publication . Conference object . Preprint . 2017

Practical whole-system provenance capture

Pasquier, Thomas; Han, Xueyuan; Goldstein, Mark; Moyer, Thomas; Eyers, David; Seltzer, Margo; Bacon, Jean;
Open Access English
  • Published: 14 Nov 2017
  • Publisher: ACM
  • Country: United States
Abstract
Comment: 15 pages, 7 figures
Subjects
free text keywords: Data Provenance, Whole-system provenance, Linux Kernal, Kernel (linear algebra), Kernel design, Scientific experiment, Database, computer.software_genre, computer, Intrusion detection system, Data loss, Provenance, Usability, business.industry, business, Computer science, Linux kernel, Computer Science - Cryptography and Security
96 references, page 1 of 7

[1] [n. d.]. Docker. ([n. d.]). https://www.docker.com.

[2] [n. d.]. General Data Protection Regulation. http://eur-lex.europa.eu/legal-content /EN/TXT/?uri=uriserv:OJ.L_.2016.119.01.0001.01.ENG&toc=OJ:L:2016:119: TOC. ([n. d.]).

[3] [n. d.]. Health Insurance Portability and Accountability Act. https://www.gpo.go v/fdsys/pkg/PLAW-104publ191/html/PLAW-104publ191.htm. ([n. d.]).

[4] [n. d.]. OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data. ([n. d.]). http://www.oecd.org/internet/ieconomy/oecdguidelineso ntheprotectionofprivacyandtransborderflowsofpersonaldata.htm.

[5] [n. d.]. The Sarbanes-Oxley Act of 2002. http://www.soxlaw.com/. ([n. d.]).

[6] Sherif Akoush, Ripduman Sohan, and Andy Hopper. 2013. Hadoopprov: Towards provenance as a first class citizen in mapreduce. In Workshop on the Theory and Practice of Provenance. USENIX.

[7] Sepehr Amir-Mohammadian, Stephen Chong, and Christian Skalka. 2016. Correct Audit Logging: Theory and Practice. In International Conference on Principles of Security and Trust (POST'16). Springer.

[8] Elaine Angelino, Daniel Yamins, and Margo Seltzer. 2010. StarFlow: A scriptcentric data analysis environment. In International Provenance and Annotation Workshop. Springer, 236-250.

[9] Nikilesh Balakrishnan, Thomas Bytheway, Ripduman Sohan, and Andy Hopper. 2013. OPUS: A Lightweight System for Observational Provenance in User Space.. In Workshop on the Theory and Practice of Provenance. USENIX.

[10] Andrew Banks and Rahul Gupta. 2014. MQTT Version 3.1. 1. OASIS Standard (2014).

[11] Adam Bates, Kevin Butler, Alin Dobra, Brad Reaves, Patrick Cable, Thomas Moyer, and Nabil Schear. 2016. Retrofitting Applications with Provenance-Based Security Monitoring. arXiv preprint arXiv:1609.00266 (2016).

[12] Adam Bates, Kevin RB Butler, and Thomas Moyer. 2015. Take only what you need: leveraging mandatory access control policy to reduce provenance storage costs. In Workshop on Theory and Practice of Provenance. USENIX, 7-7.

[13] Adam Bates, Dave Tian, Kevin Butler, and Thomas Moyer. 2015. Trustworthy Whole-System Provenance for the Linux Kernel. In Security Symposium. USENIX.

[14] Mick Bauer. 2006. Paranoid penguin: an introduction to Novell AppArmor. Linux Journal 2006, 148 (2006), 13.

[15] Khalid Belhajjame, Reza B'Far, James Cheney, Sam Coppens, Stephen Cresswell, Yolanda Gil, Paul Groth, Graham Klyne, Timothy Lebo, Jim McCusker, Simon Miles, James Myers, Satya Sahoo, Luc Moreau, and Paolo et al. Missier. 2013. Prov-DM: The PROV Data Model. Technical Report. World Wide Web Consortium (W3C). https://www.w3.org/TR/prov-dm/.

