{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T17:55:32Z","timestamp":1774374932251,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":94,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF","award":["17-50024"],"award-info":[{"award-number":["17-50024"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,7]]},"DOI":"10.1145\/3427228.3427665","type":"proceedings-article","created":{"date-parts":[[2020,12,9]],"date-time":"2020-12-09T22:20:18Z","timestamp":1607552418000},"page":"496-509","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":37,"title":["Workflow Integration Alleviates Identity and Access Management in Serverless Computing"],"prefix":"10.1145","author":[{"given":"Arnav","family":"Sankaran","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign, United States of America"}]},{"given":"Pubali","family":"Datta","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, United States of America"}]},{"given":"Adam","family":"Bates","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2020,12,8]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2019. 21% of Open Source Serverless Apps Have Critical Vulnerabilities. https:\/\/www.puresec.io\/blog\/puresec-reveals-that-21-of-open-source-serverless-applications-have-critical-vulnerabilities.  2019. 21% of Open Source Serverless Apps Have Critical Vulnerabilities. https:\/\/www.puresec.io\/blog\/puresec-reveals-that-21-of-open-source-serverless-applications-have-critical-vulnerabilities."},{"key":"e_1_3_2_1_2_1","unstructured":"2019. A Deep Dive into Serverless Attacks SLS-1: Event Injection. https:\/\/www.protego.io\/a-deep-dive-into-serverless-attacks-sls-1-event-injection\/.  2019. A Deep Dive into Serverless Attacks SLS-1: Event Injection. https:\/\/www.protego.io\/a-deep-dive-into-serverless-attacks-sls-1-event-injection\/."},{"key":"e_1_3_2_1_3_1","unstructured":"2019. Aqua Cloud Native Security Platform. https:\/\/www.aquasec.com\/products\/aqua-container-security-platform\/.  2019. Aqua Cloud Native Security Platform. https:\/\/www.aquasec.com\/products\/aqua-container-security-platform\/."},{"key":"e_1_3_2_1_4_1","unstructured":"2019. AWS Lambda Container Lifetime and Config Refresh. https:\/\/www.linkedin.com\/pulse\/aws-lambda-container-lifetime-config-refresh-frederik-willaert\/.  2019. AWS Lambda Container Lifetime and Config Refresh. https:\/\/www.linkedin.com\/pulse\/aws-lambda-container-lifetime-config-refresh-frederik-willaert\/."},{"key":"e_1_3_2_1_5_1","unstructured":"2019. CVE-2019-5736: runc container breakout. https:\/\/www.openwall.com\/lists\/oss-security\/2019\/02\/11\/2.  2019. CVE-2019-5736: runc container breakout. https:\/\/www.openwall.com\/lists\/oss-security\/2019\/02\/11\/2."},{"key":"e_1_3_2_1_6_1","unstructured":"2019. Event Injection: Protecting your Serverless Applications. https:\/\/www.jeremydaly.com\/event-injection-protecting-your-serverless-applications\/.  2019. Event Injection: Protecting your Serverless Applications. https:\/\/www.jeremydaly.com\/event-injection-protecting-your-serverless-applications\/."},{"key":"e_1_3_2_1_7_1","volume-title":"Application (Web & Mobile Based","unstructured":"2019. Function-as-a-Service Market by User Type (Developer-Centric and Operator-Centric) , Application (Web & Mobile Based , Research & Academic) , Service Type , Deployment Model, Organization Size, Industry Vertical, and Region - Global Forecast to 2021. https:\/\/www.marketsandmarkets.com\/Market-Reports\/function-as-a-service-market-127202409.html. 2019. Function-as-a-Service Market by User Type (Developer-Centric and Operator-Centric), Application (Web & Mobile Based, Research & Academic), Service Type, Deployment Model, Organization Size, Industry Vertical, and Region - Global Forecast to 2021. https:\/\/www.marketsandmarkets.com\/Market-Reports\/function-as-a-service-market-127202409.html."},{"key":"e_1_3_2_1_8_1","unstructured":"2019. FunctionShield. https:\/\/www.puresec.io\/function-shield.  2019. FunctionShield. https:\/\/www.puresec.io\/function-shield."