Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security 2018
DOI: 10.1145/3243734.3243776
|View full text |Cite
|
Sign up to set email alerts
|

Runtime Analysis of Whole-System Provenance

Abstract: Identifying the root cause and impact of a system intrusion remains a foundational challenge in computer security. Digital provenance provides a detailed history of the flow of information within a computing system, connecting suspicious events to their root causes. Although existing provenance-based auditing techniques provide value in forensic analysis, they assume that such analysis takes place only retrospectively. Such post-hoc analysis is insufficient for realtime security applications; moreover, even fo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
33
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
3
1

Relationship

3
6

Authors

Journals

citations
Cited by 67 publications
(33 citation statements)
references
References 65 publications
0
33
0
Order By: Relevance
“…We use CamFlow [100] as the reference implementation throughout the paper, although there exist other whole-system provenance implementations; in § VI, we show that UNI-CORN works seamlessly with other capture mechanisms as well. CamFlow adopts the Linux Security Modules (LSM) framework [89] to ensure high-quality, reliable recording of information flows among data objects [45], [101]. LSM eliminates race conditions (e.g., TOCTTOU attacks) by placing mediation points inside the kernel instead of at the system call interface [61].…”
Section: B Whole-system Provenancementioning
confidence: 99%
See 1 more Smart Citation
“…We use CamFlow [100] as the reference implementation throughout the paper, although there exist other whole-system provenance implementations; in § VI, we show that UNI-CORN works seamlessly with other capture mechanisms as well. CamFlow adopts the Linux Security Modules (LSM) framework [89] to ensure high-quality, reliable recording of information flows among data objects [45], [101]. LSM eliminates race conditions (e.g., TOCTTOU attacks) by placing mediation points inside the kernel instead of at the system call interface [61].…”
Section: B Whole-system Provenancementioning
confidence: 99%
“…1 only on newly-arriving vertices and on vertices whose in-coming neighborhood is affected by new edges. In provenance graphs that use multiple vertices per provenance entity or activity to represent different versions or states of the corresponding object [90], we need to compute/update only the neighborhood of the destination vertex for each new edge, because all incoming edges to a vertex arrive before any outgoing ones [101]. UNICORN takes advantage of this partial ordering to minimize computation ( Fig.…”
Section: Algorithm 1: Graph Histogram Generationmentioning
confidence: 99%
“…Recent studies [22], [44], [50] have used system-call level logs for real-time analytics. SLEUTH [22] presents tag-based techniques for attack detection and in-situ forensics.…”
Section: G Live Experimentsmentioning
confidence: 99%
“…This line of work typically parses system logs into dependency graphs (also known as provenance graphs) that allow to derive insights and scrutinize the causal relationships between events. Several methods have been proposed to automatically recognize security incidents from these graphs [23], [45], [83], [42], [11], [93], [35], [98], [124], to more precisely and accurately reason about the stream of events [67], [75], [65], [74], [5], or to more efficiently process queries to these graphs [71], [29], [30], [54], [55], [96]. Notably, all this work fully trusts the integrity of the logs used as input to their systems.…”
Section: B Data Provenance and Attack Investigationmentioning
confidence: 99%