• Title/Summary/Keyword: Secure Kernel

Search Result 48, Processing Time 0.024 seconds

Implementation and Performance Analysis of Partition-based Secure Real-Time Operating System (파티션 기반 보안 실시간 운영체제의 구현 및 성능 분석)

  • Kyungdeok Seo;Woojin Lee;Byeongmin Chae;Hoonkyu Kim;Sanghoon Lee
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.99-111
    • /
    • 2022
  • With current battlefield environment relying heavily on Network Centric Warfare(NCW), existing weaponary systems are evolving into a new concept that converges IT technology. Majority of the weaponary systems are implemented with numerous embedded softwares which makes such softwares a key factor influencing the performance of such systems. Furthermore, due to the advancements in both IoT technoogies and embedded softwares cyber threats are targeting various embedded systems as their scope of application expands in the real world. Weaponary systems have been developed in various forms from single systems to interlocking networks. hence, system level cyber security is more favorable compared to application level cyber security. In this paper, a secure real-time operating system has been designed, implemented and measured to protect embedded softwares used in weaponary systems from unknown cyber threats at the operating system level.

Current Issues for ROK Defense Modeling & Simulation Scheme under the Transition of New HLA Simulation Architecture (HLA 모의구조전환에 따른 한국군 DM&S 발전방안)

  • 이상헌
    • Journal of the military operations research society of Korea
    • /
    • v.26 no.2
    • /
    • pp.101-119
    • /
    • 2000
  • US DoD designated the High LEvel Architecture (HLA) as the standard technical architecture for all military simulation since 1996. HLA will supercede the current Distributed Interactive Simulation(DIS) and Aggregated LEvel Simulation Protocol(ALSP) methods by no funds for developing/modifying non-HLA compliant simulations. The new architecture specifies Rules which define relationships among federation components, an Objects Model Template which species the form which simulation elements are described, and an Interface Specification which describes the way simulations interact during operations. HLA is named as standard architecture in NATO, Australia and many other militaries. Also, it will be IEEE standard in the near future. It goes without saying that ROK military whose simulation models are almost from US must be prepared in areas such as ROK-US combined exercise, training, weapon system acquisition, interface models with C4I system, OPLAN analysis, operations, and os on. In this paper, we propose several effective alternatives and issues for ROK Defense Modeling and Simulation under the transition of new HLA architecture. Those include secure the kernel of new simulation technology and develop our own conceptual model, RTI software, prototype federation for each service and aggregated one. In order to challenge the new simulation architecture effectively, we should innovate our current defense modeling and simulation infrastructure such s manpower, organization, budget, research environment, relationships among academia and industry, and many others.

  • PDF

Design and Implementation of File Access Control Module Based on Multi-Operating System (멀티 운영체제 기반의 파일 접근 제어 모듈 설계 및 구현)

  • Soh, Woo-Young
    • Convergence Security Journal
    • /
    • v.7 no.4
    • /
    • pp.123-131
    • /
    • 2007
  • Recently, various threat and security incident are occurred for unspecified individuals, and this problem increases as the rapid of information sharing through Internet. The using of Information Security System such as IDS, Firewall, VPN etc. makes this problem minimal. However, professional knowledge or skill is needed in that case, normal user can't operate the Information Security System. This paper designs and implements File Access Control Module(FACM) to use easily for normal user against malicious threats and attacks. The FACM can exclude from malicious threats and attacks based on operation system rather than detection of threats and attacks. The FACM is working not only Windows System but also Linux System, and the FACM has effect on access control, integrity and non-repudiation for a file with an access control over files on the each OS that are used by multi-user.

  • PDF

Trends in Unikernel and Its Application to Manycore Systems (유니커널의 동향과 매니코어 시스템에 적용)

  • Cha, S.J.;Jeon, S.H.;Ramneek, Ramneek;Kim, J.M.;Jeong, Y.J.;Jung, S.I.
    • Electronics and Telecommunications Trends
    • /
    • v.33 no.6
    • /
    • pp.129-138
    • /
    • 2018
  • As recent applications are requiring more CPUs for their performance, manycore systems have evolved. Since existing operating systems do not provide performance scalability in manycore systems, Azalea, a multi-kernel based system, has been developed for supporting performance scalability. Unikernel is a new operating system technology starting with the concept of a library OS. Applying unikernel to Azalea enables an improvement in performance. In this paper, we first analyze the current technology trends of unikernel, and then discuss the applications and effects of unikernel to Azalea. Azalea-unikernel was built in a single image consisting of libOS, runtime libraries, and an application, and executed with the desired number of cores and memory size in bare-metal. In particular, it supports source and binary compatibility such that existing linux binaries can be rebuilt and executed in Azalea-unikernel, and already built binaries can be run immediately without modification with a better performance. It not only achieves a performance enhancement, it is also a more secure OS for manycore systems.

E-BLP Security Model for Secure Linux System and Its Implementation (안전한 리눅스 시스템을 위한 E-BLP 보안 모델과 구현)

  • Kang, Jung-Min;Shin, Wook;Park, Chun-Gu;Lee, Dong-Ik
    • The KIPS Transactions:PartA
    • /
    • v.8A no.4
    • /
    • pp.391-398
    • /
    • 2001
  • To design and develop secure operating systems, the BLP (Bell-La Padula) model that represents the MLP (Multi-Level Policy) has been widely adopted. However, user\`s security level in the most developed systems based on the BLP model is inherited to a process that is actual subject on behalf of the user, regardless whatever the process behavior is. So, there could be information disclosure threat or modification threat by malicious or unreliable processes even though the user is authorized in the system. These problems can be solved by defining the subject as (user, process) ordered pair and by defining the process reliability. Moreover, when the leveled programs which exist as objects in a disk are executed by a process and have different level from the process level, the security level decision problem occurs. This paper presents an extended BLP (E-BLP) model in which process reliability is considered and solves the security level decision problem. And this model is implemented into the Linux kernel 2.4.7.

  • PDF

Active Video Watermarking Technique for Infectious Information Hiding System (전염성 정보은닉 시스템을 위한 능동형 비디오 워터마킹 기법)

  • Jang, Bong-Joo;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.8
    • /
    • pp.1017-1030
    • /
    • 2012
  • Most watermarking schemes for video contents protection have been studied to increase watermark's robustness and invisibility against such compressions and many kinds of signal processing after embedding copyright information to the original contents. This paper proposes an active watermarking that infect watermark to contents in the video decoding process using embedded infectious watermark and control signals from a video encoder side. To achieve this algorithm, we design a kernel based watermarking in video encoder side that is possible to recover the original contents and watermark in watermark detection procedure perfectly. And then, by reversible de-watermarking in video decoder side, we design the active watermark infection method using detected watermark and control signal. This means that our system can provide secure re-distributions of video contents without any quality degration and watermark bit error against transcoding or re-encoding processing. By experimental results, we confirmed that the embedded watermark was infected by video contents and codec perfectly without any declines of compression ratio and video quality.

Population Size and Home Range Estimates of Domestic Cats (Felis catus) on Mara Islet, Jeju, in the Republic of Korea (제주 마라도에 서식하는 고양이(Felis catus)의 개체군 크기 및 행동권 추정)

