Carnegie Mellon University
file.pdf (533.88 kB)
Download file

Continuous Tamper-proof Logging using TPM2.0 (CMU-CyLab-13-008)

Download (533.88 kB)
journal contribution
posted on 2013-07-09, 00:00 authored by Arunesh Sinha, Limin JiaLimin Jia, Paul England, James Lorch

Auditing system logs is an important means of ensuring systems' security in situations where run-time security mechanisms are not sufficient to completely prevent potentially malicious activities. A fundamental requirement for reliable auditing is the integrity of the log entries. This paper presents an infrastructure for secure logging that is capable of detecting the tampering of logs by powerful adversaries residing on the device where logs are generated. We rely on novel features of trusted hardware (TPM) to ensure the continuity of the logging infrastructure across power cycles without help from a remote server. Our infrastructure also addresses practical concerns including how to handle high-frequency log updates, how to conserve disk space for storing logs, and how to efficiently verify an arbitrary subset of the log. Importantly, we formally state the tamper-proofness guarantee of our infrastructure and verify that our basic secure logging protocol provides the desired guarantee. To demonstrate that our infrastructure is practical, we implement a prototype and evaluate its performance.




Usage metrics