There is a large body of work-such as system administration and intrusion detection-that relies upon storage system logs and snapshots. These solutions rely on accurate system records, however, little effort has been made to verify the correctness of logging instrumentation and log reliability. We present a solution, called ExDiff, that uses expectation differencing to validate storage system logs. Our solution can identify development errors such as the omission of a logging point and runtime errors such as log crashes. ExDiff uses metadata snapshots and activity logs to predict the expected state of the system and compares that with the system's actual state. Mismatches between the expected and actual metadata states can then be used to h...
[[abstract]]Public auditing is an important issue in cloud storage service because a cloud service p...
Storage-based intrusion detection allows storage systems to watch for data modifications characteris...
Modern data storage systems have a sophisticated hardware and software architecture, including multi...
99 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2009.Nowadays, over 90% new informa...
One of the most fundamental storage system research tasks is activity tracing. By understanding the ...
Audit logs are considered good practice for business systems, and are required by federal regulation...
This work addresses the question of determining the correctness of forensic file system analysis sof...
Software faults are recognized to be among the main responsible for system failures in many applicat...
With in-memory databases (IMDBs), where all data sets reside in main memory for fast processing spee...
As distributed storage systems become central to business operations, increasing their reliability b...
This paper shows how to use model checking to find serious errors in file systems. Model checking is...
ABSTRACT Data integrity is a fundamental aspect of storage security and re-liability. With the adven...
Background: With the advent of the information age, there are many large numbers of services rising ...
Data storage devices which contain firmware typically implement security features such a digitally s...
Abstract. While logging events is becoming increasingly common in computing, in communication and in...
[[abstract]]Public auditing is an important issue in cloud storage service because a cloud service p...
Storage-based intrusion detection allows storage systems to watch for data modifications characteris...
Modern data storage systems have a sophisticated hardware and software architecture, including multi...
99 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2009.Nowadays, over 90% new informa...
One of the most fundamental storage system research tasks is activity tracing. By understanding the ...
Audit logs are considered good practice for business systems, and are required by federal regulation...
This work addresses the question of determining the correctness of forensic file system analysis sof...
Software faults are recognized to be among the main responsible for system failures in many applicat...
With in-memory databases (IMDBs), where all data sets reside in main memory for fast processing spee...
As distributed storage systems become central to business operations, increasing their reliability b...
This paper shows how to use model checking to find serious errors in file systems. Model checking is...
ABSTRACT Data integrity is a fundamental aspect of storage security and re-liability. With the adven...
Background: With the advent of the information age, there are many large numbers of services rising ...
Data storage devices which contain firmware typically implement security features such a digitally s...
Abstract. While logging events is becoming increasingly common in computing, in communication and in...
[[abstract]]Public auditing is an important issue in cloud storage service because a cloud service p...
Storage-based intrusion detection allows storage systems to watch for data modifications characteris...
Modern data storage systems have a sophisticated hardware and software architecture, including multi...