},{"key":"e_1_3_2_1_9_1","unstructured":"2019. Gathering weak npm credentials. https:\/\/github.com\/ChALkeR\/notes\/blob\/master\/Gathering-weak-npm-credentials.md.  2019. Gathering weak npm credentials. https:\/\/github.com\/ChALkeR\/notes\/blob\/master\/Gathering-weak-npm-credentials.md."},{"key":"e_1_3_2_1_10_1","unstructured":"2019. Hacking a Serverless Application: Demo. https:\/\/www.youtube.com\/watch?v=TcN7wHuroVw.  2019. Hacking a Serverless Application: Demo. https:\/\/www.youtube.com\/watch?v=TcN7wHuroVw."},{"key":"e_1_3_2_1_11_1","unstructured":"2019. Intrinsic: Software security re-invented.https:\/\/intrinsic.com\/.  2019. Intrinsic: Software security re-invented.https:\/\/intrinsic.com\/."},{"key":"e_1_3_2_1_12_1","unstructured":"2019. Lambda functions for rapid prototyping. https:\/\/developer.ibm.com\/articles\/cl-lambda-functions-rapid-prototyping\/.  2019. Lambda functions for rapid prototyping. https:\/\/developer.ibm.com\/articles\/cl-lambda-functions-rapid-prototyping\/."},{"key":"e_1_3_2_1_13_1","unstructured":"2019. Many-faced threats to Serverless security. https:\/\/hackernoon.com\/many-faced-threats-to-serverless-security-519e94d19dba.  2019. Many-faced threats to Serverless security. https:\/\/hackernoon.com\/many-faced-threats-to-serverless-security-519e94d19dba."},{"key":"e_1_3_2_1_14_1","unstructured":"2019. New Attack Vector - Serverless Crypto Mining. https:\/\/www.puresec.io\/blog\/new-attack-vector-serverless-crypto-mining.  2019. New Attack Vector - Serverless Crypto Mining. https:\/\/www.puresec.io\/blog\/new-attack-vector-serverless-crypto-mining."},{"key":"e_1_3_2_1_15_1","unstructured":"2019. OWASP Serverless Top 10. https:\/\/www.owasp.org\/index.php\/OWASP_Serverless_Top_10_Project.  2019. OWASP Serverless Top 10. https:\/\/www.owasp.org\/index.php\/OWASP_Serverless_Top_10_Project."},{"key":"e_1_3_2_1_16_1","unstructured":"2019. Protego Serverless Runtime Security. https:\/\/www.protego.io\/platform\/elastic-defense\/.  2019. Protego Serverless Runtime Security. https:\/\/www.protego.io\/platform\/elastic-defense\/."},{"key":"e_1_3_2_1_17_1","unstructured":"2019. Puresec Serverless Security Platform. https:\/\/www.puresec.io\/.  2019. Puresec Serverless Security Platform. https:\/\/www.puresec.io\/."},{"key":"e_1_3_2_1_18_1","unstructured":"2019. ReDoS Vulnerability in \u201dAWS-Lambda-Multipart-Parser\u201d Node Package. https:\/\/www.puresec.io\/blog\/redos-vulnerability-in-aws-lambda-multipart-parser-node-package.  2019. ReDoS Vulnerability in \u201dAWS-Lambda-Multipart-Parser\u201d Node Package. https:\/\/www.puresec.io\/blog\/redos-vulnerability-in-aws-lambda-multipart-parser-node-package."},{"key":"e_1_3_2_1_19_1","unstructured":"2019. Securing Serverless: Attacking an AWS Account via a Lambda Function. https:\/\/www.darkreading.com\/cloud\/securing-serverless-attacking-an-aws-account-via-a-lambda-function\/a\/d-id\/1333047.  2019. Securing Serverless: Attacking an AWS Account via a Lambda Function. https:\/\/www.darkreading.com\/cloud\/securing-serverless-attacking-an-aws-account-via-a-lambda-function\/a\/d-id\/1333047."},{"key":"e_1_3_2_1_20_1","unstructured":"2019. Securing Serverless \u2013 by Breaking in. https:\/\/www.infoq.com\/presentations\/serverless-security-2018.  2019. Securing Serverless \u2013 by Breaking in. https:\/\/www.infoq.com\/presentations\/serverless-security-2018."},{"key":"e_1_3_2_1_21_1","unstructured":"2019. Serverless Security for AWS Lambda Azure Functions and Google Cloud Functions. https:\/\/www.twistlock.com\/solutions\/serverless-security-aws-lambda-azure-google-cloud\/.  2019. Serverless Security for AWS Lambda Azure Functions and Google Cloud Functions. https:\/\/www.twistlock.com\/solutions\/serverless-security-aws-lambda-azure-google-cloud\/."},{"key":"e_1_3_2_1_22_1","unstructured":"2019. Snyk. https:\/\/snyk.io\/.  2019. Snyk. https:\/\/snyk.io\/."},{"key":"e_1_3_2_1_23_1","unstructured":"2019. Sysdig Secure. https:\/\/sysdig.com\/products\/secure\/.  2019. Sysdig Secure. https:\/\/sysdig.com\/products\/secure\/."},{"key":"e_1_3_2_1_24_1","unstructured":"2019. Vandium-node. https:\/\/github.com\/vandium-io\/vandium-node.  2019. Vandium-node. https:\/\/github.com\/vandium-io\/vandium-node."