Abstract
Capturing provenance usually involves the direct observation and instrumentation of the execution of a program or workflow. However, this approach restricts provenance analysis to pre-determined programs and methods. This may not pose a problem when one is interested in the provenance of a well-defined workflow, but may limit the analysis of unstructured processes such as interactive desktop computing. In this paper, we present a new approach to capturing provenance based on full execution record and replay. Our approach leverages full-system execution trace logging and replay, which allows the complete decoupling of analysis from the original execution. This enables the selective analysis of the execution using progressively heavier instrumentation.
| Original language | English |
|---|---|
| State | Published - 2015 |
| Externally published | Yes |
| Event | 7th USENIX Workshop on the Theory and Practice of Provenance, TaPP 2015 - Edinburgh, United Kingdom Duration: Jul 8 2015 → Jul 9 2015 |
Conference
| Conference | 7th USENIX Workshop on the Theory and Practice of Provenance, TaPP 2015 |
|---|---|
| Country/Territory | United Kingdom |
| City | Edinburgh |
| Period | 07/8/15 → 07/9/15 |
Keywords
- Introspection
- Provenance
- Reverse engineering