This paper describes Dig-Force2, a system that securely logs and stores evidentiary data about the operation of a personal computer. The integrity of the logged data is guaranteed by using chained hysteresis signatures and a trusted platform module (TPM) that prevents unauthorized programs or tampered programs from executing. Experiments indicate that the Dig-Force2 system is both efficient and reliable. © 2008 International Federation for Information Processing.
CITATION STYLE
Fujita, K., Ashino, Y., Uehara, T., & Sasaki, R. (2008). Using boot control to preserve the integrity of evidence. IFIP International Federation for Information Processing, 285, 61–74. https://doi.org/10.1007/978-0-387-84927-0_6
Mendeley helps you to discover research relevant for your work.