• Title/Summary/Keyword: Embedded firmware

Search Result 63, Processing Time 0.01 seconds

Diagnosis Design Using Embedded Transmission Simulator (임베디드 변속기 시뮬레이터를 이용한 진단알고리즘 설계)

  • Jung, G.H.;Kim, K.D.
    • 유공압시스템학회:학술대회논문집
    • /
    • 2010.06a
    • /
    • pp.56-61
    • /
    • 2010
  • Simulator is a development equipment which enables the ECU to operate in normal mode by simulating the interface signal between ECU and mechanical system electrically. Embedded simulator means simulation function is embedded in ECU firmware, hence the electrical signal interface is replaced by the substitution of information at system program level. This paper explains the development of embedded transmission simulator for the verification of TCU firmware function which covers shifting control and on-board diagnosis. The embedded simulation program is executed in TCU processor along with the TCU firmware and it provides TCU firmware with not only the speed information those are appropriate both in driving and shifting conditions, but also the fault detection signals. Experimental results show that the validity of embedded simulator and its usefulness to the TCU firmware development and verification.

  • PDF

DSP Firmware Update Using USB Flash Drive (USB 플래시 드라이브를 이용한 DSP 펌웨어 업데이트)

  • Jin-Sun Kim;Joon-Young Choi
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.18 no.1
    • /
    • pp.25-30
    • /
    • 2023
  • We propose a method to update DSP (Digital Signal Processor) firmware using USB (Universal Serial Bus) flash drives. The DSP automatically detects USB drives based on an interrupt when the USB drive is inserted into the USB port. The new firmware binary file is found in the mounted USB drive, and the destination address of DSP flash memory is identified for the firmware update writing by investigating the firmware file header. After the new firmware is written to the DSP flash memory, the DSP is reset and rebooted with the newly updated firmware. By employing TI's TMS320F28379D control card with USB ports, we conduct experiments and verify the normal operation of the implemented method.

Development of Embedded Transmission Simulator for the Verification of Forklift Shift Control Algorithm (지게차 변속제어 알고리즘 검증을 위한 임베디드 변속기 시뮬레이터 개발)

  • Gyuhong Jung
    • Journal of Drive and Control
    • /
    • v.20 no.4
    • /
    • pp.17-26
    • /
    • 2023
  • A forklift is an industrial vehicle that lifts or transports heavy objects using a hydraulically operated fork, and is equipped with an automatic transmission for the convenience of repetitive transportation, loading, and unloading work. The Transmission Control Unit (TCU) is a key component in charge of the shift control function of an automatic transmission. It consists of an electric circuit with an input/output signal interface function and firmware running on a microcontroller. To develop TCU firmware, the development process of shifting algorithm design, firmware programming, verification test, and performance improvement must be repeated. A simulator is a device that simulates a mechanical system having dynamic characteristics in real time and simulates various sensor signals installed in the system. The embedded transmission simulator is a simulator that is embedded in the TCU firmware. information related to the mechanical system that is necessary for TCU normal operation. In this study, an embedded transmission simulator applied to the originally developed forklift TCU firmware was designed and used to verify various forklift shift control algorithms.

Low-Power Metamorphic MCU using Partial Firmware Update Method for Irregular Target Systems Control (불규칙한 대상 시스템 제어를 위하여 부분 펌웨어 업데이트 기법을 이용한 저전력 변성적 MCU)

  • Baek, Jongheon;Jung, Jiwoong;Kim, Minsung;Kwon, Jisu;Park, Daejin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.2
    • /
    • pp.301-307
    • /
    • 2021
  • In addition to the revival of the Internet of Things, embedded systems, which are at the core of the Internet of Things, require intelligent control as things change. Embedded systems, however, are heavily constrained by resources such as hardware, memory, time and power. When changes are needed to firmware in an embedded system, flash Memory must be initialized and the entire firmware must be uploaded again. Therefore, it is time- and energy-efficient in that areas that do not need to be modified must also be initialized and rewritten. In this paper, we propose how to upload firmware in installments to each sector of flash memory so that only firmware can be replace the firmware in the parts that need to be modified when the firmware needs to be modified. In this paper, the proposed method was evaluated using real target board, and as a result, the time was reduced by about half.

Protocol Implementation for Ethernet-Based Real-Time Communication Network (이더넷 기반 실시간 통신 네트워크 프로토콜 구현)

  • Kwon, Young-Woo;Nguyen, Dung Huy;Choi, Joon-Young
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.16 no.6
    • /
    • pp.247-251
    • /
    • 2021
  • We propose a protocol for Ethernet-based industrial real-time communication networks. In the protocol, the master periodically transmits control frames to all slaves, and the ring-type network topology is selected to achieve high-speed transmission speed. The proposed protocol is implemented in the form of both firmware and Linux kernel modules. To improve the transmission speed, the MAC address table is disabled in the firmware implementation, and the NAPI function of the Ethernet driver is removed in the Linux kernel module implementation. A network experiment environment is built with four ARM processor-based embedded systems and network operation experiments are performed for various frame sizes. From the experimental results, it is verified that the proposed protocol normally operates, and the firmware implementation shows better transmission speed than the Linux kernel module implementation.

