• Title/Summary/Keyword: macOS

Search Result 56, Processing Time 0.04 seconds

A Packet Prioritization Scheme for supporting QoS in Wireless Sensor Networks (무선 센서네트워크에서 QoS 지원을 위한 패킷 우선순위 기법)

  • Rhee, Yun-Seok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.1
    • /
    • pp.129-137
    • /
    • 2010
  • In this paper, we propose a packet prioritization scheme using preamble signal and backoff time which is designed to provide a differentiated channel occupation with a packet priority in wireless sensor networks. This scheme aims at enabling QoS such as fast delivery of high priority packets by reducing their backoff time as well as thus securing higher channel occupation. We expect that it could also improve the channel utilization of the entire network by avoiding unnecessary channel contention. For the purpose, we add new features of multiple queue and preamble modification to the TinyOS based B-MAC. This scheme achieves 82-88% reduction in delivery time of high priority packets, thus it enables realtime support for urgent applications.

A Method to Collect Trusted Processes for Application Whitelisting in macOS (macOS 운영체제에서 화이트리스트 구축을 위한 신뢰 프로세스 수집 연구)

  • Youn, Jung-moo;Ryu, Jae-cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.397-405
    • /
    • 2018
  • Blacklist-based tools are most commonly used to effectively detect suspected malicious processes. The blacklist-based tool compares the malicious code extracted from the existing malicious code with the malicious code. Therefore, it is most effective to detect known malicious codes, but there is a limit to detecting malicious code variants. In order to solve this problem, the necessity of a white list-based tool, which is the opposite of black list, has emerged. Whitelist-based tools do not extract features of malicious code processes, but rather collect reliable processes and verify that the process that checks them is a trusted process. In other words, if malicious code is created using a new vulnerability or if variant malicious code appears, it is not in the list of trusted processes, so it can effectively detect malicious code. In this paper, we propose a method for effectively building a whitelist through research that collects reliable processes in the macOS operating system.

A Study of Forensic Techniques and Tools on Smart Phone OS Types (Smart Phone OS별 포렌식 기술과 도구에 관한 연구)

  • Lee, Bo-Man;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.223-226
    • /
    • 2010
  • iPhone and Smart Phone domestic markets are activated with domestic coming out of galaxy S together and the users are increasing. It follows hereupon and with forensic techniques for the cellular phone relation criminal evidence collection of data of existing the mobile forensic engineering research is necessary in about Smart Phone where it has become new techniques and WiFi etc. Convergence. It respects Smart Phone OS star forensic technique and a tool research, iPhone Apple MAC OS X and it researches galaxy S Google Android from the present paper. Smart it uses SYN methods with Phone OS star forensic techniques and it researches in order mobile forensic description below it observes it sees and forensic application methods computer forensic methods and the tools and it researches forensic techniques. The present paper research as IT powerful country will contribute in Smart Phone forensic technical advances of Korea.

  • PDF

A Study of File Format-Aware Fuzzing against Smartphone Media Server Daemons (스마트폰 미디어 서버 데몬에 대한 파일 포맷 인식 기반의 퍼징 연구)

  • Shin, MinSik;Yu, JungBeen;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.541-548
    • /
    • 2017
  • The smartphone operates the media server daemon to handle audio service requests. Media server daemons, running with a high privilege in the background, caused many vulnerabilities to applications most frequently used in smart devices including smartphones. Fuzzing is a popularly used methodology to find software vulnerabilities. Unfortunately, fuzzing itself is not much effective in such format-strict environments as media services. In this paper, we propose a file format-aware fuzzing in order to efficiently detect vulnerabilities of media server daemon. We acquired a remote arbitrary code execution vulnerability on iOS/tvOS/MacOS/watchOS, and we verified the effectiveness by comparing our methodology with the fuzzers FileFuzz and ZZUF.

