• Title/Summary/Keyword: 운영체제 플랫폼

Search Result 281, Processing Time 0.026 seconds

The Design and Implementation of Garbage Collection in KVM Memory Management Facility on Real-Time Operating System, $iRTOS^{TM}$ (실시간 운영체제 $iRTOS^{TM}$ 상의 KVM 메모리 관리 체계 내에서 효율적인 가비지 콜렉션의 설계 및 구현)

  • 최인범;유용선;이철훈
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.04a
    • /
    • pp.805-807
    • /
    • 2004
  • 최근 IT 산업의 발전과 더불어, 리소스가 제한된 소형 기기들의 사용이 비약적으로 증가하고 있는 추세이다. 자바는 플랫폼 독립성(Platform Independency), 보안성(Security), 네트워크 이동성(Network Mobility) 등의 장점을 가지고 있어, 이러한 소형 기기들에 자바 환경을 적용하게 되면 여러 가지 이점을 가지게 된다. 임베디드 장치나 모바일 같은 제한된 리소스를 사용하는 기기들에는 SUN 사의 CLDC(Connected, Limited Device Configuration)에서 정의하고 있는 K 가상 머신(K Virtual Machine: KVM)을 탑재하여 사용하게 된다. 본 논문에서는 실시간 운영체제 iRTOS$^{TM}$와 KVM 을 탑재한 소형 기기에서 좀더 효율적으로 KVM 의 메모리를 관리하기 위한 Garbage Collection기법을 설계하고 구현한 내용을 설명한다.

  • PDF

Design of the Power Management Middleware for Embedded System (소형 임베디드 시스템의 전력관리를 위한 미들웨어 설계)

  • Hwang, Sun-Yeop;Park, Choong-Bum;Choi, Hoon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10a
    • /
    • pp.326-330
    • /
    • 2006
  • 배터리를 사용하는 소형 임베디드 시스템은 효과적인 전력관리가 필요하다. 그러나 현재까지 개발된 전력관리 기법들은 대부분 운영체제와 하드웨어를 대상으로 하고 있어 개발 플랫폼에 종속적인 특징을 갖는다. 따라서 시스템을 개발할 때마다 지원하는 전력관리 기법을 하드웨어나 운영체제에 따라 여러 번 개발을 해야 하는 단점이 있다. 본 논문에서는 하위 계층에서 지원하는 전력관리 기법에 관계없이 동일한 기능을 제공하는 웨어러블 컴퓨터용 전력관리 미들웨어를 설계하였다.

  • PDF

A Study on Tools for Control System Platform Vulnerability Scanner Development (제어시스템 플랫폼 취약점 스캐너 도구 개발에 관한 연구)

  • Oh, Kwang-Sun;Ryou, Jae-Cheol
    • Annual Conference of KIPS
    • /
    • 2016.10a
    • /
    • pp.202-205
    • /
    • 2016
  • 취약점 스캐너(Vulnerability Scanner)는 이름 그대로 기업의 네트워크나 시스템(컴퓨터, 서버, 라우터 등)을 스캔하고 오픈 포트, 활성화된 IP주소와 로그온, 운영체제, 설치되어 실행되는 소프트웨어와 서비스 등을 식별하고 보고하는 도구이다. 가용성과 데이터의 신뢰성이 우선적으로 중요시되고 있는 제어시스템 환경에서는 이러한 취약점 스캐너 도구의 사용은 운영에 영향을 미칠 수 있다. 본 저자는 기존에 상용화된 스캐너 제품의 취약점 식별 방법을 분석하고 현재까지 발표된 제어시스템 풀랫폼의 공개 취약점 정보를 이용하여 폐쇄적인 제어시스템 운영환경에 적합한 새로운 제어시스템 플랫폼 취약점 스캐너를 제안한다.

