• Title, Summary, Keyword: Linux

Search Result 1,465, Processing Time 0.047 seconds

Design and Implementation of Linux-based Integrated Security System(LISS) Using Open Security Tools (공개 보안 도구를 이용한 리눅스 기반 통합 보안 시스템의 설계 및 구현)

  • Jeon, Yong-Hee;Kim, Min-Soo;Jang, Jung-Sook
    • The KIPS Transactions:PartC
    • /
    • v.11C no.4
    • /
    • pp.485-496
    • /
    • 2004
  • The wide spread of Internet makes susceptible to the attacks via communication Web from hackers using the vulnerability of both computer and network systems. In this paper, we design and implement an integrated security system, named as LISS(Linux-based Integrated Security System) in which an integrated security management is possible. This system is based on the open operating system, Linux and consists of open security tools, which is effective in security management of Linux based-servers. We also construct a test-bed in order to testify the performance of the LISS. It is revealed that the implemented system captures all the attack Patterns generated from Network Mapper.

A Source-Level Discovery Methodology for Vulnerabilities of Linux Kernel Variables (리눅스 커널 변수 취약성에 대한 소스레벨 발견 방법론)

  • Ko Kwangsun;Kang Yong-hyeog;Eom Young Ik;Kim Jaekwang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.6
    • /
    • pp.13-25
    • /
    • 2005
  • In these days, there are various uses of Linux such as small embedded systems, routers, and huge servers, because Linux gives several advantages to system developers by allowing to use the open source code of the Linux kernel. On the other hand, the open source nature of the Linux kernel gives a bad influence on system security. If someone wants to exploit Linux-based systems, the attacker can easily do it by finding vulnerabilities of their Linux kernel sources. There are many kinds of existing methods for lading source-level vulnerabilities of softwares, but they are not suitable for finding source-level vulnerabilities of the Linux kernel which has an enormous amount of source code. In this paper, we propose the Onion mechanism as a methodology of finding source-level vulnerabilities of Linux kernel variables. The Onion mechanism is made up of two steps. The Int step is to select variables that may be vulnerable by using pattern matching mechanism and the second step is to inspect vulnerability of each selected variable by constructing and analyzing the system call trees. We also evaluate our proposed methodology by applying it to two well-known source-level vulnerabilities.

Development of New Linux Embedded Intelligent Controller and Remote Monitoring System for Bridge Diagnosis (교량진단을 위한 새로운 Linux 실장 지능형 제어기 및 원격 모니터링 시스템 개발)

  • 박세현;송근영
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.3
    • /
    • pp.526-531
    • /
    • 2003
  • In this paper, we implement embedded Linux intelligent controller and remote monitoring system for Bridge Diagnosis. Embedded controller as the hard core is consisted of 32 bit CPU and is designed to have processing of real time monitoring and FFT for Bridge Diagnosis. The prototype monitoring system can operate with world wide web in GUI environment by Java. Detailed design and functional analysis for monitoring system are performed by systems approach.

Analysis of SCTP API on Linux Kernel 2.6.X (Linux Kernel 2.6.X에서 SCTP API 분석)

  • 민경주;정옥조;강신각
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • /
    • pp.949-952
    • /
    • 2003
  • SCTP is a next generation transmission protocol that is more efficient for large scale data transmission like as multimedia data. SCTP protocol is supported in recent linux kernel 2.6.0-testX. SCTP which is supported in linux kernel 2.6 implemented in lksctp package styles. It is necessary that SCTP API is analyzed and is compared with TCP, UDP protocol. So, in this paper describes the analyzing and testing SCTP API that is supported in linux kernel 2.6.0-testX.

  • PDF

An Onboard Printer Server Based on Embedded Linux (Embedded Linux 기반의 내장형 프린터 서버)

  • Cha, Kyung-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.2
    • /
    • pp.309-314
    • /
    • 2009
  • PC users could experience some inconvenience when they use their PC that was physically connected to network printers shared by other People in the network due to the overload. This paper shows how to resolve this kind of overload problem and established the embedded printer system based on embedded Linux system which performs the printer server in order for any users in the of ice to do printing work more smoothly via current network. It's own capabilities and functions were verified throughout the various tests in practical environment.

