• Title/Summary/Keyword: memory protection

검색결과 159건 처리시간 0.021초

Companies Entering the Metabus Industry - Major Big Data Protection with Remote-based Hard Disk Memory Analysis Audit (AUDIT) System

  • Kang, Yoo seok;Kim, Soo dong;Seok, Hyeonseon;Lee, Jae cheol;Kwon, Tae young;Bae, Sang hyun;Yoon, Seong do;Jeong, Hyung won
    • 통합자연과학논문집
    • /
    • 제14권4호
    • /
    • pp.189-196
    • /
    • 2021
  • Recently, as a countermeasure for cyber breach attacks and confidential leak incidents on PC hard disk memory storage data of the metaverse industry, it is required when reviewing and developing a remote-based regular/real-time monitoring and analysis security system. The reason for this is that more than 90% of information security leaks occur on edge-end PCs, and tangible and intangible damage, such as an average of 1.20 billion won per metaverse industrial security secret leak (the most important facts and numerical statistics related to 2018 security, 10.2018. the same time as responding to the root of the occurrence of IT WORLD on the 16th, as it becomes the target of malicious code attacks that occur in areas such as the network system web due to interworking integration when building IT infrastructure, Deep-Access-based regular/real-time remote. The concept of memory analysis and audit system is key.

DSP의 DMA 제어기를 이용한 변압기용 디지털 보호계전기의 성능향상 (Efficiency Improvement of Digital Protective Relay for Power Transformer Using DMA Controller of DSP)

  • 권기백;서희석;신명철
    • 대한전기학회논문지:전력기술부문A
    • /
    • 제52권11호
    • /
    • pp.647-654
    • /
    • 2003
  • As electrical power system has become complicated and enlarged to cope with the increasing electric demand, it has to be expected that higher speed, higher reliability, higher function and higher arithmetic ability in protective relay should be realized. Therefore, in this papers, by hardware design and implementation used DMA controller that transfer blocks of data to any location in the memory map without interfering with CPU operation, CPU utilization is increased effectively, as a result it made possible to implement multi-function digital protective relay which has high trust and high function of protection as well as control and metering for power transformers using single processor(DSP).

메모리 소자의 소프트 에러 극복을 위한 최적 스크러빙 방안 (An Optimal Scrubbing Scheme for Protection of Memory Devices against Soft Errors)

  • 류상문
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2011년도 추계학술대회
    • /
    • pp.677-680
    • /
    • 2011
  • 우주 방사선은 메모리 시스템에 소프트 에러를 야기할 수 있다. 소프트 에러는 오류 검출 및 정정 코드를 이용하여 극복될 수 있으며, 소프트 에러의 누적을 방지하기 위하여 스크러빙 작업이 병행되어야 한다. 본 논문은 CPU의 쓰기 동작 없이 소프트 에러를 정정할 수 있는 자가 오류 검출 및 정정 회로가 적용된 메모리 시스템에 적용할 수 있는 최적 스크러빙 수행 방안을 제안한다. 제안된 스크러빙 방안은 시스템의 가용한 스크러빙 로드와 시스템에서 실행되는 태스크의 주기적 메모리 접근을 함께 고려하여 최대의 신뢰도를 성취할 수 있도록 하여준다.

  • PDF

UTrustDisk: An Efficient Data Protection Scheme for Building Trusted USB Flash Disk

  • Cheng, Yong;Ma, Jun;Ren, Jiangchun;Mei, Songzhu;Wang, Zhiying
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권4호
    • /
    • pp.2276-2291
    • /
    • 2017
  • Data protection of removable storage devices is an important issue in information security. Unfortunately, most existing data protection mechanisms are aimed at protecting computer platform which is not suitable for ultra-low-power devices. To protect the flash disk appropriately and efficiently, we propose a trust based USB flash disk, named UTrustDisk. The data protection technologies in UTrustDisk include data authentication protocol, data confidentiality protection and data leakage prevention. Usually, the data integrity protection scheme is the bottleneck in the whole system and we accelerate it by WH universal hash function and speculative caching. The speculative caching will cache the potential hot chunks for reducing the memory bandwidth pollution. We adopt the symmetric encryption algorithm to protect data confidentiality. Before mounting the UTrustDisk, we will run a trusted virtual domain based lightweight virtual machine for preventing information leakage. Besides, we prove formally that UTrustDisk can prevent sensitive data from leaking out. Experimental results show that our scheme's average writing throughput is 44.8% higher than that of NH scheme, and 316% higher than that of SHA-1 scheme. And the success rate of speculative caching mechanism is up to 94.5% since the access pattern is usually sequential.

