LAVA: Log Authentication and Verification Algorithm

Edita Bajramovic, Christofer Fein, Marius Frinken,Paul Rösler,Felix Freiling

Digital Threats: Research and Practice(2023)

引用 0|浏览1
暂无评分
摘要
Log files provide essential information regarding the actions of processes in critical computer systems. If an attacker modifies log entries, then critical digital evidence is lost. Therefore, many algorithms for secure logging have been devised, each achieving different security goals under different assumptions. We analyze these algorithms and identify their essential security features. Within a common system and attacker model, we integrate these algorithms into a single (parameterizable) “meta” algorithm called LAVA that possesses the union of the security features and can be parameterized to yield the security features of former algorithms. We present a security and efficiency analysis and provide a Python module that can be used to provide secure logging for forensics and incident response.
更多
查看译文
关键词
authentication,verification,log,lava,algorithm
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要