• Title/Summary/Keyword: memory protection

Search Result 157, Processing Time 0.032 seconds

An Implementation of Mondriaan Memory Protection (몬드리안 메모리 프로텍션의 구현)

  • Kam, Keun-Jin;Lee, In-Hwan
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10a
    • /
    • pp.276-280
    • /
    • 2006
  • 몬드리안 메모리 프로텍션(Mondriaan Memory Protection)은 워드 단위까지 접근 권한 설정을 제공하는 메모리 보호 개념으로, 프로세서에서 요청하는 주소에 대하여 올바른 접근 권한을 가지고 있는지 검사한다. 기존 프로세서의 명령어 셋에 대한 추가 또는 변경과 프로그램 소스의 변경이 필요 없으면서도, 프로그래머 또는 사용자에 의해서 생길 수 있는 잘못된 메모리 접근을 원천적인 방법으로 방지할 수 있다. 본 논문에서는 몬드리안 메모리 프로텍션을 마이크로프로세서를 이용한 실제 하드웨어로 구현 하면서 발생 되는 고려 사항과 문제점에 대하여 짚어보고, 그 해결책을 제시하였다.

  • PDF

A "Prime and Deploy" Strategy for Universal Influenza Vaccine Targeting Nucleoprotein Induces Lung-Resident Memory CD8 T cells

  • Haerynn Chung;Eun-Ah Kim;Jun Chang
    • IMMUNE NETWORK
    • /
    • v.21 no.4
    • /
    • pp.28.1-28.14
    • /
    • 2021
  • Lung-resident memory T cells (TRM) play an essential role in protecting against pulmonary virus infection. Parenteral administration of DNA vaccine is generally not sufficient to induce lung CD8 TRM cells. This study investigates whether intramuscularly administered DNA vaccine expressing the nucleoprotein (NP) induces lung TRM cells and protects against the influenza B virus. The results show that DNA vaccination poorly generates lung TRM cells and massive secondary effector CD8 T cells entering the lungs after challenge infection do not offer sufficient protection. Nonetheless, intranasal administration of non-replicating adenovirus vector expressing no Ag following priming DNA vaccination deploys NP-specific CD8 TRM cells in the lungs, which subsequently offers complete protection. This novel 'prime and deploy' strategy could be a promising regimen for a universal influenza vaccine targeting the conserved NP Ag.

Separation of Kernel Space and User Space in Zephyr Kernel (Zephyr 커널에서 커널 공간과 사용자 공간의 분리 구현)

  • Kim, Eunyoung;Shin, Dongha
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.13 no.4
    • /
    • pp.187-194
    • /
    • 2018
  • The operating system for IoT should have a small memory footprint and provide low power state, real-time, multitasking, various network protocols, and security. Although the Zephyr kernel, an operating system for IoT, released by the Linux Foundation in February 2016, has these features but errors generated by the user code can generate fatal problems in the system because the Zephyr kernel adopts a single-space method that both the user code and kernel code execute in the same space. In this research, we propose a space separation method, which separates kernel space and user space, to solve this problem. The space separation that we propose consists of three modifications in Zephyr kernel. The first is the code separation that kernel code and user code execute in each space while using different stacks. The second is the kernel space protection that generates an exception by using the MPU (Memory Protection Unit) when the user code accesses the kernel space. The third is the SVC based system call that executes the system call using the SVC instruction that generates the exception. In this research, we implemented the space separation in Zephyr v1.8.0 and evaluated safety through abnormal execution of the user code. As the result, the kernel was not crashed by the errors generated by the user code and was normally executed.

Adaptive Protection Algorithm for Overcurrent Relay in Distribution System with DG

  • Sung, Byung Chul;Lee, Soo Hyoung;Park, Jung-Wook;Meliopoulos, A.P.S.
    • Journal of Electrical Engineering and Technology
    • /
    • v.8 no.5
    • /
    • pp.1002-1011
    • /
    • 2013
  • This paper proposes the new adaptive protection algorithm for inverse-time overcurrent relays (OCRs) to ensure their proper operating time and protective coordination. The application of the proposed algorithm requires digital protection relays with microcontroller and memory. The operating parameters of digital OCRs are adjusted based on the available data whenever system conditions (system with distributed generation (DG)) vary. Moreover, it can reduce the calculation time required to determine the operating parameters for achieving its purpose. To verify its effectiveness, several case studies are performed in time-domain simulation. The results show that the proposed adaptive protection algorithm can keep the proper operating time and provide the protective coordination time interval with fast response.

A Protection Technique for Kernel Functions under the Windows Operating System (윈도우즈 운영체제 기반 커널 함수 보호 기법)

  • Back, Dusung;Pyun, Kihyun
    • Journal of Internet Computing and Services
    • /
    • v.15 no.5
    • /
    • pp.133-139
    • /
    • 2014
  • Recently the Microsoft Windows OS(operating system) is widely used for the internet banking, games etc. The kernel functions provided by the Windows OS can perform memory accesses, keyboard input/output inspection, and graphics output of any processes. Thus, many hacking programs utilizes those for memory hacking, keyboard hacking, and making illegal automation tools for game programs. Existing protection mechanisms make decisions for existence of hacking programs by inspecting some kernel data structures and the initial parts of kernel functions. In this paper, we point out drawbacks of existing methods and propose a new solution. Our method can remedy those by modifying the system service dispatcher code. If the dispatcher code is utilized by a hacking program, existing protection methods cannot detect illegal operations. Thus, we suggest that protection methods should investigate the modification of the dispatcher code as well as kernel data structures and the initial parts of kernel functions.

