A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
No keys to the kingdom required
2022
Proceedings of the 22nd ACM Internet Measurement Conference
Nowadays, applications expose administrative endpoints to the Web that can be used for a plethora of security sensitive actions. Typical use cases range from running small snippets of user-provided code for rapid prototyping, administering databases, and running CI/CD pipelines, to managing job scheduling on whole clusters of computing devices. While accessing these applications over the * Both authors contributed equally to this research.
doi:10.1145/3517745.3561446
fatcat:bk3idiodzna5za2kza2cvxbrey