Using Boot Control to Preserve the Integrity of Evidence
نویسندگان
چکیده
This paper describes Dig-Force2, a system that securely logs and stores evidentiary data about the operation of a personal computer. The integrity of the logged data is guaranteed by using chained hysteresis signatures and a trusted platform module (TPM) that prevents unauthorized programs or tampered programs from executing. Experiments indicate that the Dig-Force2 system is both efficient and reliable.
منابع مشابه
P-70: Evidence for Differential Gene Expression of A Major EpigeneticModifier Enzyme, de novo DNA Methyltransferase 3b, through Vitrification of Mouse Ovary Tissue
Background: Ovarian tissue cryopreservation is a feasible method to preserve female reproductive potential, especially in young patients with cancer or in women at risk of premature ovarian failure. Vitrification has recently emerged as a new trend for biological specimen preservation. On the other hand, gene expression that changes during vitrification can influence oocyte maturation and need ...
متن کاملThe Relationship Between Auditor Integrity and Organizational Commitment to Prevent Fraud
Abstract Fraud prevention measures are based on internal control, and the auditor's integrity is essential as an effort to adhere to the rules of independence and avoid conflicts of interest in the management of audit services. The purpose of this study is to examine the empirical evidence on the effect of auditor Integrity and organizational commitment on fraud prevention. The present study ...
متن کاملApplying The Biba Integrity Model to Evidence Management
This paper describes the design of an integrity-aware Forensic Evidence Management System (FEMS). The well-known Biba integrity model is employed to preserve and reason about the integrity of stored evidence. Casey’s certainty scale provides the integrity classification scheme needed to apply the Biba model. The paper also discusses the benefits of using an integrity-aware system for managing d...
متن کاملFirma: Disk-Based Foundations for Trusted Operating Systems
Secure boot mechanisms aim to provide guarantees of integrity of a system as it loads. It ensures that if a system is running, all of its process will satisfy integrity verification requirements. While secure boot has been available for a long time, it is not available in commodity systems due to the high cost of secure hardware. In this paper, we describe Firma, an architecture that provides s...
متن کاملThe in vitro effect of leptin on semen quality of water buffalo (Bubalus bubalis) bulls
The purpose of this study was to evaluate the probable effects of leptin addition in different levels to the semen extender on sperm quality (motility and motility parameters, viability, sperm membrane integrity, and DNA damage). Semen specimens were evaluated immediately after leptin addition, equilibration time and after thawing the frozen semen. Five healthy buffalo bulls (5 ejaculates from ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008