{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T04:53:03Z","timestamp":1755838383973},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319113784"},{"type":"electronic","value":"9783319113791"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11379-1_3","type":"book-chapter","created":{"date-parts":[[2014,8,20]],"date-time":"2014-08-20T03:14:54Z","timestamp":1408504494000},"page":"46-67","source":"Crossref","is-referenced-by-count":18,"title":["PillarBox: Combating Next-Generation Malware with Fast Forward-Secure Logging"],"prefix":"10.1007","author":[{"given":"Kevin D.","family":"Bowers","sequence":"first","affiliation":[]},{"given":"Catherine","family":"Hart","sequence":"additional","affiliation":[]},{"given":"Ari","family":"Juels","sequence":"additional","affiliation":[]},{"given":"Nikos","family":"Triandopoulos","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"Ettercap, \n                    \n                      http:\/\/ettercap.sourceforge.net\/"},{"key":"3_CR2","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1007\/s00145-008-9026-x","volume":"21","author":"M. Bellare","year":"2008","unstructured":"Bellare, M., Namprempre, C.: Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. J. Cryptol.\u00a021, 469\u2013491 (2008)","journal-title":"J. Cryptol."},{"key":"3_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-36563-X_1","volume-title":"Topics in Cryptology - CT-RSA 2003","author":"M. Bellare","year":"2003","unstructured":"Bellare, M., Yee, B.: Forward-security in private-key cryptography. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol.\u00a02612, pp. 1\u201318. Springer, Heidelberg (2003)"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Bowers, K.D., Hart, C., Juels, A., Triandopoulos, N.: PillarBox: Combating next-generation malware with fast forward-secure logging. Cryptology ePrint Archive, Report 2013\/625 (2013)","DOI":"10.1007\/978-3-319-11379-1_3"},{"key":"3_CR5","unstructured":"Crosby, S.A., Wallach, D.S.: Efficient data structures for tamper-evident logging. In: USENIX Sec., pp. 317\u2013334 (2009)"},{"issue":"2","key":"3_CR6","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D. Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.C.: On the security of public key protocols. IEEE Trans. on Inf. Theory\u00a029(2), 198\u2013207 (1983)","journal-title":"IEEE Trans. on Inf. Theory"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Garfinkel, T., Pfaff, B., Chow, J., Rosenblum, M., Boneh, D.: Terra: A virtual machine-based platform for trusted computing. In: SOSP, pp. 193\u2013206 (2003)","DOI":"10.1145\/1165389.945464"},{"issue":"2","key":"3_CR8","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S. Goldwasser","year":"1988","unstructured":"Goldwasser, S., Micali, S., Rivest, R.L.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput.\u00a017(2), 281\u2013308 (1988)","journal-title":"SIAM J. Comput."},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"H\u00e5stad, J., Jonsson, J., Juels, A., Yung, M.: Funkspiel schemes: An alternative to conventional tamper resistance. In: CCS, pp. 125\u2013133 (2000)","DOI":"10.1145\/352600.352619"},{"key":"3_CR10","unstructured":"Itkis, G.: Handbook of Inf. Security, Forward Security: Adaptive Cryptography\u2014Time Evolution. John Wiley & Sons (2006)"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Karger, P.A.: Securing virtual machine monitors: what is needed? In: ASIACCS, pp. 1\u20132 (2009)","DOI":"10.1145\/1533057.1533059"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Kelsey, J., Callas, J., Clemm, A.: RFC 5848: Signed syslog messages (2010)","DOI":"10.17487\/rfc5848"},{"key":"3_CR13","unstructured":"Kelsey, J., Schneier, B.: Minimizing bandwidth for remote access to cryptographically protected audit logs. In: RAID, p. 9 (1999)"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Ma, D., Tsudik, G.: A new approach to secure logging. Trans. Storage\u00a05(1), 2:1\u20132:21 (2009)","DOI":"10.1145\/1502777.1502779"},{"key":"3_CR15","unstructured":"Mandiant. M-trends: The advanced persistent threat (2010), \n                    \n                      http:\/\/www.mandiant.com"},{"key":"3_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/978-3-642-40203-6_7","volume-title":"Computer Security \u2013 ESORICS 2013","author":"G.A. Marson","year":"2013","unstructured":"Marson, G.A., Poettering, B.: Practical secure logging: Seekable sequential key generators. In: Crampton, J., Jajodia, S., Mayes, K. (eds.) ESORICS 2013. LNCS, vol.\u00a08134, pp. 111\u2013128. Springer, Heidelberg (2013)"},{"key":"3_CR17","unstructured":"Oltsik, J.: Defining big data security analytics. Networkworld, 1 (April 2013)"},{"key":"3_CR18","unstructured":"Ristenpart, T., Maganis, G., Krishnamurthy, A., Kohno, T.: Privacy-preserving location tracking of lost or stolen devices: Cryptographic techniques and replacing trusted third parties with DHTs. In: USENIX Sec., pp. 275\u2013290 (2008)"},{"key":"3_CR19","unstructured":"Schneier, B., Kelsey, J.: Cryptographic support for secure logs on untrusted machines. In: USENIX Sec., p. 4 (1998)"},{"key":"3_CR20","unstructured":"Schneier, B., Kelsey, J.: Tamperproof audit logs as a forensics tool for intrusion detection systems. Comp. Networks and ISDN Systems (1999)"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Shacham, H., Page, M., Pfaff, B., Goh, E.J., Modadugu, N., Boneh, D.: On the Effectiveness of Address-Space Randomization. In: CCS, pp. 298\u2013307 (2004)","DOI":"10.1145\/1030083.1030124"},{"key":"3_CR22","doi-asserted-by":"crossref","unstructured":"Sharif, M.I., Lee, W., Cui, W., Lanzi, A.: Secure in-VM monitoring using hardware virtualization. In: CCS, pp. 477\u2013487 (2009)","DOI":"10.1145\/1653662.1653720"},{"key":"3_CR23","unstructured":"Waters, B.R., Balfanz, D., Durfee, G., Smetters, D.K.: Building an encrypted and searchable audit log. In: NDSS (2004)"},{"key":"3_CR24","unstructured":"Chen, Y., Chen, Y., Paxson, V., Katz, R.: What\u2019s new about cloud computing security? Technical Report UCB\/EECS-2010-5, UC Berkeley (2010)"},{"key":"3_CR25","doi-asserted-by":"crossref","unstructured":"Yavuz, A.A., Ning, P.: BAF: An efficient publicly verifiable secure audit logging scheme for distributed systems. In: ACSAC, pp. 219\u2013228 (2009)","DOI":"10.1109\/ACSAC.2009.28"},{"key":"3_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/978-3-642-32946-3_12","volume-title":"Financial Cryptography and Data Security","author":"A.A. Yavuz","year":"2012","unstructured":"Yavuz, A.A., Ning, P., Reiter, M.K.: Efficient, compromise resilient and append-only cryptographic schemes for secure audit logging. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol.\u00a07397, pp. 148\u2013163. Springer, Heidelberg (2012)"}],"container-title":["Lecture Notes in Computer Science","Research in Attacks, Intrusions and Defenses"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11379-1_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T16:44:41Z","timestamp":1558975481000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-11379-1_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319113784","9783319113791"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11379-1_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}