Security

Towards Secure and Leak-Free Workflows Using Microservice Isolation

Companies like Netflix increasingly use the cloud to deploy their business processes. Those processes often involve partnerships with other companies, and can be modeled as workflows. This shift towards the cloud environment has led to more and more …

Towards Secure and Leak-Free Workflows Using Microservice Isolation

Companies like Netflix increasingly use the cloud to deploy their business processes. Those processes often involve partnerships with other companies, and can be modeled as workflows. This shift towards the cloud environment has led to more and more …

Securing Workflows Using Microservices

Ongoing efforts in the security community have tried to achieve desirable security properties, such as secure data at rest and in transport, policy enforcement, and data leak prevention for many years. Those efforts culminated in the design of …

A Taxonomy of Attacks Using BGP Blackholing

BGP blackholing is a common technique used to mitigate DDoS attacks. Generally, the victim sends in a request for traffic to the attacked IP(s) to be dropped. Unfortunately, remote parties may misuse blackholing and send requests for IPs they do not …

A Taxonomy of Attacks Using BGP Blackholing

BGP blackholing is a common technique used to mitigate DDoS attacks. Generally, the victim sends in a request for traffic to the attacked IP(s) to be dropped. Unfortunately, remote parties may misuse blackholing and send requests for IPs they do not …

Securing Workflows Using the Microservices Architecture

Ongoing efforts in the security community have tried to achieve desirable security properties, such as secure data at rest and in transport, policy enforcement, and data leak prevention for many years. Those efforts culminated in the design of …

BGP Blackholing Attack Defense

BGP blackholing is a common technique used to mitigate DDoS attacks. Generally, the victim sends in a request for traffic to the attacked IP(s) to be dropped. Unfortunately, remote parties may misuse blackholing and send requests for IPs they do not …