Skip to main content
USENIX
  • Conferences
  • Students
Sign in

connect with us


  •  Twitter
  •  Facebook
  •  LinkedIn
  •  Google+
  •  YouTube

twitter

Tweets by @usenix

usenix conference policies

  • Event Code of Conduct
  • Conference Network Policy
  • Statement on Environmental Responsibility Policy

You are here

Home ยป Cryptographic Support for Secure Logs on Untrusted Machines
Tweet

connect with us

Cryptographic Support for Secure Logs on Untrusted Machines

Authors: 

Bruce Schneier and John Kelsey, Counterpane Systems

Abstract: 

In many real-world applications, sensitive information must be kept in log files on an untrusted machine. In the event that an attacker captures this machine, we would like to guarantee that he will gain little or no information from the log files and to limit his ability to corrupt the log files. We describe a computationally cheap method for making all log entries generated prior to the logging machine's compromise impossible for the attacker to read, and also impossible to undetectably modify or destroy.

Bruce Schneier, Counterpane Systems

John Kelsey, Counterpane Systems

Links

Paper: 
http://usenix.org/publications/library/proceedings/sec98/full_papers/schneier/schneier.pdf
  • Log in or    Register to post comments

© USENIX

  • Privacy Policy
  • Contact Us