Affiliation:
1. Vrije Universiteit Amsterdam, The Netherlands
2. University of Cyprus, Nicosia, Cyprus
3. Elsevier Labs, The Netherlands
Abstract
Information produced by Internet applications is inherently a result of processes that are executed locally. Think of a web server that makes use of a CGI script, or a content management system where a post was first edited using a word processor. Given the impact of these processes to the content published online, a consumer of that information may want to understand what those impacts were. For example, understanding from where text was copied and pasted to make a post, or if the CGI script was updated with the latest security patches, may all influence the confidence on the published content. Capturing and exposing this information provenance is thus important to ascertaining trust to online content. Furthermore, providers of internet applications may wish to have access to the same information for debugging or audit purposes. For processes following a rigid structure (such as databases or workflows), disclosed provenance systems have been developed that efficiently and accurately capture the provenance of the produced data. However,
accurately
capturing provenance from
unstructured
processes, for example, user-interactive computing used to produce web content, remains a problem to be tackled.
In this article, we address the problem of capturing and exposing provenance from unstructured processes. Our approach, called
PROV
2R
(
PROV
enance
R
ecord and
R
eplay) is composed of two parts: (a) the decoupling of provenance analysis from its capture; and (b) the capture of high-fidelity provenance from unmodified programs. We use techniques originating in the security and reverse engineering communities, namely,
record and replay
and
taint tracking
. Taint tracking fundamentally addresses the data provenance problem but is impractical to apply at runtime due to extremely high overhead. With a number of case studies, we demonstrate that
PROV
2R
enables the use of taint analysis for high-fidelity provenance capture, while keeping the runtime overhead at manageable levels. In addition, we show how captured information can be represented using the W3C PROV provenance model for exposure on the Web.
Publisher
Association for Computing Machinery (ACM)
Subject
Computer Networks and Communications
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. ALchemist: Fusing Application and Audit Logs for Precise Attack Provenance without Instrumentation;Proceedings 2021 Network and Distributed System Security Symposium;2021
2. PANDAcap;Proceedings of the 13th European workshop on Systems Security;2020-04-23
3. Mal-Flux: Rendering hidden code of packed binary executable;Digital Investigation;2019-03
4. Provenance of Dynamic Adaptations in User-Steered Dataflows;Lecture Notes in Computer Science;2018