A comprehensive survey of logging in software: From logging statements automation to log mining and analysis

S Gholamian, PAS Ward - arXiv preprint arXiv:2110.12489, 2021 - arxiv.org
Logs are widely used to record runtime information of software systems, such as the
timestamp and the importance of an event, the unique ID of the source of the log, and a part …

Automated modelling of security incidents to represent logging requirements in software systems

F Rivera-Ortiz, L Pasquale - … of the 15th International Conference on …, 2020 - dl.acm.org
In 2017 the Open Web Application Security Project (OWASP) has identified insufficient
logging and monitoring as one of the top ten security risks. Attackers can exploit insufficient …

On the inadequacy of open-source application logs for digital forensics

A Azahari, D Balzarotti - Forensic Science International: Digital …, 2024 - Elsevier
This study explores the challenges with utilizing application logs for incident response or
forensic analysis. Application logs have the potential to significantly enhance security …

Log-related coding patterns to conduct postmortems of attacks in supervised learning-based projects

FA Bhuiyan, A Rahman - ACM Transactions on Privacy and Security, 2023 - dl.acm.org
Adversarial attacks against supervised learning a algorithms, which necessitates the
application of logging while using supervised learning algorithms in software projects …

Towards Understanding and Improving Security-Relevant Web Application Logging

M Sahin, N Daniele - Proceedings of the 19th ACM Asia Conference on …, 2024 - dl.acm.org
Logging of security-relevant events is crucial in software development to gain visibility into
the application's runtime, and to detect suspicious and malicious behavior. Various security …

[PDF][PDF] Engineering Forensic-Ready Software Systems Using Automated Logging.

F Rivera-Ortiz - REFSQ Workshops, 2022 - ceur-ws.org
A forensic-ready software system can produce logs that represent potential evidence in
digital forensic investigations of potential security incidents. Logs can reveal the identity of …

Enhancing Metaward: Integrating Digital Forensic Readiness in the Metaverse

S Robertson, S Baror, H Venter - European …, 2024 - papers.academic-conferences.org
As virtual currencies gain traction as rewards and with the evolving landscape of remote and
hybrid work environments, the need for adaptive and comprehensive reward systems …

Enhancing Learning Management Systems with Intrusion Alerts and Forensic Logging

N Abd Hamid, NH Ab Rahman… - International Journal of …, 2024 - myjms.mohe.gov.my
Abstract Web-based Learning Management Systems (LMS) are gaining popularity in the
education sector as they provide more convenience in the teaching and learning …

Multi-level Adaptive Execution Tracing for Efficient Performance Analysis

MA Khan, N Ezzati-Jivan - 2023 IEEE/ACIS 21st International …, 2023 - ieeexplore.ieee.org
Troubleshooting system performance issues is a challenging task that requires a deep
understanding of various factors that may impact system performance. This process involves …

Leveraging Vulnerability Discovery Strategies for Secure Development of Supervised Learning Projects

FA Bhuiyan - 2022 - search.proquest.com
Supervised learning algorithms, such as decision trees are increasingly used by information
technology (IT) organizations to construct classification and prediction models. As these …