• Title/Summary/Keyword: secure operating system

Search Result 236, Processing Time 0.021 seconds

Implementation of Secure Linux OS based on Kernel (커널 기반의 보안 리눅스 운영체제 구현)

  • 박태규;임연호
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.4
    • /
    • pp.33-43
    • /
    • 2001
  • This paper presents a secure Linux OS in which multi-level security functions are implemented at the kernel level. Current security efforts such as firewall or intrusion detection system provided in application-space without security features of the secure OS suffer from many vulnerabilities. However the development of the secure OS in Korea lies in just an initial state, and NSA has implemented a prototype of the secure Linux but published just some parts of the technologies. Thus our commercialized secure Linux OS with multi-level security kernel functions meets the minimum requirements for TCSEC B1 level as well kernel-mode encryption, real-time audit trail with DB, and restricted use of root privileges.

A Study on Next-Generation Data Protection Based on Non File System for Spreading Smart Factory (스마트팩토리 확산을 위한 비파일시스템(None File System) 기반의 차세대 데이터보호에 관한 연구)

  • Kim, Seungyong;Hwang, Incheol;Kim, Dongsik
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.1
    • /
    • pp.176-183
    • /
    • 2021
  • Purpose: The introduction of smart factories that reflect the 4th industrial revolution technologies such as AI, IoT, and VR, has been actively promoted in Korea. However, in order to solve various problems arising from existing file-based operating systems, this research will focus on identifying and verifying non-file system-based data protection technology. Method: The research will measure security storage that cannot be identified or controlled by the operating system. How to activate secure storage based on the input of digital key values. Establish a control unit that provides input and output information based on BIOS activation. Observe non-file-type structure so that mapping behavior using second meta-data can be performed according to the activation of the secure storage. Result: First, the creation of non-file system-based secure storage's data input/output were found to match the hash function value of the sample data with the hash function value of the normal storage and data. Second, the data protection performance experiments in secure storage were compared to the hash function value of the original file with the hash function value of the secure storage after ransomware activity to verify data protection performance against malicious ransomware. Conclusion: Smart factory technology is a nationally promoted technology that is being introduced to the public and this research implemented and experimented on a new concept of data protection technology to protect crucial data within the information system. In order to protect sensitive data, implementation of non-file-type secure storage technology that is non-dependent on file system is highly recommended. This research has proven the security and safety of such technology and verified its purpose.

Design and Implementation of an Enhanced Secure Android-Based Smartphone using LIDS

  • Lee, Sang Hun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.3
    • /
    • pp.49-55
    • /
    • 2012
  • Recently, with the rapid development of android-based smartphones, it is becomes a major security issue that the case of Android platform is an open platform. so it is easy to be a target of mobile virus penetration and hacking. Even there are a variety of security mechanisms to prevent the vulnerable points of the Android platform but the reason of most of the security mechanisms were designed at application-level that highly vulnerable to the attacks directly to the operating system or attacks using the disadvantages of an application's. It is necessary that the complementary of the android platform kernel blocks the kernel vulnerability and the application vulnerability. In this paper, we proposed a secure system using linux-based android kernel applied to LIDS(Linux Intrusion Detection and Defense System) and applied a smart phone with s5pc110 chip. As a result, the unauthorized alteration of the application was prevented with a proposed secure system.

Coordinated Control of SVC and ULTC Considering Reactive Power Compensation Margin (무효전력 보상여유를 고려한 SVC와 ULTC의 협조제어)

  • Moon, Kyeong-Seob;Son, Kwang-Myoung;Lee, Tae-Gi;Lee, Song-Keun;Park, Jong-Keun
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.48 no.4
    • /
    • pp.351-357
    • /
    • 1999
  • This paper proposes the coordinated control of SVC and UTLC at the distribution substation to get larger operating margin of SVC for the voltage stability control by reactive power compensation. In the conventional method, ULTC doesn't respond to the variation of source voltage, so SVC has the entire responsibility for it. It could cause the lack of operating margin of SVC in some condition. It, however, is important to secure an operating margin for the dynamic stability control in emergancy. This paper proposes the coordinated control method that SVC controls the supply voltage and ULTC respond to the SVC compensation valve based on the relation between SVC compensation and ULTC tap position. The numerical simulation verifies that the proposed system could increase the operating margin of SVC compared with the conventional system.

  • PDF

A study on introduction and operation plan of air traffic services operating certification system: Centered on small airfields (항공교통업무증명제도 도입과 운영 방안에 대한 연구: 소규모 비행장을 중심으로)

  • Lim, Jae-Hwan;Kim, Young-Rok;Choi, Yun-Chul
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.25 no.4
    • /
    • pp.154-160
    • /
    • 2017
  • In the former aviation law, only the Ministry of Land, Infrastructure and Transport has to provide air traffic services, In the case of providing aviation transportation service from civilian, such as aviation special education institution, private airfield installer, it was possible to carry out only by receiving a private contract from the government. But at the time of private consignment, the fact that the government has to bear the cost through the contract act. It is pointed out that it is a factor that hinders efficiency in the operation sector. Accordingly, in Article 85 of the Aviation Safety Act, which was enforced in March 2017, legal grounds were established to provide air traffic services excluding the Ministry of Land, Infrastructure and Transport. At the same time, we have introduced the air traffic services operating certification system, which enables the air traffic services to meet the requirements set by the Ministry of Land, Infrastructure and Transport in order to secure the safety of air traffic. In this study, we examine the major issues and problems of the small private control tower operated by the private institute in Korea. The effect of introduction of the air traffic services operating certification system which can introduce all the institutions which do not belong to the control agency in the former aviation law into the institutional system and the operation plan were examined.

