Logging is a key mechanism in the security of computer systems. Beyond supporting important forward security properties, it is critical that logging withstands both failures and intentional tampering to prevent subtle attacks leaving the system in an inconsistent state with inconclusive evidence. We propose new techniques combining forward security with crash recovery for secure log data storage. As the support of specifically forward integrity and the online nature of logging prevent the use of conventional coding, we propose and analyze a coding scheme resolving these unique design constraints. Specifically, our coding enables forward integrity, online encoding, and most importantly a constant number of operations per encoding. It a...
Information systems in organizations are regularly subject to cyber attacks targeting confidential d...
Agnostic fault-tolerant systems cannot recover to a consistent state if a failure/crash occurs durin...
Current signature and encryption schemes secure against continual leakage fail completely if the key...
Keeping correct and informative log files is crucial for system maintenance, security and forensics....
In IT systems, a logfile provides administrators with an audit trail which can be used to review a s...
System logs are crucial for forensic analysis, but to be useful, they need to be tamper-proof. To pr...
Abstract. Computer log files constitute a precious resource for system administrators for discov-eri...
We investigate the problem of maintaining an encoded distributed storage system when some nodes cont...
System logging is an essential component of building and maintaining secure systems. Unfortunately, ...
Logs are append-only time-stamped records to represent events in computers or network devices. Today...
Write-ahead log and data encryption technologies are employed to ensure both crash consistency and d...
Abstract—Audit logs, providing information about the current and past states of systems, are one of ...
We propose the Cloud Log Assuring Soundness and Secrecy (CLASS) process as an elective plan for the ...
Uncorrupted log files are the critical system component for computer forensics in case of intrusion ...
In View Of The Fact That Log Files Hold Record Of Most System Events Including User Activities They ...
Information systems in organizations are regularly subject to cyber attacks targeting confidential d...
Agnostic fault-tolerant systems cannot recover to a consistent state if a failure/crash occurs durin...
Current signature and encryption schemes secure against continual leakage fail completely if the key...
Keeping correct and informative log files is crucial for system maintenance, security and forensics....
In IT systems, a logfile provides administrators with an audit trail which can be used to review a s...
System logs are crucial for forensic analysis, but to be useful, they need to be tamper-proof. To pr...
Abstract. Computer log files constitute a precious resource for system administrators for discov-eri...
We investigate the problem of maintaining an encoded distributed storage system when some nodes cont...
System logging is an essential component of building and maintaining secure systems. Unfortunately, ...
Logs are append-only time-stamped records to represent events in computers or network devices. Today...
Write-ahead log and data encryption technologies are employed to ensure both crash consistency and d...
Abstract—Audit logs, providing information about the current and past states of systems, are one of ...
We propose the Cloud Log Assuring Soundness and Secrecy (CLASS) process as an elective plan for the ...
Uncorrupted log files are the critical system component for computer forensics in case of intrusion ...
In View Of The Fact That Log Files Hold Record Of Most System Events Including User Activities They ...
Information systems in organizations are regularly subject to cyber attacks targeting confidential d...
Agnostic fault-tolerant systems cannot recover to a consistent state if a failure/crash occurs durin...
Current signature and encryption schemes secure against continual leakage fail completely if the key...