Continuous Tamper-Proof Logging Using TPM 2.0


Auditing system logs is an important means of ensuring systems’ security in situations where run-time security mechanisms are not sufficient to completely prevent potentially malicious activities. A fundamental requirement for reliable auditing is the integrity of the log entries. This paper presents an infrastructure for secure logging that is capable of… (More)
DOI: 10.1007/978-3-319-08593-7_2


4 Figures and Tables


Citations per Year

Citation Velocity: 36

Averaging 36 citations per year over the last 2 years.

Learn more about how we calculate this metric in our FAQ.

Cite this paper

@inproceedings{Sinha2014ContinuousTL, title={Continuous Tamper-Proof Logging Using TPM 2.0}, author={Arunesh Sinha and Limin Jia and Paul England and Jacob R. Lorch}, booktitle={TRUST}, year={2014} }