7th USENIX Security Symposium, San Antonio, Texas
Cryptographic Support for Secure Logs on Untrusted Machines
Bruce Schneier and John Kelsey
Counterpane Systems
Abstract
In many real-world applications, sensitive information must be kept in log files on an untrusted machine. In the event that an attacker captures this
machine, we would like to guarantee that he will
gain little or no information from the log files and to
limit his ability to corrupt the log files. We describe
a computationally cheap method for making all log
entries generated prior to the logging machine's compromise impossible for the attacker to read, and also
impossible to undetectably modify or destroy.
- View the full text of this paper in
PDF form.
- If you need the latest Adobe Acrobat Reader, you can download it from Adobe's site.
- To become a USENIX Member, please see our Membership Information.
|