Software-based Encryption Pattern Bootstrap for Secure Execution Environment (보안 실행 환경을 위한 소프트웨어 기반의 암호화 패턴 부트스트랩)

  • Choi, Hwa-Soon;Lee, Jae-Heung
    • Journal of IKEEE
    • /
    • v.16 no.4
    • /
    • pp.389-394
    • /
    • 2012
  • Most current systems have ignored security vulnerability concerned with boot firmware. It is highly likely that boot firmware may cause serious system errors, such as hardware manipulations by malicious programs or code, the operating system corruption caused by malicious code and software piracy under a condition of no consideration of security mechanism because boot firmware has an authority over external devices as well as hardware controls. This paper proposed a structural security mechanism based on software equipped with encrypted bootstrap patterns different from pre-existing bootstrap methods in terms of securely loading an operating system, searching for malicious codes and preventing software piracy so as to provide reliability of boot firmware. Moreover, through experiments, it proved its superiority in detection capability and overhead ranging between 1.5 % ~ 3 % lower than other software security mechanisms.

A Study on the Development of Critical Transmission Operating Constraint Prediction (CTOCP) System With High Wind Power Penetration (대규모 풍력발전 계통 연계시 주요 송전망 제약예측시스템 개발에 관한 연구)

  • Hur, Jin
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.29 no.1
    • /
    • pp.86-93
    • /
    • 2015
  • Globally, wind power development is experiencing dramatic growth and wind power penetration levels are increasing. Wind generation is highly variable in time and space and it doesn't guarantee the system reliability and secure system operation. As wind power capacity becomes a significant portion of total generation capacity, the reliability assessment for wind power are therefore needed. At present, this operational reliability assessment is focusing on a generation adequacy perspective and does not consider transmission reliability issues. In this paper, we propose the critical transmission operating constraint prediction(CTOCP) system with high wind power penetration to enhance transmission reliability.

A Selection Methodology for Reliability Allocation Models to Minimize the Operating Cost (운영유지비용을 고려한 신뢰도 할당 모형의 선정)

  • Park, Jong-Hwa;Kim, Ki-Tae;Jeon, Geon-Wook
    • Journal of the military operations research society of Korea
    • /
    • v.35 no.3
    • /
    • pp.31-45
    • /
    • 2009
  • Reliability should be done from the initial stage of development to secure performance and safety of system. To establish and achieve target reliability of a system, reliability should be allocated into the subsystems. In the acquisition and development of a system, frequent failures will cause a negative effect on performing mission and occurs increasing operating cost. This study reviewed and evaluated the existing reliability allocation models using operation and maintenance costs to find the correlation between reliability allocation models and its operating cost. A target system reliability on the diesel engine to be developed for naval vessels is allocated into its subsystem based on the existing reliability allocation models. A selection methodology for reliability allocation models was made to minimize operating cost by using simulation based on the given operating diesel engine data for naval vessels.

A Study on the Improvement for EMU Maintenance System of Urban Transit (도시철도 전동차 유지보수체계의 개선에 관한 연구)

  • Kim, Kyu-Joong;Lee, Keun-Oh
    • Journal of the Korean Society of Safety
    • /
    • v.25 no.1
    • /
    • pp.87-92
    • /
    • 2010
  • Urban transit system must secure fast, safe and reliable transportation capacity as a metropolitan mass transit. For this purpose, it is important to make all the sub-systems (which consist of EMU, power feeding, signaling & telecommunication, railway, platform facility, and control system and so on) work well. To operate all the systems effectively and reliably, a maintenance measure optimal to each system's characteristics is needed to be established and executed. So, highly reliable maintenance should be performed. But, EMU maintenance methods suitable to its own model and EMU lines are not yet introduced. This study examined few examples mainly to secure reliability on a maintenance quality in operating method and the features of train maintenance system based on travel distance.

Preventive and Emergency Control of Power System for Transient Stability Enhancement

  • Siddiqui, Shahbaz A.;Verma, Kusum;Niazi, K.R.;Fozdar, Manoj
    • Journal of Electrical Engineering and Technology
    • /
    • v.10 no.1
    • /
    • pp.83-91
    • /
    • 2015
  • This paper presents preventive and emergency control measures for on line transient stability (security) enhancement. For insecure operating state, generation rescheduling based on a real power generation shift factor (RPGSF) is proposed as a preventive control measure to bring the system back to secure operating state. For emergency operating state, two emergency control strategies namely generator shedding and load shedding have been developed. The proposed emergency control strategies are based on voltage magnitudes and rotor trajectories data available through Phasor Measurement Units (PMUs) installed in the systems. The effectiveness of the proposed approach has been investigated on IEEE-39 bus test system under different contingency and fault conditions and application results are presented.