Poster: How to securely record logs based on ARM trust zone

Seungho Lee, Hyo Jin Jo, Wonsuk Choi, Dong Hoon Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

A number of logs are generated from IT devices. Since logs have important information regarding a system, they are used for finding the trace of an intrusion or obtaining important information through a big data analysis. Hence, the logs have become a major attack surface for attackers. To protect logs, IT devices require secure logging methods as a mandatory service. Secure logging can provide detection of malicious manipulation of logs and verification of their origin. In this paper, we propose a secure logging method satisfying forward and backward secrecy based on ARM TrustZone for embedded systems, which enables to efficiently generate secure logs through inter-process communication without modification of the existing system (Syslog). Also, we show that the proposed method does not require extra overhead compared with the existing logging method.

Original languageEnglish
Title of host publicationAsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security
PublisherAssociation for Computing Machinery, Inc
Pages664-666
Number of pages3
ISBN (Electronic)9781450367523
DOIs
Publication statusPublished - 2019 Jul 2
Event2019 ACM Asia Conference on Computer and Communications Security, AsiaCCS 2019 - Auckland, New Zealand
Duration: 2019 Jul 92019 Jul 12

Publication series

NameAsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security

Conference

Conference2019 ACM Asia Conference on Computer and Communications Security, AsiaCCS 2019
CountryNew Zealand
CityAuckland
Period19/7/919/7/12

Keywords

  • ARM TrustZone
  • Forward secrecy
  • Secure log

ASJC Scopus subject areas

  • Software
  • Computer Networks and Communications
  • Computer Science Applications

Fingerprint Dive into the research topics of 'Poster: How to securely record logs based on ARM trust zone'. Together they form a unique fingerprint.

  • Cite this

    Lee, S., Jo, H. J., Choi, W., & Lee, D. H. (2019). Poster: How to securely record logs based on ARM trust zone. In AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security (pp. 664-666). (AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security). Association for Computing Machinery, Inc. https://doi.org/10.1145/3321705.3331001