virtualization in detail, and we could find the performance of the algorithm can be used in the real applications.

Development of Windows forensic tool for verifying a set of data (윈도우 포렌식 도구의 검증용 데이터 세트의 개발)

  • Kim, Min-Seo;Lee, Sang-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1421-1433
    • /
    • 2015
  • For an accurate analysis through the forensic of digital devices and computer, it is a very important validation of the reliability of digital forensic tools. To verify the reliability of the tool, it is necessary to research and development of the data set to be input to the tool. In many-used Windows operating system of the computer, there is a Window forensic artifacts associated with time and system behavior. In this paper, we developed a set of data in the Windows operating system to be able to analyze all of the two Windows artifacts and we conducted a test with published digital forensic tools. Therefore, the developed data set presents the use of the following method. First, artefacts education for growing ability can be analyzed acts standards. Secondly, the purpose of tool tests for verifying the reliability of digital forensics. Lastly, recyclability for new artifact analysis.

A Study on Treatment Way of a Malicious Code to injected in Windows System File (Windows 시스템 파일에 기생하는 악성코드의 치료 방법 연구)

  • Park, Hee-Hwan;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.255-262
    • /
    • 2006
  • A Malicious code is used to SMiShing disguised as finance mobile Vishing, using Phishing, Pharming mail, VoIP service etc. to capture of personal information. A Malicious code deletes in Anti-Virus Spyware removal programs. or to cure use. By the way, the Malicious cord which is parasitic as use a DLL Injection technique, and operate are Isass.exe, winlogon.exe. csrss.exe of the window operating system. Be connected to the process that you shall be certainly performed of an exe back, and a treatment does not work. A user forces voluntarily a process, and rebooting occurs, or a blue screen occurs, and Compulsory end, operating system everyone does. Propose a treatment way like a bird curing a bad voice code to use a DLL Injection technique to occur in these fatal results. Click KILL DLL since insert voluntarily an end function to Thread for a new treatment, and Injection did again the Thread which finish an action of DLL, and an end function has as control Thread, and delete. The cornerstone that the treatment way that experimented on at these papers and a plan to solve will become a researcher or the revolutionary dimension that faced of a computer virus, and strengthen economic financial company meeting Ubiquitous Security will become.

  • PDF

Development of a Portable Device for Vibration Signal Analysis Based on Windows CE (Windows CE 기반 포터블 진동 신호분석기 개발)

  • 김동준;박광호;기창두
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 1997.10a
    • /
    • pp.253-256
    • /
    • 1997
  • In this study, we developed a portable device which monitors and analyzes a vibration signal happened to machines. This device is based on PDA which is smaller thant a palm of the hand, but it has powerful computing ability as much s a computer with 100MHz CPU and an operating system called Windows CE. As a preprocess for a diagnosis of a rotating machine, training artificial neural network based on PC is performed, and the device will diagnose the condition of a rotating machine using weight values as a result of the training ANN.

  • PDF

Implementation of a location-tracking system based on Windows Mobile operating system (Windows Mobile 운영체제 기반 위치 트래킹 시스템의 구현)

  • Lee, Jung-Hoon;Park, Gyung-Leen
    • Proceedings of the Korean Association of Geographic Inforamtion Studies Conference
    • /
    • 2008.06a
    • /
    • pp.41-44
    • /
    • 2008
  • 본 논문은 GPS 수신기와 CDMA 통신모듈을 장착한 이동단말기를 대상으로 자신의 위치를 Windows Mobile 운영체제의 API를 통해 중앙의 서버에게 전송하는 프레임워크를 설계하고 구현한다. 단말기 소프트웨어는 자원의 효율적인 사용과 확장성을 위하여 GPS 쓰레드, 통신 쓰레드 등으로 구성되어 미동기적으로 GPS 위치 정보를 공유 자료구조에 저장하고 응용에서 정의한 주기에 의해 중앙서버에게 보고한다. 서버는 이를 받아 위치로그의 생성, 이동객체 위치 트래킹을 위한 가시화 등 다양한 응용을 작성할 수 있게 된다. Garmin 포맷의 분석, RAS에 기반한 CDMA 통신, 쓰레드 처리, 서버의 로그 생성 등 핵심적인 요소들의 구현에 의해 차량 텔레매틱스 등 다양한 위치기반 응용을 작성할 수 있도록 한다.

  • PDF

Analysis and Recovery of CIH virus (CIH 바이러스 분석 및 대책)

  • 김광조
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.4
    • /
    • pp.49-60
    • /
    • 1999
  • In this paper we introduce the definition and historical overviews of computer virus program and review their side-effect and ways of infections. We describe the feature of CIH virus which damaged lots of PC systems in Asian countries recently and propose new methods how to rescue against destruction under the operating system of the Microsoft's Windows 95/98. Our experiment results can fix hard disk having FAT32 file system structure and show some popular program cases of having recovered by commercial vaccine program.