Completed
Overcoming limitation for runtime analysis
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Runtime Analysis of Whole-System Provenance
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Provenance in science
- 3 Provenance-based security - Forensic
- 4 Objectives
- 5 Provenance graph
- 6 Whole-system provenance
- 7 Overcoming limitation for runtime analysis
- 8 Change to provenance architecture
- 9 Programming framework
- 10 Graph structure guarantees
- 11 Need for ordering guarantees
- 12 Workloads (in-kernel)
- 13 Micro-benchmark (kernel-query)
- 14 Macro-benchmark (in kernel)
- 15 Workloads (userspace)
- 16 Take away