This mechanism includes a wide set of tools that ensures that an attacker has the smallest amount of resources at its disposal to attack a system. This is valuable because several zero-day exploits target unused features of the kernel.
Links:
Security Primitive:
Attack Surface Reduction
Cloud:
Security Requirements Addressed:
Contact:
IBM
Source Code: