• Title/Summary/Keyword: Kernel Module

Search Result 121, Processing Time 0.034 seconds

ON ENDOMORPHISM RING OF H-INVARIANT MODULES

  • Bae, Soon-Sook
    • East Asian mathematical journal
    • /
    • v.6 no.2
    • /
    • pp.167-182
    • /
    • 1990
  • The relationships between submodules of a module and ideals of the endomorphism ring of a module had been studied in [1]. For a submodule L of a moudle M, the set $I^L$ of all endomorphisms whose images are contained in L is a left ideal of the endomorphism ring End (M) and for a submodule N of M, the set $I_N$ of all endomorphisms whose kernels contain N is a right ideal of End (M). In this paper, author defines an H-invariant module and proves that every submodule of an H-invariant module is the image and kernel of unique endomorphisms. Every ideal $I^L(I_N)$ of the endomorphism ring End(M) when M is H-invariant is a left (respectively, right) principal ideal of End(M). From the above results, if a module M is H-invariant then each left, right, or both sided ideal I of End(M) is an intersection of a left, right, or both sided principal ideal and I itself appropriately. If M is an H-invariant module then the ACC on the set of all left ideals of type $I^L$ implies the ACC on M. Also if the set of all right ideals of type $I^L$ has DCC, then H-invariant module M satisfies ACC. If the set of all left ideals of type $I^L$ satisfies DCC, then H-invariant module M satisfies DCC. If the set of all right ideals of type $I_N$ satisfies ACC then H-invariant module M satisfies DCC. Therefore for an H-invariant module M, if the endomorphism ring End(M) is left Noetherian, then M satisfies ACC. And if End(M) is right Noetherian then M satisfies DCC. For an H-invariant module M, if End(M) is left Artinian then M satisfies DCC. Also if End(M) is right Artinian then M satisfies ACC.

  • PDF

Design and Implementation of Sensor based Intrusion Detection System (센서 기반 침입 탐지 시스템의 설계와 구현)

  • Choi, Jong-Moo;Cho, Seong-Je
    • The KIPS Transactions:PartC
    • /
    • v.12C no.6 s.102
    • /
    • pp.865-874
    • /
    • 2005
  • The information stored in the computer system needs to be protected from unauthorized access, malicious destruction or alteration and accidental inconsistency. In this paper, we propose an intrusion detection system based on sensor concept for defecting and preventing malicious attacks We use software sensor objects which consist of sensor file for each important directory and sensor data for each secret file. Every sensor object is a sort of trap against the attack and it's touch tan be considered as an intrusion. The proposed system is a new challenge of setting up traps against most interception threats that try to copy or read illicitly programs or data. We have implemented the proposed system on the Linux operating system using loadable kernel module technique. The proposed system combines host~based detection approach and network-based one to achieve reasonably complete coverage, which makes it possible to detect unknown interception threats.

Performance Improvements through Policy Reorganization in SELinux (SELinux의 정책 재구성을 통한 성능 개선)

  • Ko, Jae-Yong;Choi, Jeong-In;Cho, Kyung-Yeon;Lee, Cheol-Hoon
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.4
    • /
    • pp.307-319
    • /
    • 2017
  • SELinux is known as a secure operating system that is easily accessible to users due to the popularization of Linux, and is applied to various security operating system references deployed on systems such as embedded systems and servers. However, if SELinux is applied without considering the performance overhead of activating the SELinux kernel module, the performance of the entire system may be degraded. In this paper, we describe the factors directly affecting the performance inside the SELinux kernel and show that it is possible to improve performance by simply reorganizing the policy without changing the SELinux kernel. This can be used as a reference when security administrators or developers apply SELinux.

Design of the Kernel Hardening Function in the Linux Network Module (리눅스 네트워크 모듈에서 커널 하드닝 기능 설계)

  • 장승주
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.5
    • /
    • pp.961-969
    • /
    • 2004
  • A panic state is often caused by careless computer control. It could be also caused by a kernel programmer's mistake. It can make a big problem in computer system when it happens a lot. When a panic occurs, the process of the panic state has to be checked, then if it can be restored, operating system restores it, but if not, operating system runs the panic function to stop the system in the kernel hardening O.S. To decide recovery of the process, the type of the panic for the present process should be checked. 1'he value type and the address type have to restore the process. If the system process is in a panic state, the system should be designed to shutdown hardening function In the Linux operating system. So it has to decide whether the process should be restored or not before going to the panic state.

FlexDesigner:Object-Oriented Non-manifold Modeling Kernel with Hierarchically Modularized Structure (FlexDesigner:계층적으로 모듈화된 주초의 객체 지향 방식 비다양체 모델링 커널)

  • 이강수;이건우
    • Korean Journal of Computational Design and Engineering
    • /
    • v.2 no.4
    • /
    • pp.222-236
    • /
    • 1997
  • Conventional solid or surface modeling systems cannot represent both the complete solid model and the abstract model in a unified framework. Recently, non-manifold modeling systems are proposed to solve this problem. This paper describes FlexDesigner, an open kernel system for modeling non-manifold models. It summarizes the data structure for non-manifold models, system design methodology, system modularization, and the typical characteristics of each module in the system. A data structure based on partial-topological elements is adopted to represent the relationship among topological elements. It is efficient in the usage of memory and has topological completeness compared with other published data structures. It can handle many non-manifold situations such as isolate vertices, dangling edges, dangling faces, a mixed dimensional model, and a cellular model. FlexDesigner is modularized hierarchically and designed by the object-oriented methodology for reusability. FlexDesigner is developed using the C++ and OpenGL on both SGI workstation and IBM PC.

