11 research outputs found

    A Secure Storage System for Sensitive Data Protection Based on Mobile Virtualization

    No full text
    Recently, the development of smart phones has been reported the number of security vulnerabilities. Although these smart phones have a concept of Sandbox for the security, sensitive personal information has been still exposed by internal data exchange or root privilege acquisition. In this paper, we propose a system framework for secure storage of sensitive data in smartphone. The system is divided into general domain (GD) and secure domain (SD) in mobile device utilizing domain separation technique of virtualization, and SD provides a secure execution environment to protect sensitive data and secure services. In addition, our system introduces the secure functions such as authentication/access control, and encryption/key management and secures filesystem to be run in SD and addresses a detailed secure filesystem as a key function for secure storage. Lastly, the experiments are conducted to measure the performance overhead imposed by security features in SD and by overall system with interdomain communication from GD to SD. These experiment results show suitability of our system and suggest applicability of various secure functions which can be applied in our secure storage system

    A Framework for Detecting Vehicle Occupancy Based on the Occupant Labeling Method

    Get PDF
    High-occupancy vehicle (HOV) lanes or congestion toll discount policies are in place to encourage multipassenger vehicles. However, vehicle occupancy detection, essential for implementing such policies, is based on a labor-intensive manual method. To solve this problem, several studies and some companies have tried to develop an automated detection system. Due to the difficulties of the image treatment process, those systems had limitations. This study overcomes these limits and proposes an overall framework for an algorithm that effectively detects occupants in vehicles using photographic data. Particularly, we apply a new data labeling method that enables highly accurate occupant detection even with a small amount of data. The new labeling method directly labels the number of occupants instead of performing face or human labeling. The human labeling, used in existing research, and occupant labeling, this study suggested, are compared to verify the contribution of this labeling method. As a result, the presented model’s detection accuracy is 99% for the binary case (2 or 3 occupants or not) and 91% for the counting case (the exact number of occupants), which is higher than the previously studied models’ accuracy. Basically, this system is developed for the two-sided camera, left and right, but only a single side, right, can detect the occupancy. The single side image accuracy is 99% for the binary case and 87% for the counting case. These rates of detection are also better than existing labeling

    The Evaluation Method for ESD Immunity of Components in Terms of Soft Error

    No full text
    A hand-held product like a camera and a mobile-phone must be satisfied with ESD Standard. Mostly IEC 61000-4-2 is applied. In this SET-level ESD test, considerable reason of failure is malfunction of major semiconductor parts (CPU, Memory and Sensor etc.) Recently, due to the semiconductor becoming more refined, high speed and multifunction, that failure trend is getting more general. The importance of cooperation between set developer and component developer has been emphasized in ESD field. Especially, making a correlation in measurement and analytical method is very important. Through this paper, the evaluation method for ESD immunity of components will be suggested for designing ESD robust product

    A Novel Method for ESD Soft Error Analysis on Integrated Circuits using a TEM Cell

    No full text
    The ultimate goal of this work is to predict ESD system level behavior. A methodology which can evaluate the IC immunity in terms of ESD-induced soft error is introduced. A modified TEM cell and a simple test board with a memory IC are designed for this purpose. The correlation between product level ESD standard test and the proposed IC immunity test is discussed

    A Novel Shielding Effectiveness Matrix of Small Shield Cans Based on Equivalent Dipole Moments for Radio-Frequency Interference Analysis

    No full text
    A definition of a shielding effectiveness (SE) matrix for small shield cans used to suppress intra-system noise coupling in mobile devices is proposed. Assuming shield cans enclosing a noise source can be modeled as equivalent dipole moments along with integrated circuits (ICs), a new SE matrix for radio-frequency interference analysis is defined as a ratio of equivalent dipole moments with and without a shield can. The equivalent dipole moments are experimentally extracted using a GTEM cell and two types of probes (monopole and loop), which mimic well the radiations of ICs. Furthermore, the estimation of suppression of noise coupling to an antenna using the proposed SE matrix is successfully validated through numerical simulations

    Software-Based Instrumentation for Localization of Faults Caused by Electrostatic Discharge

    No full text
    Electrostatic discharge (ESD) is often the cause of system-level failure or malfunction of embedded systems. The underlying faults are difficult to localize, as the information gained from the hardware-based diagnostic methods typically in use lacks sufficient detail. The alternative proposed in this paper is software instrumentation that monitors key registers and flags to detect anomalies indicative of failure. In contrast to hardware-based techniques, which use invasive probes that can alter the very phenomena being studied; the proposed approach makes use of standard peripherals such as the serial or Ethernet port to monitor and record the effect of ESD. We illustrate the use of this software instrumentation technique in conjunction with a three-dimensional ESD injection system to produce a sensitivity map that visualizes the susceptibility of various segments of an embedded system to ESD

    A Study of a Measurement and Simulation Method on ESD Noise Causing Soft-Errors by Disturbing Signals

    No full text
    A methodology to measure and simulate ESD induced noise on active IC Pins is introduced. A simple experimental setup injects ESD noise from an ESD generator and captures the waveforms. Secondly, the waveforms are simulated using a combination of 3D simulation and SPICE modeling

    Security, Privacy and Trust for Smart Mobile-Internet of Things (M-IoT) : A Survey

    No full text
    With an enormous range of applications, the Internet of Things (IoT) has magnetized industries and academicians from everywhere. IoT facilitates operations through ubiquitous connectivity by providing Internet access to all the devices with computing capabilities. With the evolution of wireless infrastructure, the focus from simple IoT has been shifted to smart, connected and mobile IoT (M-IoT) devices and platforms, which can enable low-complexity, low-cost and efficient computing through sensors, machines, and even crowdsourcing. All these devices can be grouped under a common term of M-IoT. Even though the positive impact on applications has been tremendous, security, privacy and trust are still the major concerns for such networks and insufficient enforcement of these requirements introduces non-negligible threats to M-IoT devices and platforms. Thus, it is important to understand the range of solutions which are available for providing a secure, privacy-compliant, and trustworthy mechanism for M-IoT. There is no direct survey available, which focuses on security, privacy, trust, secure protocols, physical layer security and handover protections in M-IoT. This paper covers such requisites and presents comparisons of state-the-art solutions for IoT which are applicable to security, privacy, and trust in smart and connected M-IoT networks. Apart from these, various challenges, applications, advantages, technologies, standards, open issues, and roadmap for security, privacy and trust are also discussed in this paper.Validerad;2020;Nivå 2;2020-09-24 (johcin)</p
    corecore