{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T16:02:20Z","timestamp":1759939340736},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319164618"},{"type":"electronic","value":"9783319164625"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-16462-5_12","type":"book-chapter","created":{"date-parts":[[2015,3,20]],"date-time":"2015-03-20T17:27:58Z","timestamp":1426872478000},"page":"155-167","source":"Crossref","is-referenced-by-count":22,"title":["Looking Inside the Black-Box: Capturing Data Provenance Using Dynamic Instrumentation"],"prefix":"10.1007","author":[{"given":"Manolis","family":"Stamatogiannakis","sequence":"first","affiliation":[]},{"given":"Paul","family":"Groth","sequence":"additional","affiliation":[]},{"given":"Herbert","family":"Bos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,21]]},"reference":[{"key":"12_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-23644-0_1","volume-title":"Recent Advances in Intrusion Detection","author":"E Bosman","year":"2011","unstructured":"Bosman, E., Slowinska, A., Bos, H.: Minemu: the world\u2019s fastest taint tracker. In: Sommer, R., Balzarotti, D., Maier, G. (eds.) RAID 2011. LNCS, vol. 6961, pp. 1\u201320. Springer, Heidelberg (2011)"},{"issue":"5","key":"12_CR2","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1002\/cpe.1226","volume":"20","author":"S Bowers","year":"2008","unstructured":"Bowers, S., McPhillips, T.M., Ludaescher, B.: Provenance in collection-oriented scientific workflows. Concurr. Comput. Pract. Exper. 20(5), 519\u2013529 (2008)","journal-title":"Concurr. Comput. Pract. Exper."},{"key":"12_CR3","unstructured":"Bruening, D.L.: Efficient, transparent, and comprehensive runtime code manipulation. Ph.D. thesis, MIT, Cambridge, MA, USA (2004)"},{"key":"12_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/978-3-540-70542-0_8","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"L Cavallaro","year":"2008","unstructured":"Cavallaro, L., Saxena, P., Sekar, R.: On the limits of information flow techniques for malware analysis and containment. In: Zamboni, D. (ed.) DIMVA 2008. LNCS, vol. 5137, pp. 143\u2013163. Springer, Heidelberg (2008)"},{"issue":"4","key":"12_CR5","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1561\/1900000006","volume":"1","author":"J Cheney","year":"2009","unstructured":"Cheney, J., Chiticariu, L., Tan, W.C.: Provenance in databases: why, how, and where. Found. Trends Databases 1(4), 379\u2013474 (2009)","journal-title":"Found. Trends Databases"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Clause, J., Li, W., Orso, A.: Dytan: a generic dynamic taint analysis framework. In: Proceedings of ISSTA 2007, London, UK (2007)","DOI":"10.1145\/1273463.1273490"},{"issue":"4","key":"12_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1455258.1455259","volume":"26","author":"M Costa","year":"2008","unstructured":"Costa, M., Crowcroft, J., Castro, M., Rowstron, A., Zhou, L., Zhang, L., Barham, P.: Vigilante: end-to-end containment of internet worm epidemics. ACM TOCS 26(4), 1\u201368 (2008)","journal-title":"ACM TOCS"},{"key":"12_CR8","unstructured":"Crandall, J.R., Chong, F.T.: Minos: control data attack prevention orthogonal to memory model. In: Proceedings of MICRO 37, Portland, OR, USA (2004)"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Davidson, S.B., Freire, J.: Provenance and scientific workflows: challenges and opportunities. In: Proceedings of SIGMOD 2008, Vancouver, Canada (2008)","DOI":"10.1145\/1376616.1376772"},{"issue":"7","key":"12_CR10","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1145\/359636.359712","volume":"20","author":"DE Denning","year":"1977","unstructured":"Denning, D.E., Denning, P.J.: Certification of programs for secure information flow. Commun. ACM 20(7), 504\u2013513 (1977)","journal-title":"Commun. ACM"},{"key":"12_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1007\/11890850_2","volume-title":"Provenance and Annotation of Data","author":"J-L Freire","year":"2006","unstructured":"Freire, J.