  • Kim, Yujin;Lee, Woo-Shin;Choi, Chang-Yong
    • Korean Journal of Environment and Ecology
    • /
    • v.34 no.1
    • /
    • pp.9-17
    • /
    • 2020
  • Domestic cats (Felis catus) introduced to insular environments can be invasive predators that often threaten endemic species and cause biodiversity loss or local extinction on the island. This study was conducted from March to July 2018 to understand the population size, home range, and spatial use of cats introduced to Mara Islet (N 33° 07', E 126° 16') in Jeju Special Governing Province, the Republic of Korea. Observation records based on their natural marks revealed that there were 20 adult cats on Mara Islet. A capture-recapture method also estimated 20 adult individuals (95% confidence interval: 20-24 individuals). According to our telemetry study on ten adults deployed with GPS-based telemetry units, the home range size was 12.05±6.99 ha (95% KDE: kernel density estimation), and the core habitat size was 1.60±0.77 ha (50% KDE). There were no significant differences in the home range and core habitat sizes by sex. The home range of domestic cats overlapped with the human residential area, where they might secure easy foods. Five of ten tracked cats were active at potential breeding colonies for the Crested Murrlet (Synthliboramphus wumizusume), and six approached potential breeding areas of the Styan's Grasshopper Warbler (Locustella pleskei), suggesting the predation risk of the two endangered species by cats. This study provides novel information on the population size and home range of introduced cats on Mara Islet which is an important stopover site of migratory birds as well as a breeding habitat of the two endangered avian species. Reducing the potential negative impacts of the introduced cats on migratory birds and the endangered species on Mara Islet requires monitoring of the predation rate of birds by cats, the population trends of cats and endangered breeding birds as well as the effective cat population control and management.

Occurrence and Yield Characteristics of Lepidopteran Insect Pests in Green Maizes and Sorghum Crops between Paddy-upland Rotation and Continuing Upland Fields (유기농 풋옥수수와 수수의 답전윤환밭과 연속밭에서 나방류 해충들의 발생 및 수량 특성)

  • Jo, Hyeong-Chan;Kim, Min-Joon;Yoon, Sung-Tag;Lee, Hee-Kwon;Kim, Soon-Il
    • Korean Journal of Organic Agriculture
    • /
    • v.26 no.3
    • /
    • pp.409-425
    • /
    • 2018
  • Occurrence and yield characteristics of lepidopteran insect pests in both PUR (paddy-upland rotation) and CU (continuing upland) fields for 8 maize (Eolrukchal 1, Heugjeom 2, Miheukchal, Ilmichal, Heukjinjuchal, Chalok 4, Mibaek 2, Daehakchal) and 7 sorghum (Hwanggeumchal, Anzunbaengisusu, Moktaksusu, Sodamchal, DS-202, Nampungchal, Donganme) varieties was surveyed. The population of Ostrinia furnacalis adults showed 3 times highest peaks in 2016. In addition, the damaged ratios of maize and sorghum leaves and stems were increased depending on the growth periods of the crops and those by O. furnacalis larvae were also increased steeply in mid August. The damaged ratios of maizes such as Miheukchal, Eolrukchal 1, Ilmichal, Heugjeom 2, and Mibaek 2 by O. furnacalis larvae were statistically different (P=0.05) between organically managed PUR and CU fields. Except for DS202 among sorghum varieties, the damaged ratios of the other ones were high and similar (50-92%) in the CU field. The ear damaged ratio of maize varieties by lepidopteran larvae including O. furnacalis and Helicoverpa armigera was from 5 to 38% in Chalok 4 and Heukjinjuchal, respectively, and Daehakchal gave relatively higher damage ratio in the PUR field (33%) than in the CU field (14%). The ear ratio of Sodamchal and DS-202 varieties in the PUR field was 94 and 82%, and all sorghum varieties were damaged over 78% by lepidopteran larvae in the CU field. Interestingly, the correlation coefficients between the damaged ratio and invasive pores on their stems by O. furnacalis larvae were positive (maize $r=0.69_{paddy-upland}$, $0.95_{continuing}$; sorghum $r=0.93_{paddy-upland}$, $0.97_{continuing}$, respectively). Additionally, the correlation coefficients between the damaged ratio and the ear weight or the thousand kernel weight (g) of maizes and sorghums by lepidopteran larvae were negative (maize $r=-0.38_{paddy-upland}$, $-0.49_{continuing}$; sorghum $r=-0.70_{paddy-upland}$, $-0.57_{continuing}$, respectively). These results indicate that the focused management on lepidopteran insect pests occurring maizes and sorghums cultivated in PUR and CU fields is an important strategy to secure their yields.