Aug. 11, 2023, 6:11 a.m. | David Koisser, Ahmad-Reza Sadeghi

cs.CR updates on arXiv.org arxiv.org

Our modern world relies on a growing number of interconnected and interacting
devices, leading to a plethora of logs establishing audit trails for all kinds
of events. Simultaneously, logs become increasingly important for forensic
investigations, and thus, an adversary will aim to alter logs to avoid
culpability, e.g., by compromising devices that generate and store logs. Thus,
it is essential to ensure that no one can tamper with any logs without going
undetected. However, existing approaches to establish tamper evidence …

accountability adversary aim audit devices events forensic important investigations large logging logs scale smart smart devices things world

Incident Response Lead

@ Blue Yonder | Hyderabad

GRC Analyst

@ Chubb | Malaysia

Information Security Manager

@ Walbec Group | Waukesha, WI, United States

Senior Executive / Manager, Security Ops (TSSQ)

@ SMRT Corporation Ltd | Singapore, SG

Senior Engineer, Cybersecurity

@ Sonova Group | Valencia (CA), United States

Consultant (Multiple Positions Available)

@ Atos | Plano, TX, US, 75093