Implementation of an Image Board Remote Control System using PDA based on Embedded Linux in Wireless Internet (무선 인터넷 망에서 임베디드 리눅스 기반 PDA를 이용한 영상보드 원격 제어 시스템 구현)

  • Kim, Sung-Yong;Lee, Sang-Min
    • The Journal of Information Systems
    • /
    • v.17 no.1
    • /
    • pp.155-171
    • /
    • 2008
  • This thesis proposed a method that connecting step motor to image send board which can acquire image to move and remote controlling via streaming image board of PDA(personal digital assistant) based on embedded Linux which is using wireless network There are three embedded Linux system to embody movable image send board. First, though the wireless network a signal of PDA is transmitted to the board which has embedded Linux and a system which is controlled by the expansion I/O port of the board. Second, it's a system streaming realtime image at a PDA which has embedded Linux. The last is a system which controls a process of image board using TCP/IP communication and image send board at PC. These are the system which can use industrial settings and homes. It can also make use of an embodiment method about travelling image robot.

Poring of WIPI HAL in Embedded Linux (리눅스 환경에서 WIPI를 지원하기 위한 HAL (Handset Abstraction Layer) 이식)

  • Park, Woo-Ram;Kim, Tae-Woong;Park, Chan-Ik
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.3 no.1
    • /
    • pp.30-33
    • /
    • 2008
  • This paper persents how to port HAL (Handset Abstraction Layer) on embedded Linux to support WIPI (Wireless Internet Platform for Interoperability). As smart phones are widespread nowdays, the operating system is changing from a simple kernel like Qualcomm REX OS to more feature-rich Linux kernel. For this reason, we investigate the internal structure of HAL on REX OS and design how to port it to embedded Linux. Careful analysis leads us to identify several porting issues such as thread support, graphical user interface. In addition, we describe some problems discovered during the implementation process and propose alternative architecture of HAL for WIPI on Linux.

  • PDF

A Study on the Real Time Remote Monitoring Technology based on Embedded Linux System (임베디드 리눅스 시스템 기반 실시간 원격 모니터링 기법 연구)

  • Hong, Hang-Seol;Kim, Seong-Hwan;Park, Jang-Hyeon
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • /
    • pp.11-14
    • /
    • 2007
  • The Embedded Linux System has been developed as a system which can be used with a processor of low efficiency and small-sized memory. Unlike the usual Linux and Windows web server, it has some limitations in the install of application programs, compatibility and scalability when transferring data through web server in real-time. In this paper, we present a real-time remote monitoring system which is very useful to the embedded linux system. The presented system use Java Script without the additional programs at the Embedded Linux System web server and confirm the efficiency of the system through the existing real-time remote monitoring techniques.

  • PDF

SeBo: Secure Boot System for Preventing Compromised Android Linux

  • Kim, Tong Min;Kim, Se Won;Yoo, Chuck
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.10 no.6
    • /
    • pp.335-343
    • /
    • 2015
  • As the usage of mobile devices becomes diverse, a number of attacks on Android also have increased. Among the attacks, Android can be compromised by flashing a new image of compromised Android Linux. In order to solve this problem, we propose SeBo (Secure Boot System) which prevents compromised Android Linux by guaranteeing secure boot environment for mobile devices based on ARM TrustZone architecture. SeBo checks the hash value of the Android Linux image before the Android Linux executes. SeBo detects all the attacks within 5 seconds. Moreover, since SeBo only trusts the Secure Bootloader from Secure World, SeBo can reduce the additional overhead of checking the Normal Bootloader from Normal World.

Recursive Time Synchronization Method Based on GPIO Signal Delay Compensation and EMA Filter (GPIO EMA 신호 지연 보상 및 필터 기반 재귀적 시간 동기화 기법)

  • Kwon, Young-Woo;Nam, Ki Gon;Choi, Joon-Young
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.15 no.1
    • /
    • pp.17-23
    • /
    • 2020
  • We propose a system time synchronization method between embedded Linux-based distributed control devices by using Transmission Control Protocol (TCP) communication and General Purpose Input Output (GPIO) device. The GPIO signal is used as the trigger signal for synchronization and the TCP communication is used to transfer the system time of master Linux, which serves as the reference clock, to slave Linux. Precise synchronization performance is achieved by measuring and compensating for the propagation delay of GPIO signal and the acquisition and setting latency of Linux system time. We build an experimental setup consisting of two embedded Linux systems, and perform extensive experiments to verify the performance of the proposed synchronization method.