Aug. 11, 2023, 6:11 a.m. | David Koisser, Ahmad-Reza Sadeghi

cs.CR updates on arXiv.org arxiv.org

Our modern world relies on a growing number of interconnected and interacting
devices, leading to a plethora of logs establishing audit trails for all kinds
of events. Simultaneously, logs become increasingly important for forensic
investigations, and thus, an adversary will aim to alter logs to avoid
culpability, e.g., by compromising devices that generate and store logs. Thus,
it is essential to ensure that no one can tamper with any logs without going
undetected. However, existing approaches to establish tamper evidence …

accountability adversary aim audit devices events forensic important investigations large logging logs scale smart smart devices things world

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Corporate Intern - Information Security (Year Round)

@ Associated Bank | US WI Remote

Senior Offensive Security Engineer

@ CoStar Group | US-DC Washington, DC