A Porting Technique of WiFi Device on Android Platform (안드로이드 플랫폼에 WiFi 디바이스 탑재 기법)

  • Jeong, Uyeong;Ju, Youngkwan;Jeon, Joongnam
    • Journal of Convergence Society for SMB
    • /
    • v.2 no.1
    • /
    • pp.51-58
    • /
    • 2012
  • Android platform is a powerful operating system developed on Linux 2.6 Kernel, and provides many features such as comprehensive libraries, a multimedia environment, and powerful interface for phone applications. Since Android is an open operating system, which can be installed in any vendors's equipments. Current smartphones as well as netbooks, navigations, car PCs, tablet PCs, Industrial PCs are used in various fields. It is difficult a lot that to mount to other devices on the Android platform or new devices. In this Paper, The process that data that occurred from a hardware was passed to the highest application and Android platform system for managing hardware devices were analyzed. Building Android & driver compilation environment, How to support the protocol for the use of WiFi in the kernel, How to Mount a WiFi device in the kernel, Device driver registration for the Android platform, WiFi Management Service Daemon (wpa_supplicant) and IP allocation services daemon (dhcpcd) registration, How to create a socket for communication between the daemon (wpa_supplicant) and HAL have been presented. In the experiment using the proposed method, WiFi devices were mounted on the Android platform in the X-86 & ARM family. Understanding the whole process of control flow in Android hierarchy is very important to porting a new device on it. The process included in this paper can help technicians who might encounter the obstacles in their porting works.

  • PDF

The Attributes Design Technique to Support Node Software Development for USN Multi-Platform (USN 멀티플랫폼을 위한 노드 소프트웨어 개발을 지원하는 속성 설계 기법)

  • Lee, Woo-Jin;Choi, Il-Woo;Kim, Ju-Il
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.1
    • /
    • pp.441-448
    • /
    • 2014
  • USN(Ubiquitous Sensor Network) application software has a characteristic that it controls a variety of sensor nodes based on the various target operating systems. Accordingly, many researches for efficient development of USN application software are being performed. In this paper, the attributes design technique to support attribute-based development of USN node software for multi-platform is proposed. In the proposed technique, the method to design attributes for modeling Platform Independent Model and Platform Specific Model is presented. When using the proposed technique, productivity of software development will be increased because node software design for multi-platform is easily performed by selecting values of attributes. Also, maintainability of software will be increased because node software is easily regenerated by changing attributes according to the changes of operating systems.

Antecedent Factors Influencing the Continued Use of Smart Banking by Different Mobile Platforms: Android OS vs. iOS (모바일 플랫폼에 따른 스마트 뱅킹의 지속사용에 영향을 미치는 선행요인: Android OS vs. iOS)

  • Kim, Do-Hyung;Ha, Sung-Ho;Park, KyungBae
    • The Journal of Information Systems
    • /
    • v.24 no.2
    • /
    • pp.209-240
    • /
    • 2015
  • Purpose This study investigates the relationships between various attributes of smart banking (convenience, security, convergence, and economy), user features (familiarity and innovativeness), perceived usefulness, trust, satisfaction, and continuance intentions and provides a comparison of Google's Android OS and Apple's iOS. Design/methodology/approach We considered a sample of 245 respondents and used structural equation modeling to analyze the data. Findings The results indicate that convergence and familiarity significantly affected perceived usefulness and that security and economy significantly affected perceived trust in smart banking services. The relationships of security, economy, and innovativeness to perceived usefulness and those of convenience and familiarity to perceived trust were stronger for the Android OS than for iOS. The study contributes by proposing an integrated framework and providing a comparison between the Android OS and iOS in the context of smart banking.

Vulnerability analysis on the ARMv7 Thumb Architecture (ARMv7 Thumb Architecture 취약성 분석)

  • Kim, Si-Wan;Seong, Ki-Taek
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.5
    • /
    • pp.1003-1008
    • /
    • 2017
  • The Internet of Things has attracted considerable research attention in recent years. In order for the new IoT technology to be widely used, the reliability and protection of information is required. IoT systems are very vulnerable to physical security due to their easy accessibility. Along with the development of SoC technology, many operating systems have been developed and many new operating systems have been introduced. In this paper, we describe the vulnerability analysis results for operating systems running on the ARMv7 Thumb Architecture hardware platform. For the recently introduced "Windows 10 IoT Core" operating system, I implemented the Zero-Day Attack by implanting the penetration code developed through the research into a specific IoT system. The virus detection test for the resulting penetration code was validated by referral to the "virustotal" site.

