Defending against emerging threats in serverless computing through information flow analysis