• Title/Summary/Keyword: firmware

Search Result 238, Processing Time 0.032 seconds

Design and Implementation of Embedded System based on AM3359 Microprocessor (AM3359 마이크로프로세서 기반 임베디드 시스템 설계 및 제작)

  • Kim, Hyoung-Woo;Kim, Se-Jun;Choi, Joon-Young
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.12 no.2
    • /
    • pp.89-96
    • /
    • 2017
  • We develop an embedded system to measure various sensor data, control multiple motors, and communicate with mobile devices for system managements. Choosing TI AM3359 microprocessor featuring high processing performance, low power consumption, and various I/O device support, we design and build the embedded system hardware so that it supports multiple global positioning system (GPS) and gyro sensor modules to measure precise position; multiple pulse width modulation (PWM) outputs to control multiple direct current (DC) motors; a Bluetooth module to communicate with mobile devices. Then, we port the boot loader and device drivers to the built circuit board and construct the firmware development environment for the application programming. The performance of the designed and implemented embedded system is demonstrated by real motor control test using GPS and gyro sensor data and control parameters configured by a mobile device.

A Study on Digital Fault Locator for Transmission Line (송전선로용 디지털 고장점 표정장치에 관한 연구)

  • Lee, Kyung-Min;Park, Chul-Won
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.64 no.4
    • /
    • pp.291-296
    • /
    • 2015
  • Transmission line is exposed to a large area, and then faults are likely to occur than the other component of power system. When a fault occurs on a transmission line, fault locator helps fast recovery of power supply on power system. This paper deals with the design of a digital fault locator for improvement accuracy of the fault distance estimation and a fault occurrence position for transmission line. The algorithm of a fault locator uses a DC offset removal filter and DFT filter. The algorithm utilizes a fault data of GPS time synchronized. The computed fault information is transmitted to the other side substation through communication. The digital fault locator includes MPU module, ADPU module, SIU module, and a power module. The MMI firmware and software of the fault locator was implemented.

Requirements analysis and design for AMI firmware upgarde management system (AMI 펌웨어 업그레이드 시스템을 위한 요구분석 및 설계)

  • Jung, Nam-Joon;Yang, Il-Kwon;Kim, Dong-Wook
    • Proceedings of the KIEE Conference
    • /
    • 2011.07a
    • /
    • pp.1991-1992
    • /
    • 2011
  • 스마트미터링 혹은 스마트미터의 기본 요구사항 중 하나는 AMI 환경의 장비들에 대한 펌웨어 원격 업그레이드 기능이다. 수동적인 H/W 장비의 교체 없이 S/W 및 펌웨어 교체만으로 변화되는 환경에 유연하게 대체할 수 있도록 하며 다양한 부가서비스 창출 및 사업화지원을 위해서 시스템을 주기적으로 유지보수함으로써 유지보수에 필요한 인건비를 절감 한다는 측면과 서비스의 즉시성 측면에서 매우 중요하다. 본 논문에서는 AMI 시스템 개발 시작품 중 데이터수집장치 및 스마트 미터를 대상으로하는 원격 펌웨어 업그레이드시스템(FUMS, Firmware Upgrade Management System)의 국제적 수준의 일반적 요구기능과 시스템 설계 내용을 제시한다.

  • PDF

Design and Implementation of BACnet MS/TP Field Controller Prototype and MS/TP Network Monitoring System (BACnet MS/TP 필드제어기 프로토타입 및 MS/TP 네트워크 감시 장치의 설계 및 구현)

  • Park, Tae-Jin;Hong, Seung-Ho
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.56 no.4
    • /
    • pp.799-808
    • /
    • 2007
  • BACnet is an international standard communication protocol especially designed for building automation and control systems. BACnet uses the Master-Slave/Token-Passing (MS/TP) protocol as one of its field-level networks. A BACnet MS/TP field controller prototype and MS/TP network monitoring system are developed in this study. This report introduces the design and implementation methodology of a BACnet MS/TP field controller hardware, firmware and protocol stack. This report also presents the implementation methodology of BACnet MS/TP network monitoring system using VTS (Visual Test Shell). The methodologies introduced in this report will facilitate the develop and implementation of the BACnet-based control systems in building automation area.

A Method of Secreting Digital Signals by FWHT (FWHT에 의한 디지틀신호의 비화 방법)

  • Kim, Jang-Bok
    • The Journal of the Acoustical Society of Korea
    • /
    • v.6 no.1
    • /
    • pp.15-22
    • /
    • 1987
  • Fast Walsh-Hadamard Transform algorithm is discussed for secreting digital signals in ISDN. 16 characters are used for the password to control the coefficients of FWHT. And it gives above $3\times10^{38}$ codes. The FWHT module in presented in machine language. So it is applicable to compact cipher system or firmware system. Computer simulation showed secreting characteristics in printed data for N=128.