Test on the Security and Performance on the Basis of the Access Control Policy Implemented by Secure OS (안전한 운영체제 접근제어 정책에 대한 보안성 및 성능 시험)

  • Kim, Jeong-Nyeo;Sohn, Sung-Won;Lee, Chelo-Hoon
    • The KIPS Transactions:PartD
    • /
    • v.10D no.5
    • /
    • pp.773-780
    • /
    • 2003
  • SecuROS(Secure & Reliable Operating System) prevents and blocks possible system cracking by implementing additional security functions in FreeBSD 4.3 operating system (OS) kernel, including access control, user authentication, audit trail, encryption file system and trusted channel. This paper describes access control technique, which is one of core technologies of SecuROS, introduces the implementations of DAC, MAC and RBAC, all of which are corresponding access control policies, and show security and results of performance measurement on the basis of application of access control policies. Finally, security and performance between conventional OS environment and environment adopting access control policy is described.

A study of image processing by using "Core Image" ("코어 이미지(Core Image)"를 이용한 실시간 이미지 프로세싱에 대한 연구)

  • Seo, June-Seok;Noh, Seung-Seok;Park, Jin-Wan;Seo, Myeong-Seok
    • 한국HCI학회:학술대회논문집
    • /
    • 2007.02b
    • /
    • pp.249-255
    • /
    • 2007
  • 컴퓨터 하드웨어 및 소프트웨어의 발전으로 그래픽 처리 기술은 날로 발전을 거듭하고 있으며 하드웨어의 기능을 최대한 이끌어내기 위한 소프트웨어 기술 또한 발전하고 있다. 이러한 발전으로 인하여 다양한 영상처리 분야에서 빠른 이미지 프로세싱이 가능하게 되었지만 빠른 이미지 프로세싱 능력에도 불구하고 프로그래밍 기술은 기존 것을 고수하고 있다. 일반적으로 사용해오던 기술은 높은 프로그래밍 지식을 필요로 하는 분야였고 이러한 이유로 이미지 프로세싱 기법을 전문적인 프로그래밍 지식이 부족한 예술계의 사용자가 이용하는 데에는 어려움이 있었다. 이러한 문제점을 해결하고 이미지 하드웨어 및 소프트웨어의 효율적인 사용 환경을 위하여 Apple사에서 OpenGL과 Objective-C를 이용한 좀더 간단한 이미지 프로세싱 기법인 코어 이미지(Core Image)를 개발하였다. OS와 어플리케이션 상에서 빠른 이미지 프로세싱을 위해 개발된 코어 이미지는 기존의 이미지 프로세싱 기법에서 복잡한 형태의 프로그래밍을 요했던 것과는 달리, 여러 이미지 프로세싱 기법을 간단한 플러그인 형태로 지원한다. 예술적인 측면에서 다양한 이미지 프로세싱 기법을 보다 손쉽게 사용할 수 있으며 사용 방법 또한 간단하여 전문적인 프로그램 지식이 부족한 일반 사용자도 예술적인 측면에서 이미지 프로세싱 기술을 쉽게 접목할 수 있도록 구성되어 있다. 하지만 코어 이미지가 국내에서는 소수의 사용자만이 이용하는 Mac OS에서만 사용 가능한 프로세싱 기술이라는 문제점 또한 지니고 있다. 본 논문에서는 코어 이미지의 개념과 구동 원리 및 실제 예술 작품에 적용된 사례를 분석하고, 이를 통하여 다양한 분야에서의 코어 이미지의 가능성에 대하여 전망해 본다.

  • PDF

Design and Implementation of a Virtual MCU Based on SystemC to Provide the Implementation Environment of MAC Layer Software (MAC 계층 소프트웨어의 구현 환경을 제공하기 위한 SystemC 기반의 가상 MCU 모듈의 설계 및 구현)

