• Title/Summary/Keyword: Linux file system

Search Result 157, Processing Time 0.025 seconds

Implementation of an USB Camera Interface Based on Embedded Linux System (임베디드 LINUX 시스템 기반 USB 카메라 인터페이스 구현)

  • Song Sung-Hee;Kim Jeong-Hyeon;Kim Tae-Hyo
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.6 no.4
    • /
    • pp.169-175
    • /
    • 2005
  • In recent, implementation of the embedded system is gradually in the spotlight of world-wide by information technology(IT) engineers. By this time, an implementation of real time system is limited on image acquisition and processing system in practical. In this paper, the USB camera interface system based on the embedded linux OS is implemented using USB 2.0 camera with low cost. This system can obtain image signals into the memory via X-hyper255B processor from USB camera. It is need to initialize USB camera by the Video4Linux for the kernel device driver. From the system image capturing and image processing can be performed. It is confirmed that the image data can be transformed to packet of Network File System(NFS) and connected to the internetwork, then the data can be monitored from the client computer connected to the internetwork.

  • PDF

Regular File Access of Embedded System Using Flash Memory as a Storage (플래시 메모리를 저장매체로 사용하는 임베디드 시스템에서의 정규파일 접근)

  • 이은주;박현주
    • Journal of Information Technology Applications and Management
    • /
    • v.11 no.1
    • /
    • pp.189-200
    • /
    • 2004
  • Recently Flash Memory which is small and low-powered is widely used as a storage of embedded system, because an embedded system requests portability and a fast response. To resolve a difference of access time between a storage and RAM, Linux is using disk caching which copies a part of file on disk into RAM. It is not also an exception on embedded system. A READ access-time of flash memory is similar to RAMs. So, when a process on an embedded system reads data, it is similar to the time to access cached data in RAM and to access directly data on a flash memory. On the embedded system using limited memory, using a disk cache is that wastes much time and memory spaces to manage it and can not reflects the characteristic of a flash memory. This paper proposes the regular file access of limited using a page cache in the file system based on a flash memory and reflects the characteristic of a flash memory. The proposed algorithm minimizes power consumption because access numbers of the RAM are reduced and doesn't waste a memory space because it accesses directly to a flash memory Therefore, the performance improvement of the system applying the proposed algorithm is expected.

  • PDF

A Study On The Development Of a Home Networking System Using An Embedded Linux Board (임베디드 리눅스 보드를 이용한 홈 네트워킹 시스템 구현에 관한 연구)

  • Lee, Heon-Joo;Lee, Jong-Su;Choi, Kyung-Sam
    • Proceedings of the KIEE Conference
    • /
    • 2003.11c
    • /
    • pp.592-595
    • /
    • 2003
  • In this paper, we have designed a Home Networking System using an embedded linux board. The system based on the World-Wide-Web is composed of three parts - a Server, a Client and a Simulator. The Home Networking Server is built in an embedded board using an embedded linux kernel. A web-server and Home Networking Server Seryice Demon programming with a Jaya-Language is included in the board. Clients can connect to the server board using a web-browser in the desktop computer, PDA or any other machines which include a web-browser. For this purpose, we made the client program using a Java-Applet. So, the clients who connect to the server for the control of the applications, download the class-file and execute the client-program in the web-browser. So, the clients don't need any other programs to control the applications from a remote place. The size of server board is very small (86.3$\times$74mm), which makes it very useful not only for the Home-Networking-System but also in many other fields, e.g., embedded robot control system, etc. Using an embedded board instead of a desktop computer is good for a simple network environment and it occupies only a small space to make the system.

  • PDF

Implementation of Linux File System to be Protected from Super-User's File Access (슈퍼유저의 파일접근 권한으로부터 보호받을 수 있는 리눅스 파일시스템 구현)

  • Lee Ho-Jung;Lee Ki-Hoon;Kim Hwa-Jong
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.124-127
    • /
    • 2004
  • 최근 인터넷의 급속한 발전과 함께 인터넷에 접속되는 서버의 수가 기하 급수적으로 증가하고 있다. 이러한 인터넷의 보급과 함께 중요한 문제로 부각되는 것이 보안 문제이다. 최근 서버를 리눅스(Linux)로 구축하는 사례가 늘고 있다. 본 논문에서는 현재 널리 사용되고 있는 리눅스의 파일시스템을 보안적인 차원에서 문제점이 무엇인지 분석하고 이를 해결하는 방안으로 리눅스 커널 레벨에서 동작하는 새로운 리눅스 보안 파일시스템을 구현하였다.

  • PDF

Design of File System for small File Management at Real-Time Linux (Real-Time Linux에세 소규모 파일 관리를 위한 파일 시스템의 설계)

  • Choi, Yong-Sik;Lee, Sang-Rak;Shin, Seung-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11b
    • /
    • pp.1635-1638
    • /
    • 2002
  • 리눅스 파일 시스템은 자기식 회전 디스크를 기반으로 개발되어 현재 임베디드 시스템에서 많이 사용되고 있는 플래시 메모리에 적용하기에 많은 문제점이 있다. 본 논문에서는 플래시 메모리의 특성을 고려하여 블록 사이즈를 재조정 함으로써 소규모 파일 시스템 관리에 유용하며 사용 빈도를 나타내는 블록을 추가하여 지움 정책, 파일 시스템 성능 향상을 위한 버퍼 캐쉬 기법에 의한 소규모 파일 시스템 모델을 설계하였다.

