Faster Yet Safer: Logging System Via {Fixed-Key} Blockcipher

VT Hoang, C Wu, X Yuan - 31st USENIX Security Symposium (USENIX …, 2022 - usenix.org
System logs are crucial for forensic analysis, but to be useful, they need to be tamper-proof.
To protect the logs, a number of secure logging systems have been proposed from both …

Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations

P Frühwirt, P Kieseberg, K Krombholz, E Weippl - Digital Investigation, 2014 - Elsevier
Databases contain an enormous amount of structured data. While the use of forensic
analysis on the file system level for creating (partial) timelines, recovering deleted data and …

Pillarbox: Combating next-generation malware with fast forward-secure logging

KD Bowers, C Hart, A Juels… - Research in Attacks …, 2014 - Springer
Security analytics is a catchall term for vulnerability assessment and intrusion detection
leveraging security logs from a wide array of Security Analytics Sources (SASs), which …

A secure event logging system for smart homes

S Avizheh, TT Doan, X Liu, R Safavi-Naini - Proceedings of the 2017 …, 2017 - dl.acm.org
Smart homes include hundreds of devices that generate messages, and communicate with
each other and the world outside the home, to provide a highly functional, optimized and …

Attacks on secure logging schemes

G Hartung - … Conference on Financial Cryptography and Data …, 2017 - Springer
We present four attacks on three cryptographic schemes intended for securing log files
against illicit retroactive modification. Our first two attacks regard the LogFAS scheme by …

Droidforensics: Accurate reconstruction of android attacks via multi-layer forensic logging

X Yuan, O Setayeshfar, H Yan, P Panage… - Proceedings of the …, 2017 - dl.acm.org
The goal of cyber attack investigation is to fully reconstruct the details of an attack, so we can
trace back to its origin, and recover the system from the damage caused by the attack …

Secure audit logs with verifiable excerpts

G Hartung - Topics in Cryptology-CT-RSA 2016: The …, 2016 - Springer
Log files are the primary source of information when the past operation of a computing
system needs to be determined. Kee** correct and accurate log files is important for after …

Even more practical secure logging: Tree-based seekable sequential key generators

GA Marson, B Poettering - … -ESORICS 2014: 19th European Symposium on …, 2014 - Springer
Sequential key generators produce a forward-secure sequence of symmetric cryptographic
keys and are traditionally based on hash chains. An inherent disadvantage of such …

On the feasibility of secure logging for industrial control systems using blockchain

S Schorradt, E Bajramovic, F Freiling - Proceedings of the Third Central …, 2019 - dl.acm.org
With industrial control systems (ICSs) being increasingly networked, the need for sound
forensic capabilities for such systems increases. One vital source of information in forensic …

Compact and resilient cryptographic tools for digital forensics

EUA Seyitoglu, AA Yavuz… - 2020 IEEE Conference on …, 2020 - ieeexplore.ieee.org
Audit logs play a crucial role in the security of computer systems and are targeted by the
attackers due to their forensic value. Digital signatures are essential tools to ensure the …