EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs

12/11/2017
by   Carlton Shepherd, et al.
0

Remote mobile and embedded devices are used to deliver increasingly impactful services, such as medical rehabilitation and assistive technologies. Secure system logging is beneficial in these scenarios to aid audit and forensic investigations particularly if devices bring harm to end-users. Logs should be tamper-resistant in storage, during execution, and when retrieved by a trusted remote verifier. In recent years, Trusted Execution Environments (TEEs) have emerged as the go-to root of trust on constrained devices for isolated execution of sensitive applications. Existing TEE-based logging systems, however, focus largely on protecting server-side logs and offer little protection to constrained source devices. In this paper, we introduce EmLog – a tamper-resistant logging system for constrained devices using the GlobalPlatform TEE. EmLog provides protection against complex software adversaries and offers several additional security properties over past schemes. The system is evaluated across three log datasets using an off-the-shelf ARM development board running an open-source, GlobalPlatform-compliant TEE. On average, EmLog runs with low run-time memory overhead (1MB heap and stack), 430–625 logs/second throughput, and five-times persistent storage overhead versus unprotected logs.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/17/2021

LIRA-V: Lightweight Remote Attestation for Constrained RISC-V Devices

This paper presents LIRA-V, a lightweight system for performing remote a...
research
08/10/2023

Accountability of Things: Large-Scale Tamper-Evident Logging for Smart Devices

Our modern world relies on a growing number of interconnected and intera...
research
04/27/2018

Secure Remote Credential Management with Mutual Attestation for Constrained Sensing Platforms with TEEs

Trusted Execution Environments (TEEs) are rapidly emerging as the go-to ...
research
11/18/2022

Trusted Hart for Mobile RISC-V Security

The majority of mobile devices today are based on Arm architecture that ...
research
08/02/2018

StreamBox-TZ: Secure Stream Analytics at the Edge with TrustZone

While it is compelling to process large streams of IoT data on the cloud...
research
08/02/2018

StreamBox-TZ: A Secure IoT Analytics Engine at the Edge

We present StreamBox-TZ, a stream analytics engine for an edge platform....
research
06/12/2022

RSSD: Defend against Ransomware with Hardware-Isolated Network-Storage Codesign and Post-Attack Analysis

Encryption ransomware has become a notorious malware. It encrypts user d...

Please sign up or login with your details

Forgot password? Click here to reset