• Title/Summary/Keyword: 신뢰실행환경

Search Result 161, Processing Time 0.03 seconds

Detection of TrustZone Rootkits Using ARM PMU Events (ARM PMU 이벤트를 활용한 TrustZone 루트킷 탐지에 대한 연구)

  • Jimin Choi;Youngjoo Shin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.929-938
    • /
    • 2023
  • ARM processors, utilized in mobile devices, have integrated the hardware isolation framework, TrustZone technology, to implement two execution environments: the trusted domain "Secure World" and the untrusted domain "Normal World". Rootkit is a type of malicious software that gains administrative access and hide its presence to create backdoors. Detecting the presence of a rootkit in a Secure World is difficult since processes running within the Secure World have no memory access restrictions and are isolated. This paper proposes a technique that leverages the hardware based PMU(Performance Monitoring Unit) to measure events of the Secure World rootkit and to detect the rootkit using deep learning.

Security Core Technology Implementation for Hardware-based Smart Devices (HW기반 스마트 단말 보안 핵심기술 구현)

  • Kim, Jeong Nyeo
    • Journal of Digital Convergence
    • /
    • v.14 no.11
    • /
    • pp.501-505
    • /
    • 2016
  • Recently, the frequency of dealing important information regarding financial services like paying through smart device or internet banking on smart device has been increasing. Also, with the development of smart device execution environment towards open software environment, it became easier for users to download and use random application software, and its security aspect appears to be weakening. This study inspects features of hardware-based smart device security technology. Furthermore, this study proposes a realization method in MTM hardware-based secure smart device execution environment for an application software that runs in smart devices. While existing MTM provides the root of trust function only for the mobile device, the MTM-based mobile security environment technology proposed in this paper can provide numerous security functions that application program needs in mobile device. The further researches on IoT devices that are compatible with security hardware, gateway security technology and methods that secure reliability and security applicable to varied IoT devices by advancing security hardware are the next plan to proceed.

Analysis of the Urban Airshed Model with the Boundary Condition (경계조건에 따른 Urban Airshed Model의 결과분석)

  • 이종범;김지연
    • Proceedings of the Korea Air Pollution Research Association Conference
    • /
    • 2000.04a
    • /
    • pp.169-170
    • /
    • 2000
  • UAM(Urban Airshed Model)은 광화학 모델로써 미국에서 오존 모델링에 대한 좋은 신뢰성을 갖고있어 여러 도시에 많이 적용된 모델이다. 우리나라에도 이미 수도권 지역을 대상으로 김용국(1996), 최정희(1999)논문에 적용된 바 있다. 그러나 우리나라 적용사례에서 보면 측정농도와 모델결과 값의 차이가 큰 경우가 나타난다. 따라서 UAM 실행의 정확도를 높이기 위해 오존농도의 범위를 살펴보고, 대상 기간을 선정하여 UAM을 실행하고, 그 결과를 비교하였는바 그 원인을 밝히기 위하여 경계농도에 대한 고찰을 실시하였다. (중략)

  • PDF

Recovering from Device Driver Failures by Environment Diversity (실행환경의 변화를 통한 디바이스 드라이버 고장 복구)

  • Park, Hyun-Sook;Lee, In-Hwan
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10a
    • /
    • pp.301-304
    • /
    • 2006
  • 디바이스 드라이버는 커널 고장을 유발하는 가장 큰 원인이며, 커널 영역에서 동작하므로 커널에 큰 영향을 미칠 수 있다. 본 논문은 운영체제의 신뢰성을 향상시키기 위하여, 디바이스 드라이버 실패가 발생했을 때, 고장난 드라이버와 이 드라이버를 사용하는 응용 프로그램을 복구하는 방법을 제시한다. 우리는 논문에서 제시한 복구 시스템을 FRS (Failure Recovery Subsystem) 이라고 부르겠다. 디바이스 드라이버가 고장 났을 때, FRS는 디바이스 드라이버의 실행 환경을 다양하게 변경하고 드라이버를 재실행함으로써 같은 고장이 반복되지 않도록 한다. FRS은 고장을 복구하고 디바이스 드라이버를 정상적으로 실행함으로써 전체 시스템의 안정성을 향상시킨다.

  • PDF

A Coverage-Based Software Reliability Growth Model for Imperfect Fault Detection and Repeated Construct Execution (불완전 결함 발견과 구문 반복 실행을 고려한 커버리지 기반 신뢰성 성장 모형)

  • Park, Joong-Yang;Park, Jae-Heung;Kim, Young-Soon
    • The KIPS Transactions:PartD
    • /
    • v.11D no.6
    • /
    • pp.1287-1294
    • /
    • 2004
  • Recently relationships between reliability measures and the coverage have been developed for evaluation of software reliability. Particularly the mean value function of the coverage-based software reliability growth model is important because of its key role in rep-resenting the software reliability growth. In this paper, we first review the problems of the existing mean value functions with respect to the assumptions on which they are based. Then a new mean value function is proposed. The new mean value function is developed for a general testing environment in which imperfect fault detection and repeated construct execution are allowed. Finally performance of the proposed model is empirically evaluated by applying it to a real data set.

