NXG03-6: Design and Implementation of Split TCP in the Linux Kernel

Author(s):  
Rahul Jain ◽  
Teunis J. Ott
2012 ◽  
Vol 182-183 ◽  
pp. 835-839
Author(s):  
Peng Ying Yang ◽  
Yu Xia Sun

A keyword filter system is constructed based on Linux kernel firewall and netfilter-queue. Packets with http information will be sent to Netfilter and wait for decisions through using IP tables. The system can do deep filtering to packets and use multi-pattern algorithm, which increases the fitness and efficiency.


Author(s):  
Yuta Imamura ◽  
Rintaro Orito ◽  
Hiroyuki Uekawa ◽  
Kritsana Chaikaew ◽  
Pattara Leelaprute ◽  
...  

AbstractMany Android apps employ WebView, a component that enables the display of web content in the apps without redirecting users to web browser apps. However, WebView might also be used for cyberattacks. Moreover, to the best of our knowledge, although some countermeasures based on access control have been reported for attacks exploiting WebView, no mechanism for monitoring web access via WebView has been proposed and no analysis results focusing on web access via WebView are available. In consideration of this limitation, we propose a web access monitoring mechanism for Android WebView to analyze web access via WebView and clarify attacks exploiting WebView. In this paper, we present the design and implementation of this mechanism by modifying Chromium WebView without any modifications to the Android framework or Linux kernel. The evaluation results of the performance achieved on introducing the proposed mechanism are also presented here. Moreover, the result of threat analysis of displaying a fake virus alert while browsing websites on Android is discussed to demonstrate the effectiveness of the proposed mechanism.


2014 ◽  
Vol 1078 ◽  
pp. 262-265
Author(s):  
Yan Ling Zhao ◽  
Shi Hai Zhang

In this paper, GPRS module, including the design and implementation of the telephone terminal interface circuit design TV interface circuit, interface GPRS module and starting circuit are designed based on ARM embedded platform. Software is also designed primarily Bootloader and Linux kernel porting, system part of the driver, the results of the design through experimental verification, the results show that the system can communicate data, you can use AT commands to achieve messaging and voice capabilities.


2012 ◽  
Vol 220-223 ◽  
pp. 2891-2894
Author(s):  
Wan Li Feng ◽  
Hong Zhou ◽  
Chang Hui Yu

It is an important ways that the Trojan Horse invades the Linux system through the kernel hacking. Its principle is using the mechanism provided by Linux kernel to realize Trojan Horse functions,which is mainly realized through the kernel programming. This paper has studied the two methods of kernel hacking with emphasis:Directly revises the kernel source codes and uses the Linux module mechanism. Finally, on this basis, a kind of kernel hacking Trojan Horse has been designed and realized.


Sign in / Sign up

Export Citation Format

Share Document