-L., Silva, C.T., Callahan, S.P., Santos, E., Scheidegger, C.E., Vo, H.T.: Managing rapidly-evolving scientific workflows. In: Moreau, L., Foster, I. (eds.) IPAW 2006. LNCS, vol. 4145, pp. 10\u201318. Springer, Heidelberg (2006)"},{"issue":"5","key":"12_CR12","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1002\/cpe.1247","volume":"20","author":"J Frew","year":"2008","unstructured":"Frew, J., Metzger, D., Slaughter, P.: Automatic capture and reconstruction of computational provenance. Concurr. Comput. Pract. Exper. 20(5), 485\u2013496 (2008)","journal-title":"Concurr. Comput. Pract. Exper."},{"key":"12_CR13","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/978-3-642-30436-1_9","volume-title":"Information Security and Privacy Research","author":"E Gessiou","year":"2012","unstructured":"Gessiou, E., Pappas, V., Athanasopoulos, E., Keromytis, A.D., Ioannidis, S.: Towards a universal data provenance framework using dynamic instrumentation. In: Gritzalis, D., Furnell, S., Theoharidou, M. (eds.) SEC 2012. IFIP AICT, vol. 376, pp. 103\u2013114. Springer, Heidelberg (2012)"},{"issue":"5","key":"12_CR14","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1002\/cpe.1227","volume":"20","author":"DA Holland","year":"2008","unstructured":"Holland, D.A., Seltzer, M.I., Braun, U., Muniswamy-Reddy, K.K.: PASSing the provenance challenge. Concurr. Comput. Pract. Exper. 20(5), 531\u2013540 (2008)","journal-title":"Concurr. Comput. Pract. Exper."},{"key":"12_CR15","unstructured":"Kang, M.G., McCamant, S., Poosankam, P., Song, D.: DTA++: dynamic taint analysis with targeted control-flow propagation. In: Proceedings of NDSS 2011, San Diego, CA, USA (2011)"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Kemerlis, V.P., Portokalidis, G., Jee, K., Keromytis, A.D.: libdft: Practical dynamic data flow tracking for commodity systems. In: Proceedings of VEE 2012, London, UK (2012)","DOI":"10.1145\/2151024.2151042"},{"issue":"5","key":"12_CR17","doi-asserted-by":"publisher","first-page":"587","DOI":"10.1002\/cpe.1228","volume":"20","author":"J Kim","year":"2008","unstructured":"Kim, J., Deelman, E., Gil, Y., Mehta, G., Ratnakar, V.: Provenance trails in the wings-pegasus system. Concurr. Comput. Pract. Exper. 20(5), 587\u2013597 (2008)","journal-title":"Concurr. Comput. Pract. Exper."},{"key":"12_CR18","unstructured":"Lattner, C., Adve, V.: LLVM: a compilation framework for lifelong program analysis & transformation. In: Proceedings of CGO 2004, Palo Alto, CA, USA (2004)"},{"key":"12_CR19","unstructured":"Luk, C.K., Cohn, R., Muth, R., Patil, H., Klauser, A., Lowney, G., Wallace, S., Reddi, V.J., Hazelwood, K.: Pin: building customized program analysis tools with dynamic instrumentation. In: Proceedings of PLDI 2005, Chicago, IL, USA (2005)"},{"key":"12_CR20","unstructured":"Macko, P., Seltzer, M.: A General-purpose provenance library. In: Proceedings of USENIX TaPP 2012, Boston, MA, USA (2012)"},{"key":"12_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1007\/978-3-642-35173-0_29","volume-title":"The Semantic Web \u2013 ISWC 2012","author":"S Magliacane","year":"2012","unstructured":"Magliacane, S.: Reconstructing provenance. In: Cudr\u00e9-Mauroux, P., et al. (eds.) ISWC 2012, Part II. LNCS, vol. 7650, pp. 399\u2013406. Springer, Heidelberg (2012)"},{"key":"12_CR22","unstructured":"McCamant, S., Ernst, M.D.: Quantitative information-flow tracking for C and related languages. Technical report, MIT-CSAIL-TR-2006-076, MIT, Cambridge, MA, USA (2006)"},{"issue":"3","key":"12_CR23","first-page":"8:1","volume":"20","author":"S Miles","year":"2009","unstructured":"Miles, S., Groth, P., Munroe, S., Moreau, L.: PrIMe: a methodology for developing provenance-aware applications. ACM TOSEM 20(3), 8:1\u20138:42 (2009)","journal-title":"ACM TOSEM"},{"issue":"2\u20133","key":"12_CR24","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1561\/1800000010","volume":"2","author":"L Moreau","year":"2010","unstructured":"Moreau, L.: The foundations for provenance on the web. Found. Trends Web Sci. 2(2\u20133), 99\u2013241 (2010)","journal-title":"Found. Trends Web Sci."