1. Blackhat USA 2017. 2022 . Hacking serverless runtimes. https://www.blackhat.com/us-17/briefings/schedule/#hacking-serverless-runtimes-profiling-aws-lambda-azure-functions-and-more-6434 Retrieved April , 2022 from Blackhat USA 2017. 2022. Hacking serverless runtimes. https://www.blackhat.com/us-17/briefings/schedule/#hacking-serverless-runtimes-profiling-aws-lambda-azure-functions-and-more-6434 Retrieved April, 2022 from
2. Intel® 64 and IA-32 Architectures Software Developer Manuals . 2022. https://www.intel.com/content/www/us/en/developer/articles/technical/intel-sdm.html Retrieved July , 2022 from Intel® 64 and IA-32 Architectures Software Developer Manuals. 2022. https://www.intel.com/content/www/us/en/developer/articles/technical/intel-sdm.html Retrieved July, 2022 from
3. Secure serverless computing using dynamic information flow control
4. Julien Audibert , Pietro Michiardi , Frédéric Guyard , Sébastien Marti , and Maria A. Zuluaga . 2020. USAD: UnSupervised Anomaly Detection on Multivariate Time Series . In Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining ( Virtual Event, CA, USA) (KDD '20). Association for Computing Machinery, New York, NY, USA, 3395--3404. https://doi.org/10.1145/3394486.3403392 10.1145/3394486.3403392 Julien Audibert, Pietro Michiardi, Frédéric Guyard, Sébastien Marti, and Maria A. Zuluaga. 2020. USAD: UnSupervised Anomaly Detection on Multivariate Time Series. In Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining (Virtual Event, CA, USA) (KDD '20). Association for Computing Machinery, New York, NY, USA, 3395--3404. https://doi.org/10.1145/3394486.3403392
5. Securing Serverless -- by Breaking in. 2022. https://www.infoq.com/presentations/serverless-security-2018/ Retrieved April , 2022 from Securing Serverless -- by Breaking in. 2022. https://www.infoq.com/presentations/serverless-security-2018/ Retrieved April, 2022 from