dc.contributor.author | Bansal, Ayoosh | |
dc.contributor.author | Kandikuppa, Anant | |
dc.contributor.author | Chen, Chien-Ying | |
dc.contributor.author | Hasan, Monowar | |
dc.contributor.author | Bates, Adam | |
dc.contributor.author | Mohan, Sibin | |
dc.date.accessioned | 2022-11-07T17:51:27Z | |
dc.date.available | 2022-11-07T17:51:27Z | |
dc.date.issued | 2022-09-24 | |
dc.identifier.citation | Bansal, A., Kandikuppa, A., Chen, CY., Hasan, M., Bates, A., Mohan, S. (2022). Towards Efficient Auditing for Real-Time Systems. In: Atluri, V., Di Pietro, R., Jensen, C.D., Meng, W. (eds) Computer Security – ESORICS 2022. ESORICS 2022. Lecture Notes in Computer Science, vol 13556. Springer, Cham. https://doi.org/10.1007/978-3-031-17143-7_30 | |
dc.identifier.isbn | 978-3-031-17142-0 | |
dc.identifier.issn | 0302-9743 | |
dc.identifier.uri | https://doi.org/10.1007/978-3-031-17143-7_30 | |
dc.identifier.uri | https://soar.wichita.edu/handle/10057/24178 | |
dc.description | Click on the DOI to access this article (may not be free). | |
dc.description.abstract | System auditing is a powerful tool that provides insight into the nature of suspicious events in computing systems, allowing machine operators to detect and subsequently investigate security incidents. While auditing has proven invaluable to the security of traditional computers, existing audit frameworks are rarely designed with consideration for Real-Time Systems (RTS). The transparency provided by system auditing would be of tremendous benefit in a variety of security-critical RTS domains, (e.g., autonomous vehicles); however, if audit mechanisms are not carefully integrated into RTS, auditing can be rendered ineffectual and violate the real-world temporal requirements of the RTS. In this paper, we demonstrate how to adapt commodity audit frameworks to RTS. Using Linux Audit as a case study, we first demonstrate that the volume of audit events generated by commodity frameworks is unsustainable within the temporal and resource constraints of real-time (RT) applications. To address this, we present Ellipsis, a set of kernel-based reduction techniques that leverage the periodic repetitive nature of RT applications to aggressively reduce the costs of system-level auditing. Ellipsis generates succinct descriptions of RT applications’ expected activity while retaining a detailed record of unexpected activities, enabling analysis of suspicious activity while meeting temporal constraints. Our evaluation of Ellipsis, using ArduPilot (an open-source autopilot application suite) demonstrates up to 93% reduction in audit log generation. © 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG. | |
dc.description.sponsorship | The material presented in this paper is based upon work supported by the Office of Naval Research (ONR) under grant number N00014-17-1-2889 and the National Science Foundation (NSF) under grant numbers CNS 1750024, CNS 1932529, CNS 1955228, CNS 2055127, CNS 2145787 and CNS 2152768. Any opinions, findings, and conclusions or recommendations expressed in this publication are those of the authors and do not necessarily reflect the views of the sponsors. | |
dc.language.iso | en_US | |
dc.publisher | Springer Science and Business Media Deutschland GmbH | |
dc.relation.ispartofseries | Lecture Notes in Computer Science | |
dc.relation.ispartofseries | 2022 | |
dc.subject | Auditing | |
dc.subject | Cyber-physical systems | |
dc.subject | Real-time systems | |
dc.title | Towards efficient auditing for real-time systems | |
dc.type | Conference paper | |
dc.rights.holder | © 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG | |