Using boot control to preserve the integrity of evidence

2Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

This paper describes Dig-Force2, a system that securely logs and stores evidentiary data about the operation of a personal computer. The integrity of the logged data is guaranteed by using chained hysteresis signatures and a trusted platform module (TPM) that prevents unauthorized programs or tampered programs from executing. Experiments indicate that the Dig-Force2 system is both efficient and reliable. © 2008 International Federation for Information Processing.

Cite

CITATION STYLE

APA

Fujita, K., Ashino, Y., Uehara, T., & Sasaki, R. (2008). Using boot control to preserve the integrity of evidence. IFIP International Federation for Information Processing, 285, 61–74. https://doi.org/10.1007/978-0-387-84927-0_6

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free