Login / Signup

Take Over the Whole Cluster: Attacking Kubernetes via Excessive Permissions of Third-party Applications.

Nanzi YangWenbo ShenJinku LiXunqi LiuXin GuoJianfeng Ma
Published in: CCS (2023)
Keyphrases
  • third party
  • sensitive information
  • privacy policies
  • clustering algorithm
  • reverse logistics
  • personal information
  • access control
  • private information
  • web apis
  • data providers
  • databases
  • metadata
  • visual basic