Boeck et al., 2010 - Google Patents
Towards more trustable log files for digital forensics by means of “trusted computing”Boeck et al., 2010
- Document ID
- 18221438749734850513
- Author
- Boeck B
- Huemer D
- Tjoa A
- Publication year
- Publication venue
- 2010 24th IEEE International Conference on Advanced Information Networking and Applications
External Links
Snippet
Trustable log data is essential in digital forensic investigations in order to allow reliable reconstruction of events. Existing solutions do not provide adequate protection, exposing the log-producing application to software-based attacks. In this paper we provide a solution …
- 238000005516 engineering process 0 abstract description 8
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10484365B2 (en) | Space-time separated and jointly evolving relationship-based network access and data protection system | |
Dunn et al. | Cloaking malware with the trusted platform module | |
US10885197B2 (en) | Merging multiple compute nodes with trusted platform modules utilizing authentication protocol with active trusted platform module provisioning | |
Tomlinson | Introduction to the TPM | |
Xu et al. | Data-provenance verification for secure hosts | |
Nguyen et al. | Cloud-based secure logger for medical devices | |
KR102332467B1 (en) | Protecting integrity of log data | |
Johnston et al. | Recommendations for securing Internet of Things devices using commodity hardware | |
Hosseinzadeh et al. | Recent trends in applying TPM to cloud computing | |
Boeck et al. | Towards more trustable log files for digital forensics by means of “trusted computing” | |
CN104794410A (en) | Database security protection method based on dependable computing technology | |
CN118503956B (en) | Software protection system, method, storage medium, device and program product | |
Muñoz et al. | TPM, a pattern for an architecture for trusted computing | |
KR20100054940A (en) | Apparatus and method for preventing malware using signature verification for embedded linux | |
Liu et al. | $ LiveForen $: Ensuring Live Forensic Integrity in the Cloud | |
Qin et al. | RIPTE: runtime integrity protection based on trusted execution for IoT device | |
Khalil et al. | TPM-based authentication mechanism for apache hadoop | |
Almohri et al. | Process authentication for high system assurance | |
DiLuoffo et al. | Credential Masquerading and OpenSSL Spy: Exploring ROS 2 using DDS security | |
Gupta et al. | Security and Cryptography | |
Niemi et al. | Platform attestation in consumer devices | |
Jain et al. | Security analysis of remote attestation | |
Galanou et al. | MATEE: multimodal attestation for trusted execution environments | |
Murti | Security in embedded systems | |
Gindre | Leveraging tpm-based remote attestations to secure edge-to-cloud applications |