  • PDF

Design and Implementation of Kernel-Level Split and Merge Operations for Efficient File Transfer in Cyber-Physical System (사이버 물리 시스템에서 효율적인 파일 전송을 위한 커널 레벨 분할 및 결합 연산의 설계와 구현)

  • Park, Hyunchan;Jang, Jun-Hee;Lee, Junseok
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.14 no.5
    • /
    • pp.249-258
    • /
    • 2019
  • In the cyber-physical system, big data collected from numerous sensors and IoT devices is transferred to the Cloud for processing and analysis. When transferring data to the Cloud, merging data into one single file is more efficient than using the data in the form of split files. However, current merging and splitting operations are performed at the user-level and require many I / O requests to memory and storage devices, which is very inefficient and time-consuming. To solve this problem, this paper proposes kernel-level partitioning and combining operations. At the kernel level, splitting and merging files can be done with very little overhead by modifying the file system metadata. We have designed the proposed algorithm in detail and implemented it in the Linux Ext4 file system. In our experiments with the real Cloud storage system, our technique has achieved a transfer time of up to only 17% compared to the case of transferring split files. It also confirmed that the time required can be reduced by up to 0.5% compared to the existing user-level method.

Design of the Embedded Linux File System for the PDA System (PDA용 임베디드 리눅스 파일 시스템 설계)

  • 장승주;황정현;류진영
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.04a
    • /
    • pp.139-141
    • /
    • 2004
  • 본 논문에서는 PDA 용 임베디드 리눅스의 파일시스템을 설계한다. 개발을 위한 Host PC 구축[크로스 컴파일러(Cross compiler)] 및 커널 소스의 패치와 디버그를 통한 개발을 한다. 본 논문에서 PDA 시스템에 리눅스를 포팅 하여 PDA 임베디드 리눅스 시스템 및 파일 시스템을 설계한다.

  • PDF

A study on Dirty Pipe Linux vulnerability

  • Tanwar, Saurav;Kim, Hee Wan
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.3
    • /
    • pp.17-21
    • /
    • 2022
  • In this study, we wanted to examine the new vulnerability 'Dirty Pipe' that is founded in Linux kernel. how it's exploited and what is the limitation, where it's existed, and overcome techniques and analysis of the Linux kernel package. The study of the method used the hmark[1] program to check the vulnerabilities. Hmark is a whitebox testing tool that helps to analyze the vulnerability based on static whitebox testing and automated verification. For this purpose of our study, we analyzed Linux kernel code that is downloaded from an open-source website. Then by analyzing the hmark tool results, we identified in which file of the kernel it exists, cvss level, statistically depicted vulnerabilities on graph which is easy to understand. Furthermore, we will talk about some software we can use to analyze a vulnerability and how hmark software works. In the case of the Dirty Pipe vulnerability in Linux allows non-privileged users to execute malicious code capable of a host of destructive actions including installing backdoors into the system, injecting code into scripts, altering binaries used by elevated programs, and creating unauthorized user profiles. This bug is being tracked as CVE-2022-0847 and has been termed "Dirty Pipe"[2] since it bears a close resemblance to Dirty Cow[3], and easily exploitable Linux vulnerability from 2016 which granted a bad actor an identical level of privileges and powers.

A Study on Impersonation Attack of Linux Sudoers Through Shadow File Manipulation (Shadow 파일 조작을 통한 리눅스 Sudoer의 위장공격에 대한 연구)

  • Kim, Sanghun;Cho, Taenam
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.7
    • /
    • pp.149-156
    • /
    • 2020
  • All operating systems have privileged administrator accounts for efficient management. Dangerous or sensitive tasks or resources should be banned from normal users and should only be accessible by administrators. One example of this privilege is to reset a user's password when the user loses his/her password. In this paper, the privileges of the sudoer group, the administrator group of Linux Ubuntu, and the management system of the sudoer group were analyzed. We show the danger that a sudoer can use the privilege to change the password of other users, including other sudoers, and modify the log, and suggest a countermeasure to prevent the manipulation of shadow files as a solution to this. In addition, the proposed method was implemented and the possibility of practical use was confirmed with excellent performance.

Design and Implementation of Scalable VOD System on Linux (Linux상에서 확장 가능한 VOD시스템의 설계 및 구현)

  • 김정원;김인환;정기동
    • Journal of Korea Multimedia Society
    • /
    • v.2 no.3
    • /
    • pp.265-276
    • /
    • 1999
  • Video on Demand (VOD) system is definitely one of main applications in upcoming multimedia era. In this research, we have designed and implemented a host-based scalable VOD system (SVOD) which is composed of low cost PC servers and runs on Linux kernel that is currently spotlighted in enterprise and research domains. Our contribution is as follows: first, the previous Ext2 file system was modified to efficiently support continuous media like MPEG stream. Second, the storage server features a host-based scalable architecture. Third, a software MPEG decoder was implemented using Microsoft's DirectShow$\circledR$COM. Finally, flow control between client and server is provided to suppress overflow and underflow of client circular buffer and supports FF VCR operation. We have known that it is possible to develop a thread-based and scalable VOD system on low cost PC servers and free Linux kernel.

  • PDF