Главная
Study mode:
on
1
Intro
2
Provenance in science
3
Provenance-based security - Forensic
4
Objectives
5
Provenance graph
6
Whole-system provenance
7
Overcoming limitation for runtime analysis
8
Change to provenance architecture
9
Programming framework
10
Graph structure guarantees
11
Need for ordering guarantees
12
Workloads (in-kernel)
13
Micro-benchmark (kernel-query)
14
Macro-benchmark (in kernel)
15
Workloads (userspace)
16
Take away
Description:
Explore runtime analysis of whole-system provenance in this 22-minute conference talk from the Association for Computing Machinery (ACM). Delve into the challenges of identifying root causes and impacts of system intrusions in real-time security applications. Examine the limitations of post-hoc analysis in provenance-based auditing techniques and discover innovative approaches to overcome these constraints. Learn about changes in provenance architecture, programming frameworks, and graph structure guarantees necessary for effective runtime analysis. Investigate various workloads, including in-kernel and userspace scenarios, through micro and macro-benchmarks. Gain valuable insights into the future of provenance-based security and its potential to revolutionize computer security practices.

Runtime Analysis of Whole-System Provenance

Association for Computing Machinery (ACM)
Add to list
0:00 / 0:00