Low-Level Exploitation Mitigation by Diverse Microservices
Abstract
This paper discusses a combination of isolatable microservices and software diversity as a mitigation technique against low-level exploitation; the effectiveness and benefits of such an architecture are substantiated. We argue that the core security benefit of microservices with diversity is increased control flow isolation. Additionally, a new microservices mitigation technique leveraging a security monitor service is introduced to further exploit the architectural benefits inherent to microservice architectures.
Domains
Computer Science [cs]Origin | Files produced by the author(s) |
---|
Loading...