  • Jeong, Yoo-Jin;Park, Soo-Jin;Lee, Ho-Eung;Park, Hyun-Ju
    • Journal of Internet Computing and Services
    • /
    • v.10 no.6
    • /
    • pp.7-17
    • /
    • 2009
  • The development of wireless communication MAC layer is usually released as SoC which is a combination in hardware and software. In this system development environment, an environment for software development and verification is necessary because the hardware development takes a lot of time priori to completion. In integrated development of hardware and software, simulation environment of hardware and software provided by hardware modeling using HDL at RTL and ISS respectively. By increasing the development complexity of system, ESL design modeling systems at higher abstraction level than RTL has already prompted. The ESL design is divided untime model and time model. This paper present design and implementation of MCU for untime model simulation, not time model. Proposed MCU can optimize the system at early step of system development and move up the development completion time by verifying the system function easily and rapidly than part required exact time in untime model. In this paper, we present an MCU module based on SystemC and UC/OS-II Module providing real-time operate system.

  • PDF

Development of Sensor and Block expandable Teaching-Aids-robot (센서 및 블록 확장 가능한 교구용 보조 로봇 개발)

  • Sim, Hyun;Lee, Hyeong-Ok
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.2
    • /
    • pp.345-352
    • /
    • 2017
  • In this paper, we design and implement an educational robot system that can use scratch education with the function of user demanding to perform robot education in actual school site in an embedded environment. It is developed to enable physical education for sensing information processing, software design and programming practice training that is the basis of robotic system. The development environment of the system is Arduino Uno based product using Atmega 328 core, debugging environment based on Arduino Sketch, firmware development language using C language, OS using Windows, Linux, Mac OS X. The system operation process receives the control command of the server using the Bluetooth communication, and drives various sensors of the educational robot. The curriculum includes Scratch program and Bluetooth communication, which enables real-time scratch training. It also provides smartphone apps and is designed to enable education like C and Python through expansion. Teachers at the school site used the developed products and presented performance processing results satisfying the missionary needs of the missionaries.

Implementation and performance evaluation of PIPO lightweight block ciphers on the web (웹상에서의 PIPO 경량 블록암호 구현 및 성능 평가)

  • Lim, Se-Jin;Kim, Won-Woong;Kang, Yea-Jun;Seo, Hwa-Jeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.5
    • /
    • pp.731-742
    • /
    • 2022
  • PIPO is the latest domestic lightweight block cipher announced in ICISC'20, which is characterized by being lightweight to facilitate implementation on IoT with limited resources. In this paper, PIPO 64/128-bit and 64/256-bit were implemented using web-based languages such as Javascript and WebAsembly. Two methods of performance evaluation were conducted by implementing bitsice and TLU, and the performance was compared by implementing Looped written using for statements and Unrolled written for statements. It performs performance evaluations in various web browsers such as Google Chrome, Mozilla Firefox, Opera, and Microsoft Edge, as well as OS-specific environments such as Windows, Linux, Mac, iOS, and Android. In addition, a performance comparison was performed with PIPO implemented in C language. This can be used as an indicator for applying PIPO block cipher on the web.

Design of Tour Guide System using Bluetooth 4.0 and WiFi Sensor Technology (블루투스4.0과 WiFi 센서 기술을 이용한 관광안내 시스템 설계)

  • Kim, Hee-Sook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.10
    • /
    • pp.6888-6894
    • /
    • 2015
  • Bluetooth 4.0 is the most appropriate technology for Internet of Things, which can be used to enhance and expand the existing areas and areas with a variety of applications. In this paper, an example of the services of the Internet of Things, we developed a tour guide system using the Bluetooth 4.0 and WiFi sensor technology. iBeacon-based push service have been limited to iOS smart phone series, non-iOS family and lower version of iOS 6 smart phones can not receive push-based services. This paper proposed in iBeacon and WiFi sensor is more than tourists, while maintaining the existing system (non-iOS smartphone users) can provide the service to you. Service tourist information as well as that can provide the advertising associated with the service. With 10 kinds of smart phones used in Korea was the experiment on the MAC information collected. This experiment is to track the behaviour of tourists in history can provide customized services can be based. Tourist destinations as well as amusement parks, resorts, etc. If you want to apply this system in a crowded place for user behavior information-gathering feature views over the a prevention of a missing child features such as notifications, risk, prevention is possible for a variety of applications.