Poster: How to securely record logs based on ARM trust zone

Seungho Lee, Hyo Jin Jo, Wonsuk Choi, Dong Hoon Lee

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)

    Abstract

    A number of logs are generated from IT devices. Since logs have important information regarding a system, they are used for finding the trace of an intrusion or obtaining important information through a big data analysis. Hence, the logs have become a major attack surface for attackers. To protect logs, IT devices require secure logging methods as a mandatory service. Secure logging can provide detection of malicious manipulation of logs and verification of their origin. In this paper, we propose a secure logging method satisfying forward and backward secrecy based on ARM TrustZone for embedded systems, which enables to efficiently generate secure logs through inter-process communication without modification of the existing system (Syslog). Also, we show that the proposed method does not require extra overhead compared with the existing logging method.

    Original languageEnglish
    Title of host publicationAsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security
    PublisherAssociation for Computing Machinery, Inc
    Pages664-666
    Number of pages3
    ISBN (Electronic)9781450367523
    DOIs
    Publication statusPublished - 2019 Jul 2
    Event2019 ACM Asia Conference on Computer and Communications Security, AsiaCCS 2019 - Auckland, New Zealand
    Duration: 2019 Jul 92019 Jul 12

    Publication series

    NameAsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security

    Conference

    Conference2019 ACM Asia Conference on Computer and Communications Security, AsiaCCS 2019
    Country/TerritoryNew Zealand
    CityAuckland
    Period19/7/919/7/12

    Bibliographical note

    Publisher Copyright:
    © 2019 Copyright held by the owner/author(s).

    Keywords

    • ARM TrustZone
    • Forward secrecy
    • Secure log

    ASJC Scopus subject areas

    • Software
    • Computer Networks and Communications
    • Computer Science Applications

    Fingerprint

    Dive into the research topics of 'Poster: How to securely record logs based on ARM trust zone'. Together they form a unique fingerprint.

    Cite this