“…While a number of experimental audit frameworks have incorporated notions of data provenance [27], [31], [76], [98] and taint tracking [45], [29], the bulk of this work is also based on commodity audit frameworks such as Linux Audit. Techniques have also been proposed to efficiently extract threat intelligence from voluminous log data [99], [100], [46], [23], [30], [24], [101], [102], [32], [33], [34], [25], [85], [28], [103], [35], [104], [105]; in this work, we make the use of such techniques applicable to RTS through the design of a system audit framework that is compatible with temporally constrained applications. Our approach to template generation in Ellipsis shares similarities with the notion of execution partitioning of log activity [84], [32], [85], [23], [24], which decomposes long-lived applications into autonomous units of work to reduce false dependencies in forensic investigations.…”