• Title/Summary/Keyword: memory protection

Search Result 157, Processing Time 0.025 seconds

Companies Entering the Metabus Industry - Major Big Data Protection with Remote-based Hard Disk Memory Analysis Audit (AUDIT) System

  • Kang, Yoo seok;Kim, Soo dong;Seok, Hyeonseon;Lee, Jae cheol;Kwon, Tae young;Bae, Sang hyun;Yoon, Seong do;Jeong, Hyung won
    • Journal of Integrative Natural Science
    • /
    • v.14 no.4
    • /
    • pp.189-196
    • /
    • 2021
  • Recently, as a countermeasure for cyber breach attacks and confidential leak incidents on PC hard disk memory storage data of the metaverse industry, it is required when reviewing and developing a remote-based regular/real-time monitoring and analysis security system. The reason for this is that more than 90% of information security leaks occur on edge-end PCs, and tangible and intangible damage, such as an average of 1.20 billion won per metaverse industrial security secret leak (the most important facts and numerical statistics related to 2018 security, 10.2018. the same time as responding to the root of the occurrence of IT WORLD on the 16th, as it becomes the target of malicious code attacks that occur in areas such as the network system web due to interworking integration when building IT infrastructure, Deep-Access-based regular/real-time remote. The concept of memory analysis and audit system is key.

Efficiency Improvement of Digital Protective Relay for Power Transformer Using DMA Controller of DSP (DSP의 DMA 제어기를 이용한 변압기용 디지털 보호계전기의 성능향상)

  • 권기백;서희석;신명철
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.52 no.11
    • /
    • pp.647-654
    • /
    • 2003
  • As electrical power system has become complicated and enlarged to cope with the increasing electric demand, it has to be expected that higher speed, higher reliability, higher function and higher arithmetic ability in protective relay should be realized. Therefore, in this papers, by hardware design and implementation used DMA controller that transfer blocks of data to any location in the memory map without interfering with CPU operation, CPU utilization is increased effectively, as a result it made possible to implement multi-function digital protective relay which has high trust and high function of protection as well as control and metering for power transformers using single processor(DSP).

An Optimal Scrubbing Scheme for Protection of Memory Devices against Soft Errors (메모리 소자의 소프트 에러 극복을 위한 최적 스크러빙 방안)

  • Ryu, Sang-Moon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.677-680
    • /
    • 2011
  • Error detection and correcting codes are typically used to protect against soft errors. In addition, scrubbing is applied which is a fundamental technique to avoid the accumulation of soft errors. This paper introduces an optimal scrubbing scheme, which is suitable for a system with auto error detection and correction logic. An auto error detection and correction logic can correct soft errors without CPU's writing operation. The proposed scrubbing scheme leads to maximum reliability by considering both allowable scrubbing load and the periodic accesses to memory by the tasks running in the system.

  • PDF

UTrustDisk: An Efficient Data Protection Scheme for Building Trusted USB Flash Disk

  • Cheng, Yong;Ma, Jun;Ren, Jiangchun;Mei, Songzhu;Wang, Zhiying
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.4
    • /
    • pp.2276-2291
    • /
    • 2017
  • Data protection of removable storage devices is an important issue in information security. Unfortunately, most existing data protection mechanisms are aimed at protecting computer platform which is not suitable for ultra-low-power devices. To protect the flash disk appropriately and efficiently, we propose a trust based USB flash disk, named UTrustDisk. The data protection technologies in UTrustDisk include data authentication protocol, data confidentiality protection and data leakage prevention. Usually, the data integrity protection scheme is the bottleneck in the whole system and we accelerate it by WH universal hash function and speculative caching. The speculative caching will cache the potential hot chunks for reducing the memory bandwidth pollution. We adopt the symmetric encryption algorithm to protect data confidentiality. Before mounting the UTrustDisk, we will run a trusted virtual domain based lightweight virtual machine for preventing information leakage. Besides, we prove formally that UTrustDisk can prevent sensitive data from leaking out. Experimental results show that our scheme's average writing throughput is 44.8% higher than that of NH scheme, and 316% higher than that of SHA-1 scheme. And the success rate of speculative caching mechanism is up to 94.5% since the access pattern is usually sequential.

A Study on the Improvement of the Method for Implementing Protection Algorithm by using Component Object Model(COM) (컴포넌트 오브젝트 모델을 응용한 계전 알고리즘 구현방법의 개선에 관한 연구)

  • Park, In-Kwon;Yoon, Nam-Seon;An, Bok-Shin
    • Proceedings of the KIEE Conference
    • /
    • 1998.07c
    • /
    • pp.1210-1212
    • /
    • 1998
  • The complexity of newly developed protection algorithm and higher performance requested by the user makes the software embedded in the protective relay much harder to develop and maintain. The versatility of 32bit microprocessor and the availability of cheaper memory semiconductors introduced the fertile developing background for the protective relay developers. The use of component object model(COM) in the software developing process enables the developer to write much complex code in the easy and safe way and to maintain the code easily, too. And the aid of the COM library, the distributed computing environment will be expected to appear by the use of the COM programming model in the protective relay firmware program.