Test Data Creator of Block Combination (블록의 결합에 따른 테스트 데이터 생성 방법)

  • Kwak Dong-Gyu;Cho Yong-Yoon;Yoo Chea-Woo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.11a
    • /
    • pp.709-712
    • /
    • 2004
  • 응용프로그램이 복잡해지고 사용 환경이 다양해짐에 따라 신뢰성 높은 소프트웨어 생산을 위한 테스트가 중요시 되고 있다. 소프트웨어를 테스트하기 위해서는 각 기능에 따라 동작하는 모듈이 합당한 동작에 대해서 분석해야한다. 모듈은 다수의 실행경로로 이루어져 있으며 각 실행 경로에 따라 다른 결과를 출력하도록 설계되어 있다. 본 논문은 실행 경로에 따른 모듈의 인자를 자동으로 생성할 수 있는 방법을 제안한다. 프로그램은 블록간의 제어문 결합으로 이루어져 있고 다른 실행 경로를 생성하는 요인은 프로그램내의 제어문을 통해 결정된다. 그러므로 블록간의 결합을 제어의 종류에 따라 연산으로 표현하고 연산의 특성을 분석한다. 그리고 블록의 속성은 조건식을 가지고 있어 블록이 실행되는 조건을 표현한다. 각 연산의 특성에 맞게 조건식을 연산하여 블록이 동작하는 조건을 확인하고 최종적으로 실행 경로에 따른 모듈의 인자를 구하는 방법을 제안한다. 이 방법은 조건식에 영향을 주는 명령만을 추출하는 방법으로 인자를 구하기 위한 계산의 로드를 줄이는 장점이 있다.

  • PDF

Implementation of Virtualization-based Domain Separation Security Platform for Smart Devices (안전한 스마트 단말을 위한 가상화 기반 도메인 분리 보안 플랫폼 구현)

  • Kim, Jeong Nyeo
    • Smart Media Journal
    • /
    • v.5 no.4
    • /
    • pp.116-123
    • /
    • 2016
  • Recently, important information related with smart work such as office and video conference are handled in smart device quite a lot compare with before. Also, execution environment of smart devices is getting developed as open software environment. It brought convenience to download and use any kind of application software. By that, security side of smart devices became vulnerable. This paper will discuss characteristics of smart device security technology based on virtualization that is a mobile device platform with isolated secure execution area based on TEE (Trusted Execution Environment). Also, this paper will suggest an implementation method about safe smart device security platform based on domain separation for application software which can be executed in smart devices.

Efficient Privacy-Preserving Duplicate Elimination in Edge Computing Environment Based on Trusted Execution Environment (신뢰실행환경기반 엣지컴퓨팅 환경에서의 암호문에 대한 효율적 프라이버시 보존 데이터 중복제거)

  • Koo, Dongyoung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.9
    • /
    • pp.305-316
    • /
    • 2022
  • With the flood of digital data owing to the Internet of Things and big data, cloud service providers that process and store vast amount of data from multiple users can apply duplicate data elimination technique for efficient data management. The user experience can be improved as the notion of edge computing paradigm is introduced as an extension of the cloud computing to improve problems such as network congestion to a central cloud server and reduced computational efficiency. However, the addition of a new edge device that is not entirely reliable in the edge computing may cause increase in the computational complexity for additional cryptographic operations to preserve data privacy in duplicate identification and elimination process. In this paper, we propose an efficiency-improved duplicate data elimination protocol while preserving data privacy with an optimized user-edge-cloud communication framework by utilizing a trusted execution environment. Direct sharing of secret information between the user and the central cloud server can minimize the computational complexity in edge devices and enables the use of efficient encryption algorithms at the side of cloud service providers. Users also improve the user experience by offloading data to edge devices, enabling duplicate elimination and independent activity. Through experiments, efficiency of the proposed scheme has been analyzed such as up to 78x improvements in computation during data outsourcing process compared to the previous study which does not exploit trusted execution environment in edge computing architecture.

An Empirical Research on the Effect of the Environmental Adaptation and the Implementation of Strategies on the Business Performance in Korean Shipping Companies (외항선사(外航船社)의 환경대응력(環境對應力)과 전략실행(戰略實行)이 경영성과(經營成果)에 미치는 영향(影響)에 관한 실증연구(實證硏究))

  • Kim, Myung-Jae;Nam, Jin-Hyun;Ahn, Ki-Myung
    • Journal of Navigation and Port Research
    • /
    • v.34 no.8
    • /
    • pp.659-667
    • /
    • 2010
  • In this study, we examine features of marine transport environment which shipping companies are facing, analyze the ability to cope with this environment, and present the relationship between the ability and business performances. Then, we demonstrate that diagnosis of shipping environment in the global marine transport environment and preparing to it is very important. Also, we present that the ability to prepare is the main factor to decide the competitive power of the company. This study has a meaning in that the importance of business activities related to environment such like diagnosis of environment, analyzing, management, adaptation, and prediction is presented. Besides, the value of this study is that we analyze the relationship between corresponding ability, strategic execution process and business performance in general.

An Analysis Methodology for Probabilistic Specification and Execution Prediction for Improving of Reliability of Fault-Tolerant Real-Time Systems (내고장 실시간 시스템의 신뢰도 향상을 위한 확률 명세 및 실행 예측 분석 방법)

  • Lee, Chol;Lee, Moon-Kun
    • Journal of KIISE:Software and Applications
    • /
    • v.29 no.12
    • /
    • pp.926-939
    • /
    • 2002
  • The formal specification methods with probability have been demanded in the area of fault real-time systems, in order to specify the uncertainty that the systems can encounter during their execution due to various environmental factors. This paper presents a new formal method with probability. namely Probabilistic Abstract Timed Machine (PATM), in order to analyze and predict system's behavior in dynamical environmental changes, This method classifies the factors into two classes: the variable and the constant. The analysis of system's behavior is performed on the probabilistic reachability graph generated from the ATM specification for the system. The analysis can predict any possibility that the behavior may not satisfy some safety requirements of the system, indicate which variable factors cause such satisfaction, and further recover from this unsatisfying fault state by fixing the variable factors. Consequently the reliability to the fault real-time systems can be improved.