[PDF][PDF] Correct audit logging in concurrent systems (technical report)

S Amir-Mohammadiah, C Kari - 2020 - sepehram.github.io
Audit logging provides post-facto analysis of runtime behavior for different purposes,
including error detection, amelioration of system operations, and the establishment of …

Correct audit logging in concurrent systems

S Amir-Mohammadian, C Kari - Electronic Notes in Theoretical Computer …, 2020 - Elsevier
Audit logging provides post-facto analysis of runtime behavior for different purposes,
including error detection, amelioration of system operations, and the establishment of …

Towards concurrent audit logging in microservices

S Amir-Mohammadian, AY Zowj - 2021 IEEE 45th Annual …, 2021 - ieeexplore.ieee.org
Information-algebraic models have been shown as effective semantic frameworks in the
specification of audit logging requirements. These semantic frameworks underlie …

[PDF][PDF] An Implementation Model for Correct Audit Logging in Cyber-Physical Systems

S Amir-Mohammadian, AY Zowj - sepehram.github.io
The widespread presence of cyber-physical systems necessitates a reliable assurance
mechanism for audit logging across various discrete and continuous components of these …

Instrumenting Microservices for Concurrent Audit Logging: Beyond Horn Clauses

ND Ahn, S Amir–Mohammadian - 2022 IEEE 46th Annual …, 2022 - ieeexplore.ieee.org
Instrumenting legacy code is an effective approach to enforce security policies. Formal
correctness of this approach in the realm of audit logging relies on semantic frameworks that …

[PDF][PDF] The theory and practice of correct audit logging

S Amir-Mohammadian, S Chong, C Skalka - 2015 - sepehram.github.io
Auditing has become increasingly important to the theory and practice of cyber security.
However, in systems where auditing is used, programs are typically instrumented to …

Correct audit logging: Theory and practice

S Amir-Mohammadian, S Chong, C Skalka - … , POST 2016, Held as Part of …, 2016 - Springer
Retrospective security has become increasingly important to the theory and practice of cyber
security, with auditing a crucial component of it. However, in systems where auditing is used …

A developer's guide to audit logging

J Margulies - IEEE Security & Privacy, 2015 - ieeexplore.ieee.org
Modern enterprises centrally monitor their systems by collecting logs using audit reduction
tools that can search, sort, and alert. The author describes how developers can support such …

Compensation-aware runtime monitoring

C Colombo, GJ Pace, P Abela - International Conference on Runtime …, 2010 - Springer
To avoid large overheads induced by runtime monitoring, the use of asynchronous log-
based monitoring is sometimes adopted—even though this implies that the system may …

The meaning of logs

S Etalle, F Massacci, A Yautsiukhin - Trust, Privacy and Security in Digital …, 2007 - Springer
While logging events is becoming increasingly common in computing, in communication
and in collaborative environments, log systems need to satisfy increasingly challenging (if …