[PDF][PDF] Correct audit logging in concurrent systems (technical report)
S Amir-Mohammadiah, C Kari - 2020 - sepehram.github.io
Audit logging provides post-facto analysis of runtime behavior for different purposes,
including error detection, amelioration of system operations, and the establishment of …
including error detection, amelioration of system operations, and the establishment of …
Correct audit logging in concurrent systems
S Amir-Mohammadian, C Kari - Electronic Notes in Theoretical Computer …, 2020 - Elsevier
Audit logging provides post-facto analysis of runtime behavior for different purposes,
including error detection, amelioration of system operations, and the establishment of …
including error detection, amelioration of system operations, and the establishment of …
Towards concurrent audit logging in microservices
S Amir-Mohammadian, AY Zowj - 2021 IEEE 45th Annual …, 2021 - ieeexplore.ieee.org
Information-algebraic models have been shown as effective semantic frameworks in the
specification of audit logging requirements. These semantic frameworks underlie …
specification of audit logging requirements. These semantic frameworks underlie …
[PDF][PDF] An Implementation Model for Correct Audit Logging in Cyber-Physical Systems
S Amir-Mohammadian, AY Zowj - sepehram.github.io
The widespread presence of cyber-physical systems necessitates a reliable assurance
mechanism for audit logging across various discrete and continuous components of these …
mechanism for audit logging across various discrete and continuous components of these …
Instrumenting Microservices for Concurrent Audit Logging: Beyond Horn Clauses
ND Ahn, S Amir–Mohammadian - 2022 IEEE 46th Annual …, 2022 - ieeexplore.ieee.org
Instrumenting legacy code is an effective approach to enforce security policies. Formal
correctness of this approach in the realm of audit logging relies on semantic frameworks that …
correctness of this approach in the realm of audit logging relies on semantic frameworks that …
[PDF][PDF] The theory and practice of correct audit logging
Auditing has become increasingly important to the theory and practice of cyber security.
However, in systems where auditing is used, programs are typically instrumented to …
However, in systems where auditing is used, programs are typically instrumented to …
Correct audit logging: Theory and practice
Retrospective security has become increasingly important to the theory and practice of cyber
security, with auditing a crucial component of it. However, in systems where auditing is used …
security, with auditing a crucial component of it. However, in systems where auditing is used …
A developer's guide to audit logging
J Margulies - IEEE Security & Privacy, 2015 - ieeexplore.ieee.org
Modern enterprises centrally monitor their systems by collecting logs using audit reduction
tools that can search, sort, and alert. The author describes how developers can support such …
tools that can search, sort, and alert. The author describes how developers can support such …
Compensation-aware runtime monitoring
To avoid large overheads induced by runtime monitoring, the use of asynchronous log-
based monitoring is sometimes adopted—even though this implies that the system may …
based monitoring is sometimes adopted—even though this implies that the system may …
The meaning of logs
While logging events is becoming increasingly common in computing, in communication
and in collaborative environments, log systems need to satisfy increasingly challenging (if …
and in collaborative environments, log systems need to satisfy increasingly challenging (if …