Digital Library[ Search Result ]
Adjusting OS Scheduler Parameters to Improve Server Application Performance
Taehyun Han, Hyeonmyeong Lee, Heeseung Jo
http://doi.org/10.5626/JOK.2020.47.7.643
Modern Linux servers are used in a variety of ways, from large servers to small IOTs, and most machines run their services through the default scheduler provided by Linux. Although it is possible to optimize for a specific purpose, there is a problem in which the average user cannot optimize all modern Linux applications. In this paper, we propose SCHEDTUNE to automatically optimize the scheduler configuration to maximize Linux server performance. SCHEDTUNE allows users to improve performance without modification to the application or basic kernel source running on the server. This makes it easy for administrators to configure schedulers that operate specifically for their servers. Experimental results showed that when SCHEDTUNE is applied, the maximum performance is achieved up to 19 %, and in most cases performance improvement is achieved as well.
FMProjector: A Formal Verification Framework for an Operating System Complying with a Standard Interface
http://doi.org/10.5626/JOK.2019.46.8.814
Formal verification techniques facilitate the verification of functional correctness of software. The verification, however, is rarely applicable to large-scale software, such as operating systems, because of the state explosion problem. International standards or certifications, such as IEC-61508 or DO-178, highly recommend formal verification of such software according to the level of safety. The paper introduces a formal verification framework, FMProjector, for operating systems complying with a standard interface. The framework includes horizontal and vertical approaches for systematic analysis of the software based on traceability from the standard interface to the source code. The paper also introduces a case study for the application of FMProjector to Qplus-AIR complying with ARINC-653 which is a standard interface for avionics real-time operating system.
Collecting Network Field Information using Machine Learning
Kyu Seok Han, Taekyu Kim, Shinwoo Shim, Sung Goo Jun, Jiwon Yoon
http://doi.org/10.5626/JOK.2018.45.10.1096
Recently, various systems based on Internet of Things (IOT) and Information and Communications Technologies(ICT) have been developed. Today, assorted devices are connected to a network, and various operating systems according to devices having different resources and functions have appeared. With the increased need for in hacking security, researches on the vulnerability analysis of the operating system installed on each device and the actual attack technique have been carried out. Accordingly, the type and detailed version of the operating system of the device, Function (API) is emerging as important information in security. Since the control of this information gathering in the cyber warfare is the first stage of the cyber threat, many studies have been conducted on mehods for controlling the network traffic while scanning. In order to bypass this control of the network, information collectors prepare countermeasures to secretly collect port information. In this paper, we deal with a scanning method that can acquire information about opponents through network basic commands which are not important in the network control system.
Vulnerability Analysis on Kernel Code and Memory Protection in Nested Kernel
http://doi.org/10.5626/JOK.2018.45.9.873
Nested Kernel is a secure kernel architecture, presented at the 2015 ACM ASPLOS conference, which aims at assuring the lifetime integrity of the kernel. With the conventional off-the-shelf HW-based protection facility, the Nested Kernel significantly improves the security of the system by introducing a new OS kernel architecture. However, our analysis reveals that the current Nested Kernel has some flaws in its implementation for handling direct mapping and the kernel code mapping region. In addition, its integrity can be broken because of the reported security vulnerability. Consequently, the Nested Kernel needs further study for it to be used safely as a security kernel.
Search

Journal of KIISE
- ISSN : 2383-630X(Print)
- ISSN : 2383-6296(Electronic)
- KCI Accredited Journal
Editorial Office
- Tel. +82-2-588-9240
- Fax. +82-2-521-1352
- E-mail. chwoo@kiise.or.kr