Poster: How to securely record logs based on ARM trust zone

Seungho Lee, Hyo Jin Jo, Wonsuk Choi, Dong Hoon Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

A number of logs are generated from IT devices. Since logs have important information regarding a system, they are used for finding the trace of an intrusion or obtaining important information through a big data analysis. Hence, the logs have become a major attack surface for attackers. To protect logs, IT devices require secure logging methods as a mandatory service. Secure logging can provide detection of malicious manipulation of logs and verification of their origin. In this paper, we propose a secure logging method satisfying forward and backward secrecy based on ARM TrustZone for embedded systems, which enables to efficiently generate secure logs through inter-process communication without modification of the existing system (Syslog). Also, we show that the proposed method does not require extra overhead compared with the existing logging method.

Original languageEnglish
Title of host publicationAsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security
PublisherAssociation for Computing Machinery, Inc
Pages664-666
Number of pages3
ISBN (Electronic)9781450367523
DOIs
Publication statusPublished - 2019 Jul 2
Event2019 ACM Asia Conference on Computer and Communications Security, AsiaCCS 2019 - Auckland, New Zealand
Duration: 2019 Jul 92019 Jul 12

Publication series

NameAsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security

Conference

Conference2019 ACM Asia Conference on Computer and Communications Security, AsiaCCS 2019
CountryNew Zealand
CityAuckland
Period19/7/919/7/12

Fingerprint

Embedded systems
Communication
Big data

Keywords

  • ARM TrustZone
  • Forward secrecy
  • Secure log

ASJC Scopus subject areas

  • Software
  • Computer Networks and Communications
  • Computer Science Applications

Cite this

Lee, S., Jo, H. J., Choi, W., & Lee, D. H. (2019). Poster: How to securely record logs based on ARM trust zone. In AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security (pp. 664-666). (AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security). Association for Computing Machinery, Inc. https://doi.org/10.1145/3321705.3331001

Poster : How to securely record logs based on ARM trust zone. / Lee, Seungho; Jo, Hyo Jin; Choi, Wonsuk; Lee, Dong Hoon.

AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, 2019. p. 664-666 (AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Lee, S, Jo, HJ, Choi, W & Lee, DH 2019, Poster: How to securely record logs based on ARM trust zone. in AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, Association for Computing Machinery, Inc, pp. 664-666, 2019 ACM Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, 19/7/9. https://doi.org/10.1145/3321705.3331001
Lee S, Jo HJ, Choi W, Lee DH. Poster: How to securely record logs based on ARM trust zone. In AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc. 2019. p. 664-666. (AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security). https://doi.org/10.1145/3321705.3331001
Lee, Seungho ; Jo, Hyo Jin ; Choi, Wonsuk ; Lee, Dong Hoon. / Poster : How to securely record logs based on ARM trust zone. AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, 2019. pp. 664-666 (AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security).
@inproceedings{a7ed15278b8145d297fa7d016e4dec46,
title = "Poster: How to securely record logs based on ARM trust zone",
abstract = "A number of logs are generated from IT devices. Since logs have important information regarding a system, they are used for finding the trace of an intrusion or obtaining important information through a big data analysis. Hence, the logs have become a major attack surface for attackers. To protect logs, IT devices require secure logging methods as a mandatory service. Secure logging can provide detection of malicious manipulation of logs and verification of their origin. In this paper, we propose a secure logging method satisfying forward and backward secrecy based on ARM TrustZone for embedded systems, which enables to efficiently generate secure logs through inter-process communication without modification of the existing system (Syslog). Also, we show that the proposed method does not require extra overhead compared with the existing logging method.",
keywords = "ARM TrustZone, Forward secrecy, Secure log",
author = "Seungho Lee and Jo, {Hyo Jin} and Wonsuk Choi and Lee, {Dong Hoon}",
year = "2019",
month = "7",
day = "2",
doi = "10.1145/3321705.3331001",
language = "English",
series = "AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security",
publisher = "Association for Computing Machinery, Inc",
pages = "664--666",
booktitle = "AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security",

}

TY - GEN

T1 - Poster

T2 - How to securely record logs based on ARM trust zone

AU - Lee, Seungho

AU - Jo, Hyo Jin

AU - Choi, Wonsuk

AU - Lee, Dong Hoon

PY - 2019/7/2

Y1 - 2019/7/2

N2 - A number of logs are generated from IT devices. Since logs have important information regarding a system, they are used for finding the trace of an intrusion or obtaining important information through a big data analysis. Hence, the logs have become a major attack surface for attackers. To protect logs, IT devices require secure logging methods as a mandatory service. Secure logging can provide detection of malicious manipulation of logs and verification of their origin. In this paper, we propose a secure logging method satisfying forward and backward secrecy based on ARM TrustZone for embedded systems, which enables to efficiently generate secure logs through inter-process communication without modification of the existing system (Syslog). Also, we show that the proposed method does not require extra overhead compared with the existing logging method.

AB - A number of logs are generated from IT devices. Since logs have important information regarding a system, they are used for finding the trace of an intrusion or obtaining important information through a big data analysis. Hence, the logs have become a major attack surface for attackers. To protect logs, IT devices require secure logging methods as a mandatory service. Secure logging can provide detection of malicious manipulation of logs and verification of their origin. In this paper, we propose a secure logging method satisfying forward and backward secrecy based on ARM TrustZone for embedded systems, which enables to efficiently generate secure logs through inter-process communication without modification of the existing system (Syslog). Also, we show that the proposed method does not require extra overhead compared with the existing logging method.

KW - ARM TrustZone

KW - Forward secrecy

KW - Secure log

UR - http://www.scopus.com/inward/record.url?scp=85069964483&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85069964483&partnerID=8YFLogxK

U2 - 10.1145/3321705.3331001

DO - 10.1145/3321705.3331001

M3 - Conference contribution

AN - SCOPUS:85069964483

T3 - AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security

SP - 664

EP - 666

BT - AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security

PB - Association for Computing Machinery, Inc

ER -