Abstract
A number of logs are generated from IT devices. Since logs have important information regarding a system, they are used for finding the trace of an intrusion or obtaining important information through a big data analysis. Hence, the logs have become a major attack surface for attackers. To protect logs, IT devices require secure logging methods as a mandatory service. Secure logging can provide detection of malicious manipulation of logs and verification of their origin. In this paper, we propose a secure logging method satisfying forward and backward secrecy based on ARM TrustZone for embedded systems, which enables to efficiently generate secure logs through inter-process communication without modification of the existing system (Syslog). Also, we show that the proposed method does not require extra overhead compared with the existing logging method.
| Original language | English |
|---|---|
| Title of host publication | AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security |
| Publisher | Association for Computing Machinery, Inc |
| Pages | 664-666 |
| Number of pages | 3 |
| ISBN (Electronic) | 9781450367523 |
| DOIs | |
| Publication status | Published - 2019 Jul 2 |
| Event | 2019 ACM Asia Conference on Computer and Communications Security, AsiaCCS 2019 - Auckland, New Zealand Duration: 2019 Jul 9 → 2019 Jul 12 |
Publication series
| Name | AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security |
|---|
Conference
| Conference | 2019 ACM Asia Conference on Computer and Communications Security, AsiaCCS 2019 |
|---|---|
| Country/Territory | New Zealand |
| City | Auckland |
| Period | 19/7/9 → 19/7/12 |
Bibliographical note
Publisher Copyright:© 2019 Copyright held by the owner/author(s).
Keywords
- ARM TrustZone
- Forward secrecy
- Secure log
ASJC Scopus subject areas
- Software
- Computer Networks and Communications
- Computer Science Applications
Fingerprint
Dive into the research topics of 'Poster: How to securely record logs based on ARM trust zone'. Together they form a unique fingerprint.Cite this
- APA
- Standard
- Harvard
- Vancouver
- Author
- BIBTEX
- RIS