• Title/Summary/Keyword: tizen

Search Result 22, Processing Time 0.013 seconds

Android mobile server using a file-sharing system between other models (안드로이드 모바일서버를 이용한 이 기종간 파일 공유시스템)

  • Huh, Tae-Sang;Park, Sung-Hyun;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.5
    • /
    • pp.1231-1236
    • /
    • 2014
  • Recently, diffusion and proliferation of mobile devices increases, per person n opens for the mobile device era. Mobile devices and OS types of continuously growing trend. More than 80% of market share with Google's Android and Apple's iOS as well as Samsung and Intel is developing TIZEN, Linux and Mobile was the UBUNTU which UBUNTU for Phone, UBUNTU touch, Mozilla 's Firefox OS, Microsoft 's windows mobile and many more OS are ahead of the launch. But different OS can share files between systems or technology is not. Bluetooth or WIFI Direct such technologies are present but can be transferred between compatible devices low, resulting in constraints file types also exist. In this paper, is equipped with a WiFi card in an environment where the Android mobile OS party this model and method for sharing files between different research and can share the file system based on research on.

A Snoop-Based Kernel Introspection System against Address Translation Redirection Attack (메모리 주소 변환 공격을 탐지하기 위한 Snoop기반의 커널 검사 시스템)

  • Kim, Donguk;Kim, Jihoon;Park, Jinbum;Kim, Jinmok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.5
    • /
    • pp.1151-1160
    • /
    • 2016
  • A TrustZone-based rootkit detecting solution using a secure timer ensures the integrity of monitoring system, because ARM TrustZone technology provides isolated environments from a monitored OS against intercepting and modifying invoke commands. However, it is vulnerable to transient attack due to periodic monitoring. Also, Address Translation Redirection Attack (ATRA) cannot be detected, because the monitoring is operated by using the physical address of memory. To ameliorate this problem, we propose a snoop-based kernel introspection system. The proposed system can monitor a kernel memory in real-time by using a snooper, and detect memory-bound ATRA by introspecting kernel pages every context switch of processes. Experimental results show that the proposed system successfully protects the kernel memory without incurring any significant performance penalty in run-time.