Auditing is a powerful tool that provides machine operators with the mechanisms to observe, and glean insights from, generic computing systems. The information obtained by auditing systems can be used to detect and explain suspicious activity, from fault/error diagnosis to intrusion detection and forensics after security incidents. While such mechanisms would be beneficial for Real-Time Systems (RTS), existing audit frameworks are rarely designed for this domain. If audit mechanisms are not carefully integrated into real-time operating systems, they can negatively impact the temporal constraints of RTS. In this paper, we demonstrate how to apply commodity audit frameworks to real-time systems. We design novel kernel-based reduction techniqu...
[Summary]: This paper reports the results of a research project which examines the feasibility of de...
System logging is an essential component of building and maintaining secure systems. Unfortunately, ...
Today\u27s interconnected world consists of a broad set of online activities including banking, shop...
System auditing is a powerful tool that provides insight into the nature of suspicious events in com...
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Compute...
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Compute...
Event auditing today is a resource consuming process. Rapidly increasing performance of hardware res...
Logging is a well-established technique to record dynamic information during system execution. It ha...
The proliferation of binary-only program analysis techniques like fuzz testing and symbolic analysis...
In this paper, we introduce Audlib, an extendable tool for generating security-relevant information...
In Runtime Verification (RV), monitors check programs for correct operation at execution time. Also...
Execution paths expose non-functional information such as system reliability and performance, which ...
MEng thesisThis thesis provides a complete design and implementation of audit trail collection and s...
AbstractOne approach to secure systems is through the analysis of audit trails. An audit trail is a ...
Thesis submitted in partial fulfillment of the requirements for the Degree of Master of Science in I...
[Summary]: This paper reports the results of a research project which examines the feasibility of de...
System logging is an essential component of building and maintaining secure systems. Unfortunately, ...
Today\u27s interconnected world consists of a broad set of online activities including banking, shop...
System auditing is a powerful tool that provides insight into the nature of suspicious events in com...
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Compute...
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Compute...
Event auditing today is a resource consuming process. Rapidly increasing performance of hardware res...
Logging is a well-established technique to record dynamic information during system execution. It ha...
The proliferation of binary-only program analysis techniques like fuzz testing and symbolic analysis...
In this paper, we introduce Audlib, an extendable tool for generating security-relevant information...
In Runtime Verification (RV), monitors check programs for correct operation at execution time. Also...
Execution paths expose non-functional information such as system reliability and performance, which ...
MEng thesisThis thesis provides a complete design and implementation of audit trail collection and s...
AbstractOne approach to secure systems is through the analysis of audit trails. An audit trail is a ...
Thesis submitted in partial fulfillment of the requirements for the Degree of Master of Science in I...
[Summary]: This paper reports the results of a research project which examines the feasibility of de...
System logging is an essential component of building and maintaining secure systems. Unfortunately, ...
Today\u27s interconnected world consists of a broad set of online activities including banking, shop...