Emulation-Based Fuzzing Techniques for Identifying Web Interface Vulnerabilities in Embedded Device Firmware (임베디드 디바이스 펌웨어의 웹 인터페이스 취약점 식별을 위한 에뮬레이션 기반 퍼징 기법)

  • Heo, Jung-Min;Kim, Ji-Min;Ji, Cheong-Min;Hong, Man-Pyo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.6
    • /
    • pp.1225-1234
    • /
    • 2019
  • The security of the firmware is more important because embedded devices have become popular. Network devices such as routers can be attacked by attackers through web application vulnerabilities in embedded firmware. Therefore, they must be found and removed quickly. The Firmadyne framework proposes a dynamic analysis method to find vulnerabilities after emulating firmware. However, it only performs vulnerability checks according to the analysis methods defined in the tool, thus limiting the scope of vulnerabilities that can be found. In this paper, fuzzing is performed in emulation-based environment through fuzzing, one of the software security test techniques. We also propose a Fabfuzz tool for efficient emulation based fuzzing. Experiments have shown that in addition to the vulnerabilities identified in existing tools, other types of vulnerabilities have been found.

Design and Implementation of Embedded System based on AM3359 Microprocessor (AM3359 마이크로프로세서 기반 임베디드 시스템 설계 및 제작)

  • Kim, Hyoung-Woo;Kim, Se-Jun;Choi, Joon-Young
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.12 no.2
    • /
    • pp.89-96
    • /
    • 2017
  • We develop an embedded system to measure various sensor data, control multiple motors, and communicate with mobile devices for system managements. Choosing TI AM3359 microprocessor featuring high processing performance, low power consumption, and various I/O device support, we design and build the embedded system hardware so that it supports multiple global positioning system (GPS) and gyro sensor modules to measure precise position; multiple pulse width modulation (PWM) outputs to control multiple direct current (DC) motors; a Bluetooth module to communicate with mobile devices. Then, we port the boot loader and device drivers to the built circuit board and construct the firmware development environment for the application programming. The performance of the designed and implemented embedded system is demonstrated by real motor control test using GPS and gyro sensor data and control parameters configured by a mobile device.

A Taxonomy of Embedded Systems (임베디드 시스템의 분류)

  • So, Sun Sup;Son, Kyung A;Eun, Seongbae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.6
    • /
    • pp.818-825
    • /
    • 2020
  • The embedded system can be defined as a special purpose system with a built-in computer, and has a wide variety of applications such as home appliances, office equipment, and weapon systems. A well-defined taxonomy in a specific field is advantageous for learning and education, however, the classification scheme for embedded systems is difficult to find. In this paper, we propose a taxonomy for embedded systems. First, the generalized structure of the embedded system was presented. And, it is divided into two parts: "firmware based" and "embedded OS based". In addition, according to the characteristics of embedded system applications, it is divided into two categories: "non-dependable" application and "dependable" application, which makes 4 planes. We describe the features of each quadrant and show that the classification is well suited by showing examples. Our taxonomy can be used to set teaching and learning methods of embedded systems.

Analysis and Countermeasure for BadUSB Vulnerability (BadUSB 취약점 분석 및 대응 방안)

  • Seo, Jun-Ho;Moon, Jong-Sub
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.12 no.6
    • /
    • pp.359-368
    • /
    • 2017
  • As the BadUSB is a vulnerability, in which a hacker tampers the firmware area of a USB flash drive. When the BadUSB device is plugged into the USB port of a host system, a malicious code acts automatically. The host system misunderstands the act of the malicious behavior as an normal behaviour for booting the USB device, so it is hard to detect the malicious code. Also, an antivirus software can't detect the tampered firmware because it inspects not the firmware area but the storage area. Because a lot of computer peripherals (such as USB flash drive, keyboard) are connected to host system with the USB protocols, the vulnerability has a negative ripple effect. However, the countermeasure against the vulnerability is not known now. In this paper, we analyze the tampered area of the firmware when a normal USB device is changed to the BadUSB device and propose the countermeasure to verify the integrity of the area when the USB boots. The proposed method consists of two procedures. The first procedure is to verify the integrity of the area which should be fixed even if the firmware is updated. The verification method use hashes, and the target area includes descriptors. The second procedure is to verify the integrity of the changeable area when the firmware is updated. The verification method use code signing, and the target area includes the function area of the firmware. We also propose the update protocol for the proposed structure and verify it to be true through simulation.

Implementation of system security platform based on Cortex-M3 (Cortex-M3기반 System 보안 플랫폼 구현에 대한 연구)

  • Park, Jung-kil;Kim, Young-kil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.317-320
    • /
    • 2016
  • In embedded system, if firmware code is opened by other company, must devise hardware copy prevention. That guard valuable product. Not used security IC, Suggested platform is source code open method that prevent core code and hardware copy. And that open firmware code for other company programmer. Suggest system security platform based on Corex-M3. that consist of IAP(In-application programing) and APP(Applicataion). IAP contain core code and security confirm code. APP is implement by other company developer using core function prototype.

  • PDF