컴포넌트 오브젝트 모델을 응용한 계전 알고리즘 구현방법의 개선에 관한 연구 (A Study on the Improvement of the Method for Implementing Protection Algorithm by using Component Object Model(COM))

  • 박인권;윤남선;안복신
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 1998년도 하계학술대회 논문집 C
    • /
    • pp.1210-1212
    • /
    • 1998
  • The complexity of newly developed protection algorithm and higher performance requested by the user makes the software embedded in the protective relay much harder to develop and maintain. The versatility of 32bit microprocessor and the availability of cheaper memory semiconductors introduced the fertile developing background for the protective relay developers. The use of component object model(COM) in the software developing process enables the developer to write much complex code in the easy and safe way and to maintain the code easily, too. And the aid of the COM library, the distributed computing environment will be expected to appear by the use of the COM programming model in the protective relay firmware program.

  • PDF

EPLD를 이용한 안전성이 고려된 NMR PPC의 보팅메카니즘 설계와 신뢰도 분석 (Design of a Voting Mechanism considering Safety for NMR PPC Using EPLD and Reliability Analysis)

  • 유동완;박희윤;구인수;서보혁
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2000년도 하계학술대회 논문집 D
    • /
    • pp.2557-2560
    • /
    • 2000
  • The protection system of the nuclear reactor and chemical reactor are representative of PPC(Plant Protection Controller). This PPC must be designed based on reliability as well as concept of safety, which is a failed system go a way of safe. PPC is consist of part of data acquisition, calculator, communication with redundancy, and a voter is important factor of reliability. Because it is serial connected. This paper presents a Design and Analysis of a Voting Mechanism considering Safety for NMR PPC Using EPLD. In the case of digital implementation a coincidence logic(voter) of PPC, it needs CPU and memory, so increase a number of units. Therefore the failure rate and cost is increased. On the contrary when it is designed EPLD or FPGA.

  • PDF

구속 스트레스로 유발된 기억 손상에 대한 맥문동(麥門冬)의 신경보호 효능 (Liriopis Tuber improves stress-induced memorial impairments in rats)

  • 강영건;이태희
    • 대한본초학회지
    • /
    • 제21권2호
    • /
    • pp.63-75
    • /
    • 2006
  • Objectives : We investigated the effects of Liriopis Tuber on the nervous protection. Methods : We measured the reaction behavior with EPM(Elevated Plus Maxe) and MWM(Morris Water Maze) after applying restraint stress to rats. Also, the degrees of AchE generation were measured with immunohistochemical method in the regions of hippocampus, and the degree of TH generation in the regions of VTA and LC, respectively. Results : 1. As the results of measuring how long EPM which reflects anxiety reaction stayed in the open arm, there was the trend which can suppress anxiety reaction in the MMD+stress group(Liriopis Tuber+stress) but no statistical significance. The counting results how many EPM passed between opened and closed arm showed suppression trend against a physical activity in the saline+stress group but there was no statistical significance. 2. According to the result of MWM, the saline+stress group showed the learning retardation which means increased time arriving at goal compared to ti1e normal group at the second and third day of measurement. On the contrary, a learning retardation was significantly decreased in the MMD+stress group. Among the probe trial test a memory loss occurred in the saline+stress group, meanwhile memory ability was notably increased in the saline-stress group. 3. The degree of TH generation was investigated at the VTA and LC respectively after test animals treated with drug. In the saline+stress group, TH-immunoreactive cells were significantly increased, and these stress-induced TH increases were suppressed in the saline+stress group at the VTA region. However, the saline+stress group did not show any significant difference. 4. the degree of AchE generation was investigated at the CA3 of hippocampus. The saline+stress group showed that AchE-immunoreactive cells were significantly decreased. Those stress-induced reductions of AchE cells were meaningfully recovered in the saline+stress group. Although the cells showed recovery trend in the region of CA1 of hippocampus, statistical significance was not observed. Conclusion : The results of our study indicate that Liriopis Tuber can improve spatial memory ability of rats applied a restraint stress. This improvement of the spatial memory ability is considered to have an efficacy of nervous protection that Liriopis Tuber suppresses the generation of AchE in the hippocampus region and enhances the generation of TH in the VTA.

