scholarly journals A Self-Code Integrity Verification Technique for Improving the Security of uC/OS-II Operating System

2019 ◽  
Vol 25 (7) ◽  
pp. 335-343
Author(s):  
Seungjae Han ◽  
Gyoosik Kim ◽  
Seong-je Cho
2016 ◽  
Vol 2016 ◽  
pp. 1-12 ◽  
Author(s):  
Chenlin Huang ◽  
Chuanwang Hou ◽  
Huadong Dai ◽  
Yan Ding ◽  
Songling Fu ◽  
...  

Trusted computing aims to build a trusted computing environment for information systems with the help of secure hardware TPM, which has been proved to be an effective way against network security threats. However, the TPM chips are not yet widely deployed in most computing devices so far, thus limiting the applied scope of trusted computing technology. To solve the problem of lacking trusted hardware in existing computing platform, an alternative security hardware USBKey is introduced in this paper to simulate the basic functions of TPM and a new reverse USBKey-based integrity verification model is proposed to implement the reverse integrity verification of the operating system boot process, which can achieve the effect of trusted boot of the operating system in end systems without TPMs. A Linux operating system booting method based on reverse integrity verification is designed and implemented in this paper, with which the integrity of data and executable files in the operating system are verified and protected during the trusted boot process phase by phase. It implements the trusted boot of operation system without TPM and supports remote attestation of the platform. Enhanced by our method, the flexibility of the trusted computing technology is greatly improved and it is possible for trusted computing to be applied in large-scale computing environment.


Author(s):  
E. Wisse ◽  
A. Geerts ◽  
R.B. De Zanger

The slowscan and TV signal of the Philips SEM 505 and the signal of a TV camera attached to a Leitz fluorescent microscope, were digitized by the data acquisition processor of a Masscomp 5520S computer, which is based on a 16.7 MHz 68020 CPU with 10 Mb RAM memory, a graphics processor with two frame buffers for images with 8 bit / 256 grey values, a high definition (HD) monitor (910 × 1150), two hard disks (70 and 663 Mb) and a 60 Mb tape drive. The system is equipped with Imaging Technology video digitizing boards: analog I/O, an ALU, and two memory mapped frame buffers for TV images of the IP 512 series. The Masscomp computer has an ethernet connection to other computers, such as a Vax PDP 11/785, and a Sun 368i with a 327 Mb hard disk and a SCSI interface to an Exabyte 2.3 Gb helical scan tape drive. The operating system for these computers is based on different versions of Unix, such as RTU 4.1 (including NFS) on the acquisition computer, bsd 4.3 for the Vax, and Sun OS 4.0.1 for the Sun (with NFS).


2020 ◽  
Vol 6 (1) ◽  
pp. 1
Author(s):  
Kuswanto Kuswanto ◽  
Juan Junius ◽  
Anita Christine Sembiring

Facility layout is integrated planning of the flow of a product in an operating system to obtain the most effective and efficient interrelation between workers, materials, machinery, and equipment as well as handling and transferring materials. A company engaged in furniture manufacturing has a problem in its production process, namely, the distance between machines is too far so that it affects the cost of handling materials. Distant workstations are found on profile machines, milling machines, measuring machines, cutting machines. Therefore, improvements must be made to the layout of facilities on the production floor so that facility layout is efficient and material handling costs are reduced. The problem-solving approach used is the Graph Method and CRAFT Algorithm. The results of the research show that material handling costs are reduced by 7.58% or Rp. 17,765 using the CRAFT algorithm.


Sign in / Sign up

Export Citation Format

Share Document