Login / Signup
Take Over the Whole Cluster: Attacking Kubernetes via Excessive Permissions of Third-party Applications.
Nanzi Yang
Wenbo Shen
Jinku Li
Xunqi Liu
Xin Guo
Jianfeng Ma
Published in:
CCS (2023)
Keyphrases
</>
third party
sensitive information
privacy policies
clustering algorithm
reverse logistics
personal information
access control
private information
web apis
data providers
databases
metadata
visual basic