To meet society’s needs for undergraduate students to have engineering skills and to develop students’ability to operate Linux and engage in network software development,this paper proposes the construction of a new...To meet society’s needs for undergraduate students to have engineering skills and to develop students’ability to operate Linux and engage in network software development,this paper proposes the construction of a new specialized course for network engineering major--Linux system and network programming.This paper analyzes the course’s advantages,presents the contents of this course,designs a series of teaching methods aimed at improving students’engineering ability,proposes a course assessment method that will encourage students to practice,lists the development requirements for an examination software designed for this course,and finally,presents the results of our practice in teaching this course.展开更多
As an universal bus technology at present time, I2C has been widely used in the interface between CPU and other devices such as EEPROM, RTC and small LCD. The architecture of I2C driver, the relationship of some impor...As an universal bus technology at present time, I2C has been widely used in the interface between CPU and other devices such as EEPROM, RTC and small LCD. The architecture of I2C driver, the relationship of some important data structure and the operation mechanism of the I2C driver have been analyzed. Finally, by taking an EEPROM chip named AT24C08 as a specific example, the flow of how to develop an I2C device driver is illustrated. In addition, the design of a new driver mode of single device with multi-drivers is realized.展开更多
With the development of embedded system, GUI becomes more and more important.As one of the most popular embedded GUI, MiniGUI became to be a key in researching the embedded GUI. This article firstly introduced embedde...With the development of embedded system, GUI becomes more and more important.As one of the most popular embedded GUI, MiniGUI became to be a key in researching the embedded GUI. This article firstly introduced embedded Linux system, processor ARM ,and S3C2410.Then, it analyses structures and primary predominances of MiniGUI. Finally, the transplantation of MiniGUI1.6.x based on $3C2410 is described in this paper.展开更多
Unpredictable and irreproducible digital keys are required to modulate security-related information in secure communication systems.True random number generators(TRNGs)rather than pseudorandom number generators(PRNGs)...Unpredictable and irreproducible digital keys are required to modulate security-related information in secure communication systems.True random number generators(TRNGs)rather than pseudorandom number generators(PRNGs)are required for the highest level of security.TRNG is a significant component in the digital security realm for extracting unpredictable binary bitstreams.Presently,most TRNGs extract high-quality“noise”from unpredictable physical random phenomena.Thus,these applications must be equipped with external hardware for collecting entropy and converting them into a random digital sequence.This study introduces a lightweight and efficient true random number generator(LETRNG)that uses the inherent randomness of a central processing unit(CPU)and an operating system(OS)as the source of entropy.We then utilize a lightweight post-processing method based on XOR and fair coin operation to generate an unbiased random binary sequence.Evaluations based on two famous test suites(NIST and ENT)show that LETRNG is perfectly capable of generating high-quality random numbers suitable for various GNU/Linux systems.展开更多
目前,国内外很多厂商推出了Linux系统中的终端检测响应(Endpoint Detection and Response,EDR)系统,为云平台、物联网、大数据计算等基础设施提供全面的安全检测和防护服务。但是,针对EDR文件防护功能的绕过攻击能够帮助恶意行为规避监...目前,国内外很多厂商推出了Linux系统中的终端检测响应(Endpoint Detection and Response,EDR)系统,为云平台、物联网、大数据计算等基础设施提供全面的安全检测和防护服务。但是,针对EDR文件防护功能的绕过攻击能够帮助恶意行为规避监控,造成严重的系统和数据安全风险。针对开源和商业闭源的Linux EDR系统,首先,阐述了文件防护功能的底层实现机制,对其核心技术原理进行了分析;其次,重点梳理了4种现有公开的文件防护绕过技术,提出了3种尚未公开的绕过技术,并且总结提炼为3种攻击类型;再次,基于上述绕过技术编写了验证工具,通过测试证明了这些技术方法对于部分Linux EDR系统的文件防护绕过能力;最后,给出了相应的安全防护建议。展开更多
基金supported by the Teaching Research and Reform Project of Qingdao University of Technology under Grant 2024-10335040。
文摘To meet society’s needs for undergraduate students to have engineering skills and to develop students’ability to operate Linux and engage in network software development,this paper proposes the construction of a new specialized course for network engineering major--Linux system and network programming.This paper analyzes the course’s advantages,presents the contents of this course,designs a series of teaching methods aimed at improving students’engineering ability,proposes a course assessment method that will encourage students to practice,lists the development requirements for an examination software designed for this course,and finally,presents the results of our practice in teaching this course.
文摘As an universal bus technology at present time, I2C has been widely used in the interface between CPU and other devices such as EEPROM, RTC and small LCD. The architecture of I2C driver, the relationship of some important data structure and the operation mechanism of the I2C driver have been analyzed. Finally, by taking an EEPROM chip named AT24C08 as a specific example, the flow of how to develop an I2C device driver is illustrated. In addition, the design of a new driver mode of single device with multi-drivers is realized.
文摘With the development of embedded system, GUI becomes more and more important.As one of the most popular embedded GUI, MiniGUI became to be a key in researching the embedded GUI. This article firstly introduced embedded Linux system, processor ARM ,and S3C2410.Then, it analyses structures and primary predominances of MiniGUI. Finally, the transplantation of MiniGUI1.6.x based on $3C2410 is described in this paper.
基金This work was partially supported by National Key R&D Program of China(No.2020YFC0832500)Fundamental Research Funds for the Central Universities(Nos.lzujbky-2021-sp47,lzujbky-2020-sp02,lzujbky-2019-kb51,and lzujbky2018-k12)the National Natural Science Foundation of China(No.61402210).We also gratefully acknowledge the support of NVIDIA Corporation with the donation of the Jetson-TX1 used for this research.
文摘Unpredictable and irreproducible digital keys are required to modulate security-related information in secure communication systems.True random number generators(TRNGs)rather than pseudorandom number generators(PRNGs)are required for the highest level of security.TRNG is a significant component in the digital security realm for extracting unpredictable binary bitstreams.Presently,most TRNGs extract high-quality“noise”from unpredictable physical random phenomena.Thus,these applications must be equipped with external hardware for collecting entropy and converting them into a random digital sequence.This study introduces a lightweight and efficient true random number generator(LETRNG)that uses the inherent randomness of a central processing unit(CPU)and an operating system(OS)as the source of entropy.We then utilize a lightweight post-processing method based on XOR and fair coin operation to generate an unbiased random binary sequence.Evaluations based on two famous test suites(NIST and ENT)show that LETRNG is perfectly capable of generating high-quality random numbers suitable for various GNU/Linux systems.