In IT systems, a logfile provides administrators with an audit trail which can be used to review a system’s activities and a way to discover and diagnose problems which have occurred within that system. When an attacker penetrates an IT system, commonly one of their first actions is tampering with the logs, so that they can hide their malicious activities. For most types of systems a suitable secure logging solution exists. These solutions prevent an adversary from tampering with the system logs, or make it infeasible to do so undetectably. However, the solutions that exist for devices with limited computing power, “resource-constrained” devices, are all unsuited for long-term unsupervised deployment. In this scenario a device is deployed i...
It is common today in large corporate environments for system administrators to employ centralized s...
Information systems in organizations are regularly subject to cyber attacks targeting confidential d...
In View Of The Fact That Log Files Hold Record Of Most System Events Including User Activities They ...
Secure perimeter schemes (e.g. DRM) and tracing traitor schemes (e.g. watermarking, audit logging) s...
Auditing system logs is an important means of ensuring systems' security in situations where run-tim...
Abstract—Audit logs, providing information about the current and past states of systems, are one of ...
System logging is an essential component of building and maintaining secure systems. Unfortunately, ...
Keeping logs secure and untampered with has always been a problem. The first things a cracker goes a...
Logging is a key mechanism in the security of computer systems. Beyond supporting important forwar...
Abstract. Computer log files constitute a precious resource for system administrators for discov-eri...
Uncorrupted log files are the critical system component for computer forensics in case of intrusion ...
A hardware-assisted technique may protect a system log from attackers, regardless of an attacker's a...
Part 3: Trusted ExecutionInternational audienceRemote mobile and embedded devices are used to delive...
International audienceDigital forensics are vital in the Internet of Things (IoT) domain. This is du...
System logs are crucial for forensic analysis, but to be useful, they need to be tamper-proof. To pr...
It is common today in large corporate environments for system administrators to employ centralized s...
Information systems in organizations are regularly subject to cyber attacks targeting confidential d...
In View Of The Fact That Log Files Hold Record Of Most System Events Including User Activities They ...
Secure perimeter schemes (e.g. DRM) and tracing traitor schemes (e.g. watermarking, audit logging) s...
Auditing system logs is an important means of ensuring systems' security in situations where run-tim...
Abstract—Audit logs, providing information about the current and past states of systems, are one of ...
System logging is an essential component of building and maintaining secure systems. Unfortunately, ...
Keeping logs secure and untampered with has always been a problem. The first things a cracker goes a...
Logging is a key mechanism in the security of computer systems. Beyond supporting important forwar...
Abstract. Computer log files constitute a precious resource for system administrators for discov-eri...
Uncorrupted log files are the critical system component for computer forensics in case of intrusion ...
A hardware-assisted technique may protect a system log from attackers, regardless of an attacker's a...
Part 3: Trusted ExecutionInternational audienceRemote mobile and embedded devices are used to delive...
International audienceDigital forensics are vital in the Internet of Things (IoT) domain. This is du...
System logs are crucial for forensic analysis, but to be useful, they need to be tamper-proof. To pr...
It is common today in large corporate environments for system administrators to employ centralized s...
Information systems in organizations are regularly subject to cyber attacks targeting confidential d...
In View Of The Fact That Log Files Hold Record Of Most System Events Including User Activities They ...