Pivot tracing: Dynamic causal monitoring for distributed systems

J Mace, R Roelke, R Fonseca - ACM Transactions on Computer Systems …, 2018 - dl.acm.org
Monitoring and troubleshooting distributed systems is notoriously difficult; potential problems
are complex, varied, and unpredictable. The monitoring and diagnosis tools commonly used …

Canopy: An end-to-end performance tracing and analysis system

J Kaldor, J Mace, M Bejda, E Gao… - Proceedings of the 26th …, 2017 - dl.acm.org
This paper presents Canopy, Facebook's end-to-end performance tracing infrastructure.
Canopy records causally related performance data across the end-to-end execution path of …

Protracer: Towards practical provenance tracing by alternating between logging and tainting

S Ma, X Zhang, D Xu - 23rd Annual Network And …, 2016 - scholarship.libraries.rutgers.edu
ProTracer: towards practical provenance tracing by alternating between logging and
tainting Page 1 Please do not remove this page ProTracer: towards practical provenance …

Be conservative: Enhancing failure diagnosis with proactive logging

D Yuan, S Park, P Huang, Y Liu, MM Lee… - … USENIX Symposium on …, 2012 - usenix.org
When systems fail in the field, logged error or warning messages are frequently the only
evidence available for assessing and diagnosing the underlying cause. Consequently, the …

{MPI}: Multiple perspective attack investigation with semantic aware execution partitioning

S Ma, J Zhai, F Wang, KH Lee, X Zhang… - 26th USENIX Security …, 2017 - usenix.org
Traditional auditing techniques generate large and inaccurate causal graphs. To overcome
such limitations, researchers proposed to leverage execution partitioning to improve …

lprof: A non-intrusive request flow profiler for distributed systems

X Zhao, Y Zhang, D Lion, MF Ullah, Y Luo… - … USENIX Symposium on …, 2014 - usenix.org
Applications implementing cloud services, such as HDFS, Hadoop YARN, Cassandra, and
HBase, are mostly built as distributed systems designed to scale. In order to analyze and …

Nodlink: An online system for fine-grained apt attack detection and investigation

S Li, F Dong, X **ao, H Wang, F Shao, J Chen… - arxiv preprint arxiv …, 2023 - arxiv.org
Advanced Persistent Threats (APT) attacks have plagued modern enterprises, causing
significant financial losses. To counter these attacks, researchers propose techniques that …

{Kernel-Supported}{Cost-Effective} Audit Logging for Causality Tracking

S Ma, J Zhai, Y Kwon, KH Lee, X Zhang… - 2018 USENIX Annual …, 2018 - usenix.org
The Linux Audit system is widely used as a causality tracking system in real-world
deployments for problem diagnosis and forensic analysis. However, it has poor …

[PDF][PDF] ALchemist: Fusing Application and Audit Logs for Precise Attack Provenance without Instrumentation.

L Yu, S Ma, Z Zhang, G Tao, X Zhang, D Xu, VE Urias… - NDSS, 2021 - cs.purdue.edu
Cyber-attacks are becoming more persistent and complex. Most state-of-the-art attack
forensics techniques either require annotating and instrumenting software applications or …