  • PDF

A study on the Second-Harmonic Generation(SBG) Conversion Characteristics of Nd:YAG Laser adopted Differential Superposition Mesh (중첩회로를 적용한 펄스형 Nd:YAG 레이저의 2차 SHG 변환효율에 관한 특성연구)

  • 김휘영;박두열
    • Proceedings of the IEEK Conference
    • /
    • 2001.06e
    • /
    • pp.215-218
    • /
    • 2001
  • A pulsed Nd:YAG laser is used widely for materials processing and medical instrument. It's very important to control the laser energy density in those fields using a pulsed Nd:YAG laser. A pulse repetition rate and a pulse width are regarded as the most dominant factors to control the energy density of laser beam. In this paper, the alternating charge and discharge system was designed to adjust a pulse repetition rate. This system is controlled by microprocessor and allows to frequence an expensive condenser for high frequency to cheap one for low frequency. In addtion, The microcontroller monitors the flow of cooling water, short circuit, and miss firing and so on. We designed Nd:YAG laser firmware with smart microcontroller, and want to explain general matters about the firmware from now.

  • PDF

Construction of Database for IoT Firmware Exploit (IoT 펌웨어 취약점 데이터베이스 구축 방안 연구)

  • Lee, Kyeong Seok;Cho, Ho Mook
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.115-118
    • /
    • 2020
  • 본 논문에서는 IoT 취약점 탐지 시스템과 취약점 데이터베이스 구축 방안을 제안한다. 동적 웹페이지 제어기술 기반의 크롤링 기법으로 펌웨어를 수집한 후, 패킹된 펌웨어 파일을 Binwalk, FMK를 활용하여 추출하고 Qemu 에뮬레이팅 기반의 실제 서비스를 실행시키는 시스템을 구현하여 펌웨어 취약점을 탐지할 수 있는 환경을 구축한다. 구축된 시스템을 통하여 수집, 추출, 에뮬레이팅 과정에서 생성된 데이터와 연계되어 탐지된 취약점 정보를 저장할 수 있는 데이터베이스를 제안한다. 제안된 시스템과 데이터베이스를 통하여 IoT 기기 펌웨어의 취약점을 탐지하고 예방을 할 수 있을 것이라 기대한다.

  • PDF

An Extension of Firmware-based LFSR One-Time Password Generators

  • HoonJae Lee;ByungGook Lee
    • International journal of advanced smart convergence
    • /
    • v.13 no.2
    • /
    • pp.35-43
    • /
    • 2024
  • In this paper, we propose two 127-bit LFSR (Linear Feedback Shift Register)-based OTP (One-Time Password) generators. One is a 9-digit decimal OTP generator with thirty taps, while the other is a 12-digit OTP generator with forty taps. The 9-digit OTP generator includes only the positions of Fibonacci numbers to enhance randomness, whereas the 12-digit OTP generator includes the positions of prime numbers and odd numbers. Both proposed OTP generators are implemented on an Arduino module, and randomness evaluations indicate that the generators perform well across six criteria and are straightforward to implement with Arduino.

Addressing Emerging Threats: An Analysis of AI Adversarial Attacks and Security Implications

  • HoonJae Lee;ByungGook Lee
    • International journal of advanced smart convergence
    • /
    • v.13 no.2
    • /
    • pp.69-79
    • /
    • 2024
  • AI technology is a central focus of the 4th Industrial Revolution. However, compared to some existing non-artificial intelligence technologies, new AI adversarial attacks have become possible in learning data management, input data management, and other areas. These attacks, which exploit weaknesses in AI encryption technology, are not only emerging as social issues but are also expected to have a significant negative impact on existing IT and convergence industries. This paper examines various cases of AI adversarial attacks developed recently, categorizes them into five groups, and provides a foundational document for developing security guidelines to verify their safety. The findings of this study confirm AI adversarial attacks that can be applied to various types of cryptographic modules (such as hardware cryptographic modules, software cryptographic modules, firmware cryptographic modules, hybrid software cryptographic modules, hybrid firmware cryptographic modules, etc.) incorporating AI technology. The aim is to offer a foundational document for the development of standardized protocols, believed to play a crucial role in rejuvenating the information security industry in the future.

Partial Fuzzing Technique for Lightweight Firmware Update of Internet of Things (사물 인터넷의 경량 펌웨어 업데이트를 위한 부분 퍼징 기법)

  • Na-Hyun Kim;Jin-Min Lee;Il-Gu Lee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2024.05a
    • /
    • pp.181-182
    • /
    • 2024
  • IoT(Internet of Things) 기기의 수가 급격히 증가하면서 무선 네트워크로 펌웨어와 데이터를 다운받아 업데이트하는 FOTA(Firmware Over-The-Air) 기술이 중요해지고 있다. 그러나, 종래 퍼징 기술은 펌웨어 취약점을 탐지할 때 요구되는 컴퓨팅 파워와 메모리가 커서 한정적인 자원을 지닌 IoT 기기에 적합하지 않다. 따라서 본 연구에서는 펌웨어 업데이트 파일에서 기존에 검증된 부분을 제외하고 업데이트된 부분만을 퍼징하는 부분 퍼징(Partial fuzzing) 기법을 제안한다. 실험 결과에 따르면 제안한 부분 퍼징 기법이 종래의 기법 대비 3 분 더 빨리 11 개의 크래시를 찾았고, 10 분의 퍼징 시간 동안 평균 1,044 (2 unique) 크래시를 추가로 발견했으며 평균 메모리 사용량을 232(KIB) 줄일 수 있었다.