• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Take Over the Whole Cluster: Attacking Kubernetes via Excessive Permissions of Third-party Applications.

Nanzi YangWenbo ShenJinku LiXunqi LiuXin GuoJianfeng Ma
Published in: CCS (2023)
Keyphrases
  • third party
  • sensitive information
  • privacy policies
  • clustering algorithm
  • reverse logistics
  • personal information
  • access control
  • private information
  • web apis
  • data providers
  • databases
  • metadata
  • visual basic