• Title/Summary/Keyword: memory corruption

Search Result 15, Processing Time 0.018 seconds

Modification of the V-PASS Storage Structure for Precise Analysis of Maritime Vessel Accident (해양사고 정밀분석을 위한 V-PASS 저장구조 개선 연구)

  • Byung-Gil Lee;Dong-Hol Kang;Ki-Hyun Jyung
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2023.05a
    • /
    • pp.98-99
    • /
    • 2023
  • In the maritime digital forensic part, it is very important and difficult process that analysis of data and information with vessel navigation system's binary log data for situation awareness of maritime accident. In recent years, analysis of vessel's navigation system's trajectory information is an essential element of maritime accident investigation. So, we made an experiment about corruption with various memory device in navigation system. The analysis of corruption test in seawater give us important information about the valid pulling time of sunken ship for acquirement useful trajectory information.

  • PDF

A Design of Temperature Management System for Preventing High Temperature Failures on Mobility Dedicated Storage (모빌리티 전용 저장장치의 고온 고장 방지를 위한 온도 관리 시스템 설계)

  • Hyun-Seob Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.10 no.2
    • /
    • pp.125-130
    • /
    • 2024
  • With the rapid growth of mobility technology, the industrial sector is demanding storage devices that can reliably process data from various equipment and sensors in vehicles. NAND flash memory is being utilized as a storage device in mobility environments because it has the advantages of low power and fast data processing speed as well as strong external shock resistance. However, flash memory is characterized by data corruption due to long-term exposure to high temperatures. Therefore, a dedicated system for temperature management is required in mobility environments where high temperature exposure due to weather or external heat sources such as solar radiation is frequent. This paper designs a dedicated temperature management system for managing storage device temperature in a mobility environment. The designed temperature management system is a hybrid of traditional air cooling and water cooling technologies. The cooling method is designed to operate adaptively according to the temperature of the storage device, and it is designed not to operate when the temperature step is low to improve energy efficiency. Finally, experiments were conducted to analyze the temperature difference between each cooling method and different heat dissipation materials, proving that the temperature management policy is effective in maintaining performance.

Microarchitectural Defense and Recovery Against Buffer Overflow Attacks (버퍼 오버플로우 공격에 대한 마이크로구조적 방어 및 복구 기법)

  • Choi, Lynn;Shin, Yong;Lee, Sang-Hoon
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.3
    • /
    • pp.178-192
    • /
    • 2006
  • The buffer overflow attack is the single most dominant and lethal form of security exploits as evidenced by recent worm outbreaks such as Code Red and SQL Stammer. In this paper, we propose microarchitectural techniques that can detect and recover from such malicious code attacks. The idea is that the buffer overflow attacks usually exhibit abnormal behaviors in the system. This kind of unusual signs can be easily detected by checking the safety of memory references at runtime, avoiding the potential data or control corruptions made by such attacks. Both the hardware cost and the performance penalty of enforcing the safety guards are negligible. In addition, we propose a more aggressive technique called corruption recovery buffer (CRB), which can further increase the level of security. Combined with the safety guards, the CRB can be used to save suspicious writes made by an attack and can restore the original architecture state before the attack. By performing detailed execution-driven simulations on the programs selected from SPEC CPU2000 benchmark, we evaluate the effectiveness of the proposed microarchitectural techniques. Experimental data shows that enforcing a single safety guard can reduce the number of system failures substantially by protecting the stack against return address corruptions made by the attacks. Furthermore, a small 1KB CRB can nullify additional data corruptions made by stack smashing attacks with only less than 2% performance penalty.

Gloria Naylor's Linden Hills: A Tragic Saga of the Oppressive "Primal Scene" and Deformed "Family Romance" (글로리아 네일러의 『린덴 힐즈』 -억압적 '원장면'과 왜곡된 '가족 로맨스'의 비극)

  • Hwangbo, Kyeong
    • Journal of English Language & Literature
    • /
    • v.58 no.1
    • /
    • pp.21-42
    • /
    • 2012
  • Gloria Naylor's second novel Linden Hills (1985) explores the issues of self-exploration, empowerment, history, and memory by delineating the communal and familial tragedies and the distortion of values prevalent in a prosperous African-American urban community called Linden Hills. Drawing upon the Freud's concept of "primal scene" and "family romance," this paper aims to focus upon the Nedeed family, the founder of Linden Hills, and investigate the compelling traumatogenic force within the family, which is inseparably intertwined with the inversion of values and moral corruption permeating the entire community. The "primal crime" committed by the Nedeed ancestors serves to preserve and perpetuate a tyrannical rule by ruthless patriarchs who reign by underhanded strategies of purposefully neglecting and abusing others, including their own wives. The imprisonment, by Luther Nedeed, of his wife Willa in the family morgue epitomizes the long legacy running in the family-the oppression and burial of the pre-Oedipal, maternal history. Willa's accidental encounter, at the nadir of the family estate and her personal despair, with the faded records of the forgotten and abused Nedeed women exposes the violence-ridden ground of the family's primal scene and the absurdity of family romance the Nedeeds pursued. As the several lines of poem composed by Willie, Willa's male double, show, the hidden, forgotten history of the Nedeed women, in a sense, is the real, which cannot be assimilated to the social symbolic governed by the inhumane patriarchy of the Nedeed family and the success-oriented Linden Hills society. By portraying a catastrophic downfall of the Nedeed family and the futile outcome of its family romance, the ending of Linden Hills conveys implicitly that the contingent symbolic order and its oppressive control, however solid and invincible they may seem, can be toppled down by the real, its nameless forgotten Other.

A Study on 'Seungininsangmu' of Haejugwonbeon (<성인인상무>에 대한 연구)

  • Kim, Young-Hee;Kim, Kyung-Sook
    • (The) Research of the performance art and culture
    • /
    • no.35
    • /
    • pp.93-123
    • /
    • 2017
  • The Buddhist dance, which is considered to be the essence of Korean folk dance, has changed and developed over many years, having profound influential relations with Buddhism in terms of its origin, source, title, and costumes. Today the Buddhist dance is performed in two fixed types, Jangsam dance and Buk dance, but it is estimated that there must have been various forms of Buddhist dance during the Japanese rule based on the its historicity and various origination theories. It was around 1940 that Jang Yang-seon, the master of Haejugwonbeon, turned 'Seungininsangmu' into a work through Yang So-woon. The present study analyzed the video of 'Seungininsangmu' performed at the 'Performance in the Memory of Yang So-woon' in 2010, and the analysis results were as follows: first, the dance has a clear message to be delivered in its title and connotes an origination theory of Buddhist dance, which argues that the Buddhist dance was created by a Buddhist that underwent agony and corruption during his ascetic practice and later returned to Buddhism. Secondly, the process of Jangsam dance - Buknori - Bara dance - Heoteun dance - Hoisimgok - Guiui shows the thematic consciousness of the dance clearly in a sequential manner. Finally, the dance was in a form of combining various expressive methods according to the story and its development including the Bara dance, a dance performed in a Buddhist ceremony, the Heoteun dance, which is strongly characterized by individuality and spontaneity that are folk features, and Hoisimgok, the Buddhist music. Those findings indicate that the dance reflected well the flow of putting the Buddhist dance on the stage or turning it into a work in the early 20th century. Compared with the types of Buddhist dance in a strong form including the Jangsam dance and Buk dance, 'Seungininsangmu' conveys the meanings that the original Buddhist dance tried to express in terms of content and reflects on the diversity of combined Akgamu and theatrical elements in terms of form. The present study is significant in that it offers many implications for the Buddhist dance capable of future-oriented development.