  • PDF

Design of a Voting Mechanism considering Safety for NMR PPC Using EPLD and Reliability Analysis (EPLD를 이용한 안전성이 고려된 NMR PPC의 보팅메카니즘 설계와 신뢰도 분석)

  • Ryoo, Dong-Wan;Park, Heui-Youn;Koo, In-Soo;Seo, Bo-Hyeok
    • Proceedings of the KIEE Conference
    • /
    • 2000.07d
    • /
    • pp.2557-2560
    • /
    • 2000
  • The protection system of the nuclear reactor and chemical reactor are representative of PPC(Plant Protection Controller). This PPC must be designed based on reliability as well as concept of safety, which is a failed system go a way of safe. PPC is consist of part of data acquisition, calculator, communication with redundancy, and a voter is important factor of reliability. Because it is serial connected. This paper presents a Design and Analysis of a Voting Mechanism considering Safety for NMR PPC Using EPLD. In the case of digital implementation a coincidence logic(voter) of PPC, it needs CPU and memory, so increase a number of units. Therefore the failure rate and cost is increased. On the contrary when it is designed EPLD or FPGA.

  • PDF

Liriopis Tuber improves stress-induced memorial impairments in rats (구속 스트레스로 유발된 기억 손상에 대한 맥문동(麥門冬)의 신경보호 효능)

  • Kang, Young-Gun;Lee, Tae-Hee
    • The Korea Journal of Herbology
    • /
    • v.21 no.2
    • /
    • pp.63-75
    • /
    • 2006
  • Objectives : We investigated the effects of Liriopis Tuber on the nervous protection. Methods : We measured the reaction behavior with EPM(Elevated Plus Maxe) and MWM(Morris Water Maze) after applying restraint stress to rats. Also, the degrees of AchE generation were measured with immunohistochemical method in the regions of hippocampus, and the degree of TH generation in the regions of VTA and LC, respectively. Results : 1. As the results of measuring how long EPM which reflects anxiety reaction stayed in the open arm, there was the trend which can suppress anxiety reaction in the MMD+stress group(Liriopis Tuber+stress) but no statistical significance. The counting results how many EPM passed between opened and closed arm showed suppression trend against a physical activity in the saline+stress group but there was no statistical significance. 2. According to the result of MWM, the saline+stress group showed the learning retardation which means increased time arriving at goal compared to ti1e normal group at the second and third day of measurement. On the contrary, a learning retardation was significantly decreased in the MMD+stress group. Among the probe trial test a memory loss occurred in the saline+stress group, meanwhile memory ability was notably increased in the saline-stress group. 3. The degree of TH generation was investigated at the VTA and LC respectively after test animals treated with drug. In the saline+stress group, TH-immunoreactive cells were significantly increased, and these stress-induced TH increases were suppressed in the saline+stress group at the VTA region. However, the saline+stress group did not show any significant difference. 4. the degree of AchE generation was investigated at the CA3 of hippocampus. The saline+stress group showed that AchE-immunoreactive cells were significantly decreased. Those stress-induced reductions of AchE cells were meaningfully recovered in the saline+stress group. Although the cells showed recovery trend in the region of CA1 of hippocampus, statistical significance was not observed. Conclusion : The results of our study indicate that Liriopis Tuber can improve spatial memory ability of rats applied a restraint stress. This improvement of the spatial memory ability is considered to have an efficacy of nervous protection that Liriopis Tuber suppresses the generation of AchE in the hippocampus region and enhances the generation of TH in the VTA.

  • PDF

Graceful Degradation FEC Layer for Multimedia Broadcast/Multicast Service in LTE Mobile Systems

  • Won, Seok Ho
    • ETRI Journal
    • /
    • v.35 no.6
    • /
    • pp.1068-1074
    • /
    • 2013
  • This paper proposes an additional forward error correction (FEC) layer to compensate for the defectiveness inherent in the conventional FEC layer in the Long Term Evolution specifications. The proposed additional layer is called a graceful degradation (GD)-FEC layer and maintains desirable service quality even under burst data loss conditions of a few seconds. This paper also proposes a non-delayed decoding (NDD)-GD-FEC layer that is inherent in the decoding process. Computer simulations and device-based tests show a better loss recovery performance with a negligible increase in CPU utilization and occupied memory size.

Statistical Analysis of Lightning-Induced Voltages on Subscriber Telecommunication Lines in Korea

  • Oh, Ho-Seok;Park, Dong-Chul
    • Journal of electromagnetic engineering and science
    • /
    • v.8 no.4
    • /
    • pp.148-152
    • /
    • 2008
  • This paper describes the characteristics of lightning-induced voltages on subscriber telecommunication lines in Korea. Lightning parameters such as peak voltage, rise time, decay time, and steepness of the wave front were statistically analyzed from the measured results obtained using a waveform memory system. An induced voltage measurement system was also developed and installed at 286 sites in Korea to collect the induced voltage data. The distributions of lightning-induced voltages were also analyzed using these data.

Instruction-corruption-less Binary Modification Mechanism for Static Stack Protections (이진 조작을 통한 정적 스택 보호 시 발생하는 명령어 밀림현상 방지 기법)

  • Lee, Young-Rim;Kim, Young-Pil;Yoo, Hyuck
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.1
    • /
    • pp.71-75
    • /
    • 2008
  • Many sensor operating systems have memory limitation constraint; therefore, stack memory areas of threads resides in a single memory space. Because most target platforms do not have hardware MMY (Memory Management Unit), it is difficult to protect each stack area. The method to solve this problem is to exchange original stack handling instructions in binary code for wrapper routines to protect stack area. In this exchanging phase, instruction corruption problem occurs due to difference of each instruction length between stack handling instructions and branch instructions. In this paper, we propose the algorithm to call a target routine without instruction corruption problem. This algorithm can reach a target routine by repeating branch instructions to have a short range. Our solution makes it easy to apply security patch and maintain upgrade of software of sensor node.