Guarding Serverless Applications with SecLambda

AI-generated keywords: SecLambda Serverless Computing Security Framework Control Flow Integrity Credential Protection

AI-generated Key Points

The license of the paper does not allow us to build upon its content and the key points are generated using the paper metadata rather than the full article.

  • Serverless computing is popular among attackers due to its emerging application paradigms
  • Conventional security tools are not easily transferable to serverless applications
  • Existing serverless security solutions are inadequate
  • A team of researchers has developed an extensible security framework called SecLambda
  • SecLambda uses both local function state and global application state to perform complex security tasks for safeguarding an application
  • SecLambda can be used to achieve control flow integrity, credential protection, and rate limiting in serverless applications
  • The team evaluated the performance overhead and security of SecLambda using realistic open-source applications
  • SecLambda can mitigate several attacks while introducing relatively low performance overhead
  • This paper presents a comprehensive solution for guarding serverless applications against potential threats that could compromise their integrity or confidentiality.
Also access our AI generated: Comprehensive summary, Lay summary, Blog-like article; or ask questions about this paper to our AI assistant.

Authors: Deepak Sirone Jegan, Liang Wang, Siddhant Bhagat, Thomas Ristenpart, Michael Swift

Abstract: As an emerging application paradigm, serverless computing attracts attention from more and more attackers. Unfortunately, security tools for conventional applications cannot be easily ported to serverless, and existing serverless security solutions are inadequate. In this paper, we present \emph{SecLambda}, an extensible security framework that leverages local function state and global application state to perform sophisticated security tasks to protect an application. We show how SecLambda can be used to achieve control flow integrity, credential protection, and rate limiting in serverless applications. We evaluate the performance overhead and security of SecLambda using realistic open-source applications, and our results suggest that SecLambda can mitigate several attacks while introducing relatively low performance overhead.

Submitted to arXiv on 10 Nov. 2020

Ask questions about this paper to our AI assistant

You can also chat with multiple papers at once here.

The license of the paper does not allow us to build upon its content and the AI assistant only knows about the paper metadata rather than the full article.

AI assistant instructions?

Results of the summarizing process for the arXiv paper: 2011.05322v1

This paper's license doesn't allow us to build upon its content and the summarizing process is here made with the paper's metadata rather than the article.

Serverless computing is becoming increasingly popular among attackers due to its emerging application paradigms. Unfortunately, conventional security tools are not easily transferable to serverless applications and existing serverless security solutions are inadequate. To address this issue, a team of researchers - Deepak Sirone Jegan, Liang Wang, Siddhant Bhagat, Thomas Ristenpart and Michael Swift - has developed an extensible security framework called SecLambda. This framework uses both local function state and global application state to perform complex security tasks for safeguarding an application. The team demonstrates how SecLambda can be used to achieve control flow integrity, credential protection and rate limiting in serverless applications. They evaluate the performance overhead and security of SecLambda using realistic open-source applications and conclude that it can mitigate several attacks while introducing relatively low performance overhead. This paper presents a comprehensive solution for guarding serverless applications against potential threats that could compromise their integrity or confidentiality.
Created on 11 Apr. 2023

Assess the quality of the AI-generated content by voting

Score: 0

Why do we need votes?

Votes are used to determine whether we need to re-run our summarizing tools. If the count reaches -10, our tools can be restarted.

The previous summary was created more than a year ago and can be re-run (if necessary) by clicking on the Run button below.

The license of this specific paper does not allow us to build upon its content and the summarizing tools will be run using the paper metadata rather than the full article. However, it still does a good job, and you can also try our tools on papers with more open licenses.

Similar papers summarized with our AI tools

Navigate through even more similar papers through a

tree representation

Look for similar papers (in beta version)

By clicking on the button above, our algorithm will scan all papers in our database to find the closest based on the contents of the full papers and not just on metadata. Please note that it only works for papers that we have generated summaries for and you can rerun it from time to time to get a more accurate result while our database grows.

Disclaimer: The AI-based summarization tool and virtual assistant provided on this website may not always provide accurate and complete summaries or responses. We encourage you to carefully review and evaluate the generated content to ensure its quality and relevance to your needs.