Low-level exploitation mitigation by diverse microservices

13Citations
Citations of this article
29Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

This paper discusses a combination of isolatable microservices and software diversity as a mitigation technique against low-level exploitation; the effectiveness and benefits of such an architecture are substantiated. We argue that the core security benefit of microservices with diversity is increased control flow isolation. Additionally, a new microservices mitigation technique leveraging a security monitor service is introduced to further exploit the architectural benefits inherent to microservice architectures.

Cite

CITATION STYLE

APA

Otterstad, C., & Yarygina, T. (2017). Low-level exploitation mitigation by diverse microservices. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10465 LNCS, pp. 49–56). Springer Verlag. https://doi.org/10.1007/978-3-319-67262-5_4

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free