Effect of Diethyldithiocarbamate on Radiation-induced Learning and Memory Impairment in Mouse (방사선 유도 학습기억 장애에 대한 diethyldithiocarbamate의 효과)

  • Jang, Jong-Sik;Kim, Jong-Choon;Moon, Chang-Jong;Jung, U-Hee;Jo, Sung-Kee;Kim, Sung-Ho
    • Journal of Radiation Protection and Research
    • /
    • v.37 no.3
    • /
    • pp.123-128
    • /
    • 2012
  • Evidence suggests that even low-dose irradiation can lead to progressive cognitive decline and memory deficits, which implicates, in part, hippocampal dysfunction in both humans and experimental animals. This study examined whether diethyldithiocarbamate (DDC) could attenuate memory impairment, using passive avoidance and object recognition test, and suppression of hippocampal neurogenesis, using the TUNEL assay and immunohistochemical detection with markers of neurogenesis (Kiel 67 (Ki-67) and doublecortin (DCX)) in adult mice treated with gamma radiation (0.5 or 2 Gy). DDC was administered intraperitonially at a dosage of 1,000 $mg{\cdot}kg^{-1}$ of body weight at 30 min. before irradiation. In passive avoidance and object recognition memory test, the mice, trained for 1 day after acute irradiation (2 Gy) showed significant memory deficits compared with the sham controls. The number of TUNEL-positive apoptotic nuclei in the dentate gyrus (DG) was increased 12 h after irradiation. In addition, the number of Ki-67- and DCX-positive cells were significantly decreased. DDC treatment prior to irradiation attenuated the memory defect, and blocked the apoptotic death. DDC may attenuate memory defect in a relatively low-dose exposure of radiation in adult mice, possibly by inhibiting a detrimental effect of irradiation on hippocampal neurogenesis.

A detection mechanism for Jump-Oriented Programming at binary level (바이너리 수준에서의 Jump-Oriented Programming에 대한 탐지 메커니즘)

  • Kim, Ju-Hyuk;Lee, Yo-Ram;Oh, Soo-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1069-1078
    • /
    • 2012
  • It is known that memory has been frequently a target threatening the computer system's security while attacks on the system utilizing the memory's weakness are actually increasing. Accordingly, various memory protection mechanisms have been studied on OS while new attack techniques bypassing the protection systems have been developed. Especially, buffer overflow attacks have been developed as attacks of Return to Library or Return-Oriented Programing and recently, a technique bypassing the countermeasure against Return-Oriented Programming proposed. Therefore, this paper is intended to suggest a detection mechanism at binary level by analyzing the procedure and features of Jump-Oriented Programming. In addition, we have implemented the proposed detection mechanism and experimented it may efficiently detect Jump-Oriented Programming attack.

The study for High Availability of HVDC Control and Protection system using memory database. (메모리 DB를 이용한 HVDC Control and Protection 시스템 이중화에 관한 고찰)

  • Sua, M.W.
    • Proceedings of the KIPE Conference
    • /
    • 2013.11a
    • /
    • pp.241-242
    • /
    • 2013
  • 본 논문에서는 메모리 데이터 베이스를 사용하여 초고압 송전 설비의 제어 및 보호 장치의 데이터 이중화 기법에 대해 고찰 하고자 한다. 초고압 송전 설비는 항시 전력을 공급해야 하므로 제어 및 보호 장치의 이중화는 선택이 아닌 필수라 할 수 있겠다. 이중화 기법중에서 메모리 데이터 베이스를 이용한 고속 데이터 이중화 기법에 관해 고찰 하고자 한다. 메모리 데이터 베이스를 이용하는 방법 이외에도 여러 이중화 방법이 있으나 메모리 데이터 베이스를 이용하면 여러가지 장점을 지니고 있어 편리한 데이터 이중화 구현이 가능 하다.

  • PDF

Loop Selective Direction Measurement for Distance Protection

  • Steynberg, Gustav;Koch, Geyhard
    • Journal of Electrical Engineering and Technology
    • /
    • v.1 no.4
    • /
    • pp.423-426
    • /
    • 2006
  • Distance relays achieve selective tripping by measurement of all short circuit fault conditions inside set reaches. The direction of the fault, forward or reverse is commonly determined with a dedicated measurement to ensure selectivity under all conditions. For the direction decision (measurement) a number of alternatives are available. This paper describes a loop selective direction measurement and illustrates by means of a typical fault why this is superior to a non loop selective direction measurement such as that based on negative sequence quantities.

Availability Analysis of Xilinx 7-Series FPGA against Soft Error (Xilinx 7-Series FPGA의 소프트 에러에 대한 가용성 분석)

  • Ryu, Sang-Moon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.655-658
    • /
    • 2016
  • Xilinx 7-Series FPGA(Field Programmable Gate Array)s mainly used for the implementation of high-performance digital circuit have SRAM-type configuration memory and can malfunction when soft errors occur in their configuration memory. SEM(Soft Error Mitigation Controller) offered by Xilinx helps users mitigate the influence of soft errors in configuration memory. When soft errors occur, SEM Controller can recover the state of FPGA through partial reconfiguration if the soft errors are correctable by ECC(Error Correction Code) and CRC(Cyclic Redundancy Code). This paper presents the availability analysis of Xilinx 7-Series FPGAs against soft errors under the protection of the SEM Controller. Availability functions are derived and compared according to the correction capability of the SEM Controller. The result may help to estimate the reliability of SRAM-based FPGA running in an environment where soft errors may occur.

  • PDF