  • PDF

Graceful Degradation FEC Layer for Multimedia Broadcast/Multicast Service in LTE Mobile Systems

  • Won, Seok Ho
    • ETRI Journal
    • /
    • 제35권6호
    • /
    • pp.1068-1074
    • /
    • 2013
  • This paper proposes an additional forward error correction (FEC) layer to compensate for the defectiveness inherent in the conventional FEC layer in the Long Term Evolution specifications. The proposed additional layer is called a graceful degradation (GD)-FEC layer and maintains desirable service quality even under burst data loss conditions of a few seconds. This paper also proposes a non-delayed decoding (NDD)-GD-FEC layer that is inherent in the decoding process. Computer simulations and device-based tests show a better loss recovery performance with a negligible increase in CPU utilization and occupied memory size.

Statistical Analysis of Lightning-Induced Voltages on Subscriber Telecommunication Lines in Korea

  • Oh, Ho-Seok;Park, Dong-Chul
    • Journal of electromagnetic engineering and science
    • /
    • 제8권4호
    • /
    • pp.148-152
    • /
    • 2008
  • This paper describes the characteristics of lightning-induced voltages on subscriber telecommunication lines in Korea. Lightning parameters such as peak voltage, rise time, decay time, and steepness of the wave front were statistically analyzed from the measured results obtained using a waveform memory system. An induced voltage measurement system was also developed and installed at 286 sites in Korea to collect the induced voltage data. The distributions of lightning-induced voltages were also analyzed using these data.

이진 조작을 통한 정적 스택 보호 시 발생하는 명령어 밀림현상 방지 기법 (Instruction-corruption-less Binary Modification Mechanism for Static Stack Protections)

  • 이영림;김영필;유혁
    • 한국정보과학회논문지:컴퓨팅의 실제 및 레터
    • /
    • 제14권1호
    • /
    • pp.71-75
    • /
    • 2008
  • 현재 많은 센서 운영체제에서는 메모리 제약 때문에 스레드 스택을 공유한다. 하지만 대부분의 대상 플랫폼에서는 MMU가 없어서 하드웨어적으로 스택 보호가 이루어지기 어렵다. 이러한 문제를 해결하기 위해 바이너리코드에 스택 보호 기능을 가진 래퍼 함수를 추가하고 바이너리 코드 안에 존재하는 스택 연산 명령어들을 스택 보호 기능을 가진 래퍼 함수호출로 바꾸어준다. 이때 스택 영역에 접근하는 명령어들과 스택 관리 모듈로의 분기 명령어간의 명령어 길이 차이에 의한 명령어 밀림현상이 발생한다. 이러한 문제를 해결하기 위해 본 논문에서는 밀림현상을 발생시키지 않고 임의의 명령어를 추가된 임의의 모듈을 호출하는 알고리즘을 제안하였다. 이 알고리즘은 제한된 도달 범위를 가지는 분기명령어를 반복적으로 사용하여 명령어 밀림현상 없이 추가된 임의의 모듈에 도달하게 한다. 본 논문에서 제안한 알고리즘은 센서 노드의 소프트웨어 보안 패치와 소프트웨어적 유지 보수를 용이하게 할 것이다.