},{"key":"12_CR25","doi-asserted-by":"crossref","unstructured":"Moreau, L., Groth, P.: Provenance: an introduction to PROV. Synth. Lect. Semant. Web: Theory Technol. 3(4) (2013)","DOI":"10.2200\/S00528ED1V01Y201308WBE007"},{"key":"12_CR26","unstructured":"Moreau, L., Missier, P.: PROV-DM: The PROV Data Model. Recommendation REC-prov-dm-20130430, W3C (2013)"},{"key":"12_CR27","doi-asserted-by":"crossref","unstructured":"Nethercote, N., Seward, J.: Valgrind: a framework for heavyweight dynamic binary instrumentation. In: Proceedings of PLDI 2007, San Diego, CA, USA (2007)","DOI":"10.1145\/1250734.1250746"},{"key":"12_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-3-642-34222-6_8","volume-title":"Provenance and Annotation of Data and Processes","author":"T Nies De","year":"2012","unstructured":"De Nies, T., Coppens, S., Van Deursen, D., Mannens, E., Van de Walle, R.: Automatic discovery of high-level provenance using semantic similarity. In: Groth, P., Frew, J. (eds.) IPAW 2012. LNCS, vol. 7525, pp. 97\u2013110. Springer, Heidelberg (2012)"},{"issue":"10","key":"12_CR29","doi-asserted-by":"publisher","first-page":"1067","DOI":"10.1002\/cpe.993","volume":"18","author":"T Oinn","year":"2006","unstructured":"Oinn, T., Greenwood, M., et al.: Taverna: lessons in creating a workflow environment for the life sciences. Concurr. Comput. Pract. Exper. 18(10), 1067\u20131100 (2006)","journal-title":"Concurr. Comput. Pract. Exper."},{"issue":"3","key":"12_CR30","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1145\/1084805.1084812","volume":"34","author":"YL Simmhan","year":"2005","unstructured":"Simmhan, Y.L., Plale, B., Gannon, D.: A survey of data provenance in e-science. SIGMOD Rec. 34(3), 31\u201336 (2005)","journal-title":"SIGMOD Rec."},{"issue":"2","key":"12_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/jwsr.2008040101","volume":"5","author":"YL Simmhan","year":"2008","unstructured":"Simmhan, Y.L., Plale, B., Gannon, D.: Karma2: provenance management for data driven workflows. Int. J. Web Serv. Res. 5(2), 1\u201322 (2008)","journal-title":"Int. J. Web Serv. Res."},{"key":"12_CR32","doi-asserted-by":"crossref","unstructured":"Slowinska, A., Bos, H.: Pointless tainting?: evaluating the practicality of pointer tainting. In: Proceedings of EuroSys 2009, Nuremberg, Germany (2009)","DOI":"10.1145\/1519065.1519073"},{"key":"12_CR33","doi-asserted-by":"crossref","unstructured":"Srivastava, A., Eustace, A.: ATOM: a system for building customized program analysis tools. In: Proceedings of PLDI 1994, Orlando, FL, USA (1994)","DOI":"10.1145\/178243.178260"},{"key":"12_CR34","unstructured":"Vahdat, A., Anderson, T.: Transparent result caching. In: Proceedings of USENIX ATC 1998, New Orleans, LA, USA (1998)"},{"key":"12_CR35","volume-title":"Managing and Mining Uncertain Data","author":"J Widom","year":"2009","unstructured":"Widom, J.: Trio a system for data uncertainty and lineage. In: Aggarwal, C.C. (ed.) Managing and Mining Uncertain Data, vol. 35. Springer, New York (2009)"}],"container-title":["Lecture Notes in Computer Science","Provenance and Annotation of Data and Processes"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-16462-5_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T17:31:36Z","timestamp":1559151096000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-16462-5_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319164618","9783319164625"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-16462-5_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}