2012
DOI: 10.5120/7831-1042
|View full text |Cite
|
Sign up to set email alerts
|

A Framework of TPM, SVM and Boot Control for Securing Forensic Logs

Abstract: Computer logs files contain the crucial information that is stored and can be an important forensics evidence of attacks and actions of a system. Cyber forensics can be one of the important solutions to systematically gather, process, interpret and utilize digital evidence and log of the activities and events of a system is one of the most important resources of analyzing the evidence for researchers, therefore a secure storage of forensic log is our main focus. In this paper, we propose a Trusted Module Platf… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 20 publications
0
7
0
Order By: Relevance
“…With growing usage of cloud several researchers tried to provide privacy sound models for investigation in these environments [36][37][38][39][40], in addition it is worthwhile that mention a few papers that work on malware investigation [41,43]. Finally, there were models for forensics log protection while considering user privacy in log access occasions and the privacy and pervasive systems [44][45][46][47] that can lead us to better comprehension of cloud environment. We identified several issues pertaining to cloud and why there is a growing resistance among major corporations to adopt the cloud.…”
Section: Discussion and Analysismentioning
confidence: 99%
“…With growing usage of cloud several researchers tried to provide privacy sound models for investigation in these environments [36][37][38][39][40], in addition it is worthwhile that mention a few papers that work on malware investigation [41,43]. Finally, there were models for forensics log protection while considering user privacy in log access occasions and the privacy and pervasive systems [44][45][46][47] that can lead us to better comprehension of cloud environment. We identified several issues pertaining to cloud and why there is a growing resistance among major corporations to adopt the cloud.…”
Section: Discussion and Analysismentioning
confidence: 99%
“…Detection of alteration can also be performed in hardware-based secure storage for event logs (Boeck et al, 2010;Borhan et al, 2012). For instance, AMD processor provides a feature called Secure Virtual Machine (SVM) Trusted Platform 840Module (TPM) that can run a special protected code (Boeck et al, 2010).…”
Section: Hardware-based Tamper Detection 835mentioning
confidence: 99%
“…those that only use software. However, the use of hardware-supported techniques cannot prevent impersonation attacks as discussed in (Boeck et al, 2010;Borhan et al, 2012).…”
Section: Hardware-based Tamper Detection 835mentioning
confidence: 99%
“…I.e. investigation of cloud applications on mobile phones (45,(47)(48)(49), malwares on smartphones (50)(51)(52), and investigating mobile phones as part of botnets (53) and SCADA (54) systems are all challenging forensics research areas. In view of the evolving nature of mobile device forensics, it is suggested that forensic practitioners who rely primarily on general-purpose mobile forensic toolkits might find that no single forensic tool could recover all relevant evidence data from a device (6).…”
Section: Related Workmentioning
confidence: 99%