96 references, page 1 of 7
Abstract
Comment: 15 pages, 7 figures
Subjects
free text keywords: Data Provenance, Whole-system provenance, Linux Kernal, Kernel (linear algebra), Kernel design, Scientific experiment, Database, computer.software_genre, computer, Intrusion detection system, Data loss, Provenance, Usability, business.industry, business, Computer science, Linux kernel, Computer Science - Cryptography and Security
96 references, page 1 of 7

[1] [n. d.]. Docker. ([n. d.]). https://www.docker.com.

[2] [n. d.]. General Data Protection Regulation. http://eur-lex.europa.eu/legal-content /EN/TXT/?uri=uriserv:OJ.L_.2016.119.01.0001.01.ENG&toc=OJ:L:2016:119: TOC. ([n. d.]).

[3] [n. d.]. Health Insurance Portability and Accountability Act. https://www.gpo.go v/fdsys/pkg/PLAW-104publ191/html/PLAW-104publ191.htm. ([n. d.]).

[4] [n. d.]. OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data. ([n. d.]). http://www.oecd.org/internet/ieconomy/oecdguidelineso ntheprotectionofprivacyandtransborderflowsofpersonaldata.htm.

[5] [n. d.]. The Sarbanes-Oxley Act of 2002. http://www.soxlaw.com/. ([n. d.]).

[6] Sherif Akoush, Ripduman Sohan, and Andy Hopper. 2013. Hadoopprov: Towards provenance as a first class citizen in mapreduce. In Workshop on the Theory and Practice of Provenance. USENIX.

[7] Sepehr Amir-Mohammadian, Stephen Chong, and Christian Skalka. 2016. Correct Audit Logging: Theory and Practice. In International Conference on Principles of Security and Trust (POST'16). Springer.

[8] Elaine Angelino, Daniel Yamins, and Margo Seltzer. 2010. StarFlow: A scriptcentric data analysis environment. In International Provenance and Annotation Workshop. Springer, 236-250.

[9] Nikilesh Balakrishnan, Thomas Bytheway, Ripduman Sohan, and Andy Hopper. 2013. OPUS: A Lightweight System for Observational Provenance in User Space.. In Workshop on the Theory and Practice of Provenance. USENIX.

[10] Andrew Banks and Rahul Gupta. 2014. MQTT Version 3.1. 1. OASIS Standard (2014).

[11] Adam Bates, Kevin Butler, Alin Dobra, Brad Reaves, Patrick Cable, Thomas Moyer, and Nabil Schear. 2016. Retrofitting Applications with Provenance-Based Security Monitoring. arXiv preprint arXiv:1609.00266 (2016).

[12] Adam Bates, Kevin RB Butler, and Thomas Moyer. 2015. Take only what you need: leveraging mandatory access control policy to reduce provenance storage costs. In Workshop on Theory and Practice of Provenance. USENIX, 7-7.

[13] Adam Bates, Dave Tian, Kevin Butler, and Thomas Moyer. 2015. Trustworthy Whole-System Provenance for the Linux Kernel. In Security Symposium. USENIX.

[14] Mick Bauer. 2006. Paranoid penguin: an introduction to Novell AppArmor. Linux Journal 2006, 148 (2006), 13.

[15] Khalid Belhajjame, Reza B'Far, James Cheney, Sam Coppens, Stephen Cresswell, Yolanda Gil, Paul Groth, Graham Klyne, Timothy Lebo, Jim McCusker, Simon Miles, James Myers, Satya Sahoo, Luc Moreau, and Paolo et al. Missier. 2013. Prov-DM: The PROV Data Model. Technical Report. World Wide Web Consortium (W3C). https://www.w3.org/TR/prov-dm/.

96 references, page 1 of 7
Powered by OpenAIRE Open Research Graph
Any information missing or wrong?Report an Issue
publication . Conference object . Preprint . 2017

Practical whole-system provenance capture

Pasquier, Thomas; Han, Xueyuan; Goldstein, Mark; Moyer, Thomas; Eyers, David; Seltzer, Margo; Bacon, Jean;