Real-Time Task Scheduling Algorithm using a Multi-Dimensional Methodology for Embedded Real-Time Operating Systems (내장형 실시간 운영체제에서 다차원 기법을 이용한 실시간 태스크 스케줄링 알고리즘)

  • Cho, Moon-Haeng;Lim, Jae-Seok;Lee, Jin-Wook;Kim, Joo-Man;Lee, Cheol-Hoon
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.1
    • /
    • pp.94-102
    • /
    • 2010
  • In recent years, embedded systems such as cellular phones, Portable Multimedia Player, intelligent appliance, automobile engine control are reshaping the way people live, work, and play. Thereby, services application to guarantee various requirements of users become increasingly sophisticated and complicated, such embedded computing platforms use real-time operating systems (RTOSs) with time determinism. These RTOSs must not only provide predictable services but must also be efficient and small in size. Kernel services should also be deterministic by specifying how long each service call will take to execute. Having this information allows the application designers to better plan their real-time application software so as not to miss the deadline of each task. In this paper, we present the complete generalized real-time scheduling algorithm using multi-dimensional methodology to determine the highest priority in the ready list with 2r levels of priorities in a constant time without additional memory overhead.

Container Vulnerability Intruder Detection Framework based on Memory Trap Technique (메모리 트랩기법을 활용한 컨테이너 취약점 침입 탐지 프레임워크)

  • Choi, Sang-Hoon;Jeon, Woo-Jin;Park, Ki-Woong
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.13 no.3
    • /
    • pp.26-33
    • /
    • 2017
  • Recently container technologies have been receiving attention for efficient use of the cloud platform. Container virtualization technology has the advantage of a highly portable, high density when compared with the existing hypervisor. Container virtualization technology, however, uses a virtualization technology at the operating system level, which is shared by a single kernel to run multiple instances. For this reason, the feature of container is that the attacker can obtain the root privilege of the host operating system internal the container. Due to the characteristics of the container, the attacker can attack the root privilege of the host operating system in the container utilizing the vulnerability of the kernel. In this paper, we propose a framework for efficiently detecting and responding to root privilege attacks of a host operating system in a container. This framework uses a memory trap technique to detect changes in a specific memory area of a container and to suspend the operation of the container when it is detected.

Design and Implementation of TV Emulator Based On HTML5 based Smart TV Platform (HTML5 기반 스마트 TV 플랫폼 표준 기반 TV 에뮬레이터 설계 및 구현)

  • Kim, Ho-Youn;Kim, Jung-Hyun;Lee, Dong-Hoon;Park, Dong-Young
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2016.06a
    • /
    • pp.317-320
    • /
    • 2016
  • 한국정보통신기술협회(이하, TTA)에서 제정된 " HTML5 기반 스마트 TV 플랫폼(TTAK.KO-07.0111/R1)" 은 개방형 국제 기술표준인 W3C/HTML5 을 기반으로 스마트 TV 에서 방송환경과 운영체제에 종속되지 않고 애플리케이션이 실행될 수 있도록 스마트 TV 플랫폼의 기술 요구 사항을 정의한 표준이다. TTA 에서는 이러한 표준 기반의 TV 앱 생태계를 활성화하기 위해 앱 개발도구(SDK)를 개발하여 배포하였고, 이어서 TV 장치 없이 PC 환경에서 표준 기반으로 개발된 앱을 실행할 수 있는 있는 에뮬레이터 개발을 추진하였다. 개발된 에뮬레이터는 사용자의 방송 정보 설정을 바탕으로 방송 재생 및 제어 기능을 제공하고 표준 기술로 작성된 앱을 방송 연동형 혹은 패키지 형태로 실행할 수 있는 기능을 제공한다. 본 논문에서는 TTA 에서 개발한 표준 기반 TV 에뮬레이터의 설계 및 구현에 대해 소개한다.

  • PDF