Decoupling provenance capture and analysis from execution

Manolis Stamatogiannakis, Paul Groth, Herbert Bos

Research output: Contribution to conferencePaperpeer-review

14 Scopus citations

Abstract

Capturing provenance usually involves the direct observation and instrumentation of the execution of a program or workflow. However, this approach restricts provenance analysis to pre-determined programs and methods. This may not pose a problem when one is interested in the provenance of a well-defined workflow, but may limit the analysis of unstructured processes such as interactive desktop computing. In this paper, we present a new approach to capturing provenance based on full execution record and replay. Our approach leverages full-system execution trace logging and replay, which allows the complete decoupling of analysis from the original execution. This enables the selective analysis of the execution using progressively heavier instrumentation.

Original languageEnglish
StatePublished - 2015
Externally publishedYes
Event7th USENIX Workshop on the Theory and Practice of Provenance, TaPP 2015 - Edinburgh, United Kingdom
Duration: Jul 8 2015Jul 9 2015

Conference

Conference7th USENIX Workshop on the Theory and Practice of Provenance, TaPP 2015
Country/TerritoryUnited Kingdom
CityEdinburgh
Period07/8/1507/9/15

Keywords

  • Introspection
  • Provenance
  • Reverse engineering

Fingerprint

Dive into the research topics of 'Decoupling provenance capture and analysis from execution'. Together they form a unique fingerprint.

Cite this