  • PDF

A Design and Implementation of Mobile IP Architecture using Object-Oriented Concept(2) (객체지향개념을 도입한 Mobile IP의 설계 및 구현(2))

  • 손동우;채동현;한규호;마영식;안순신
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.10c
    • /
    • pp.414-416
    • /
    • 2000
  • Mobile IP는 OSI7 계층 중 네트워크 계층에서의 이동성 지원을 위한 Protocol이다. Mobile IP의 세 주체 중 Home Agent와 Foreign Agent는 Mobile Node 에게 이동성을 제공하는 서비스 제공자로서의 역할을 수행한다. 본 논문에서는 Mobile IP Protocol의 주체 중 Mobile Agent를 객체지향 개념을 도입하여 설계.구현한다. Linux Kernel 2.2.14의 환경에서 객체지향 언어인 C++을 이용, 기능적인 측면에서의 객체를 구성하고, IP 계층에서의 이동성을 제공하기 위해 Home Agent와 Foreign Agent의 주된 기능인 터널링(Tunneling)을 Linux Kernel의 모듈(Module)을 이용, 설계.구현한다.

  • PDF

Linux-based ARINC 653 Health Monitor (리눅스 기반 ARINC 653 헬스 모니터)

  • Yoon, Young-Il;Joe, Hyunwoo;Kim, Hyungshin
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.9 no.3
    • /
    • pp.183-191
    • /
    • 2014
  • The software running on avionic system is required to be highly reliable and productive. The air transport industry has developed ARINC Specification 653(ARINC653) as a standardized software requirement of avionics computers. The document specifies the interface boundary between avionics application software and the core executive software. Dependability in ARINC 653 is provided by spatial and temporal partitioning whilst fault-tolerance is provided by health monitoring mechanism. Legacy real-time operating systems are used to support ARINC653 health monitor on integrated modular avionics(IMA). However, legacy real-time operating systems are costly and difficult to modify the kernel. In this paper, we suggest a Linux-based ARINC653 health monitor. Functionalities to support ARINC653 health monitor are implemented as a Linux kernel module and its performance is evaluated.

Manipulating Geometry Instances in an STEP-based OODB from Commercial CAD Systems (상업용 CAD에서 STEP 기반 객체지향 데이터베이스 내부의 형상 인스턴스 검색 및 수정)

  • Kim, Junhwan;Han, Soonhung
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.28 no.4
    • /
    • pp.435-442
    • /
    • 2002
  • It is difficult to access and share design data among heterogeneous CAD systems. Usually, different CAD systems exchange the design data using a neutral format such as IGES or STEP. A prototype CAD system which uses a geometric kernel and a commercial database management system has been implemented. The prototype system used the Open Cascade geometric kernel and the commercial object-oriented database ObjectStore. STEP provides the database schema. The database can be accessed from commercial CAD systems such as SolidWorks or Unigraphics. The data access module from a commercial CAD system is developed with the CAD system's native API, ObjectStore API functions, and ActiveX.

A Study on Detecting Kernel Based Call Gate Abuse (커널 기반 Call gate 오용 탐지에 관한 연구)

  • You, Dong-Hoon;Kim, Min-soo;Kim, Dong-Kook;Noh, Bong-Nam
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.04a
    • /
    • pp.778-781
    • /
    • 2010
  • Call gate 오용으로 인한 커널 공격 취약점은 커널 보안 문제점 중 하나로서 시스템 관리자들을 위협하고 있다. 이로 인해 근본적으로 커널 공격을 방어할 수 있는 대책이 시급하나 아직까지 효과적으로 Call gate 오용을 탐지할 수 있는 방법은 알려진 바가 없다. 본 논문에서는 적재가능커널모듈(loadable kernel module)을 이용하여 Call gate 오용을 통한 커널 공격을 탐지할 수 있는 방법을 기술하고자 한다.

User Keystroke Logging Module Design and Implementation on the Linux Kernel (리눅스 커널 기반 사용자 키스트로크 로깅 모듈 설계 및 구현)

  • 정계옥;김정순;노봉남
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.330-333
    • /
    • 2002
  • 일반적으로 시스템들은 관리자를 위한 많은 로깅 기능을 제공한다. 이러한 로깅 기능에는 사용자 행위를 파악하는 부분도 제공하고 있으나 정작 사용자들이 입력하는 명령어를 직접 로깅하는 기능은 없거나 매우 미약하다. 시스템 사용자들이 입력한 명령어는 시스템 자체에서 사용자가 어떤 행위를 하였는가를 가장 확실히 보여주는 중요한 단서이다. 본 논문에서는 리눅스 커널을 기반으로 하여 사용자 키스트로크를 로그로 남길 수 있는 방법을 제안하고 구현한다.

  • PDF