Auditing system logs is an important means of ensuring systems' security in situations where run-time security mechanisms are not sufficient to completely prevent potentially malicious activities. A fundamental requirement for reliable auditing is the integrity of the log entries. This paper presents an infrastructure for secure logging that is capable of detecting the tampering of logs by powerful adversaries residing on the device where logs are generated. We rely on novel features of trusted hardware (TPM) to ensure the continuity of the logging infrastructure across power cycles without help from a remote server. Our infrastructure also addresses practical concerns including how to handle high-frequency log updates, how to conserve disk...
Data logging is a critical activity and the foundation for several information security related acti...
Secure logs are powerful tools for building systems that must resist forgery, prove temporal relatio...
Uncorrupted log files are the critical system component for computer forensics in case of intrusion ...
<p>Auditing system logs is an important means of ensuring systems' security in situations where run-...
Secure perimeter schemes (e.g. DRM) and tracing traitor schemes (e.g. watermarking, audit logging) s...
System logging is an essential component of building and maintaining secure systems. Unfortunately, ...
Information systems in organizations are regularly subject to cyber attacks targeting confidential d...
In IT systems, a logfile provides administrators with an audit trail which can be used to review a s...
Part 3: Trusted ExecutionInternational audienceRemote mobile and embedded devices are used to delive...
Many real-world applications run on untrusted servers or are run on servers that are subject to stro...
Users in a datacenter or cloud system, including privileged users (e.g., root-level users), should b...
MasterIn this thesis, we propose a secure logging scheme (tamper-evidence) in off- line vehicles usi...
Audit logs are considered good practice for business systems, and are required by federal regulation...
It is common today in large corporate environments for system administrators to employ centralized s...
System logs are crucial for forensic analysis, but to be useful, they need to be tamper-proof. To pr...
Data logging is a critical activity and the foundation for several information security related acti...
Secure logs are powerful tools for building systems that must resist forgery, prove temporal relatio...
Uncorrupted log files are the critical system component for computer forensics in case of intrusion ...
<p>Auditing system logs is an important means of ensuring systems' security in situations where run-...
Secure perimeter schemes (e.g. DRM) and tracing traitor schemes (e.g. watermarking, audit logging) s...
System logging is an essential component of building and maintaining secure systems. Unfortunately, ...
Information systems in organizations are regularly subject to cyber attacks targeting confidential d...
In IT systems, a logfile provides administrators with an audit trail which can be used to review a s...
Part 3: Trusted ExecutionInternational audienceRemote mobile and embedded devices are used to delive...
Many real-world applications run on untrusted servers or are run on servers that are subject to stro...
Users in a datacenter or cloud system, including privileged users (e.g., root-level users), should b...
MasterIn this thesis, we propose a secure logging scheme (tamper-evidence) in off- line vehicles usi...
Audit logs are considered good practice for business systems, and are required by federal regulation...
It is common today in large corporate environments for system administrators to employ centralized s...
System logs are crucial for forensic analysis, but to be useful, they need to be tamper-proof. To pr...
Data logging is a critical activity and the foundation for several information security related acti...
Secure logs are powerful tools for building systems that must resist forgery, prove temporal relatio...
Uncorrupted log files are the critical system component for computer forensics in case of intrusion ...