YoVDO

Runtime Analysis of Whole-System Provenance

Offered By: Association for Computing Machinery (ACM) via YouTube

Tags

Intrusion Detection Courses Computer Security Courses Forensic Analysis Courses

Course Description

Overview

Explore runtime analysis of whole-system provenance in this 22-minute conference talk from the Association for Computing Machinery (ACM). Delve into the challenges of identifying root causes and impacts of system intrusions in real-time security applications. Examine the limitations of post-hoc analysis in provenance-based auditing techniques and discover innovative approaches to overcome these constraints. Learn about changes in provenance architecture, programming frameworks, and graph structure guarantees necessary for effective runtime analysis. Investigate various workloads, including in-kernel and userspace scenarios, through micro and macro-benchmarks. Gain valuable insights into the future of provenance-based security and its potential to revolutionize computer security practices.

Syllabus

Intro
Provenance in science
Provenance-based security - Forensic
Objectives
Provenance graph
Whole-system provenance
Overcoming limitation for runtime analysis
Change to provenance architecture
Programming framework
Graph structure guarantees
Need for ordering guarantees
Workloads (in-kernel)
Micro-benchmark (kernel-query)
Macro-benchmark (in kernel)
Workloads (userspace)
Take away


Taught by

Association for Computing Machinery (ACM)

Related Courses

Network Security
Rochester Institute of Technology via edX
Network Security
Georgia Institute of Technology via Udacity
Real-Time Cyber Threat Detection and Mitigation
New York University (NYU) via Coursera
Information security - IV
Indian Institute of Technology Madras via Swayam
Cyber Security
CEC via Swayam