},{"key":"e_1_3_2_1_25_1","unstructured":"2020. AWS Identity and Access Management (IAM). https:\/\/aws.amazon.com\/iam\/  2020. AWS Identity and Access Management (IAM). https:\/\/aws.amazon.com\/iam\/"},{"key":"e_1_3_2_1_26_1","unstructured":"2020. AWS::Lambda::Function. https:\/\/docs.aws.amazon.com\/AWSCloudFormation\/latest\/UserGuide\/aws-resource-lambda-function.html  2020. AWS::Lambda::Function. https:\/\/docs.aws.amazon.com\/AWSCloudFormation\/latest\/UserGuide\/aws-resource-lambda-function.html"},{"key":"e_1_3_2_1_27_1","unstructured":"2020. Cloud Breach: Compromising AWS IAM Credentials. https:\/\/rhinosecuritylabs.com\/aws\/aws-iam-credentials-get-compromised\/  2020. Cloud Breach: Compromising AWS IAM Credentials. https:\/\/rhinosecuritylabs.com\/aws\/aws-iam-credentials-get-compromised\/"},{"key":"e_1_3_2_1_28_1","unstructured":"2020. List of AWS S3 Leaks. https:\/\/github.com\/nagwww\/s3-leaks  2020. List of AWS S3 Leaks. https:\/\/github.com\/nagwww\/s3-leaks"},{"key":"e_1_3_2_1_29_1","unstructured":"2020. Policy Evaluation Logic. https:\/\/docs.aws.amazon.com\/IAM\/latest\/UserGuide\/reference_policies_evaluation-logic.html  2020. Policy Evaluation Logic. https:\/\/docs.aws.amazon.com\/IAM\/latest\/UserGuide\/reference_policies_evaluation-logic.html"},{"key":"e_1_3_2_1_30_1","unstructured":"2020. This Is What Happened When I Leaked My AWS Secret Key. https:\/\/alexanderpaterson.com\/posts\/this-is-what-happened-when-i-leaked-my-aws-secret-key  2020. This Is What Happened When I Leaked My AWS Secret Key. https:\/\/alexanderpaterson.com\/posts\/this-is-what-happened-when-i-leaked-my-aws-secret-key"},{"key":"e_1_3_2_1_31_1","unstructured":"2020. What Is ABAC for AWS?https:\/\/docs.aws.amazon.com\/IAM\/latest\/UserGuide\/introduction_attribute-based-access-control.html  2020. What Is ABAC for AWS?https:\/\/docs.aws.amazon.com\/IAM\/latest\/UserGuide\/introduction_attribute-based-access-control.html"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2898101"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3117767"},{"key":"e_1_3_2_1_34_1","volume-title":"SAND: Towards High-Performance Serverless Computing. In 2018 USENIX Annual Technical Conference (USENIX ATC 18)","author":"Akkus Istemi\u00a0Ekin","year":"2018","unstructured":"Istemi\u00a0Ekin Akkus , Ruichuan Chen , Ivica Rimac , Manuel Stein , Klaus Satzke , Andre Beck , Paarijaat Aditya , and Volker Hilt . 2018 . SAND: Towards High-Performance Serverless Computing. In 2018 USENIX Annual Technical Conference (USENIX ATC 18) . USENIX Association, Boston, MA, 923\u2013935. https:\/\/www.usenix.org\/conference\/atc18\/presentation\/akkus Istemi\u00a0Ekin Akkus, Ruichuan Chen, Ivica Rimac, Manuel Stein, Klaus Satzke, Andre Beck, Paarijaat Aditya, and Volker Hilt. 2018. SAND: Towards High-Performance Serverless Computing. In 2018 USENIX Annual Technical Conference (USENIX ATC 18). USENIX Association, Boston, MA, 923\u2013935. https:\/\/www.usenix.org\/conference\/atc18\/presentation\/akkus"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338466.3358916"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3276488"},{"key":"e_1_3_2_1_37_1","unstructured":"Amazon. 2006. EC2 Beta Announcement. https:\/\/aws.amazon.com\/about-aws\/whats-new\/2006\/08\/24\/announcing-amazon-elastic-compute-cloud-amazon-ec2---beta\/  Amazon. 2006. EC2 Beta Announcement. https:\/\/aws.amazon.com\/about-aws\/whats-new\/2006\/08\/24\/announcing-amazon-elastic-compute-cloud-amazon-ec2---beta\/"},{"key":"e_1_3_2_1_38_1","unstructured":"Amazon Web Services. 2020. Identity and access management for AWS Lambda. https:\/\/docs.aws.amazon.com\/lambda\/latest\/dg\/security-iam.html.  Amazon Web Services. 2020. Identity and access management for AWS Lambda. https:\/\/docs.aws.amazon.com\/lambda\/latest\/dg\/security-iam.html."},{"key":"e_1_3_2_1_39_1","unstructured":"Michael Armbrust Armando Fox Rean Griffith Anthony\u00a0D. Joseph Randy\u00a0H. Katz Andrew Konwinski Gunho Lee David\u00a0A. Patterson Ariel Rabkin and Matei Zaharia. 2009. Above the Clouds: A Berkeley View of Cloud Computing. (2009).  Michael Armbrust Armando Fox Rean Griffith Anthony\u00a0D. Joseph Randy\u00a0H. Katz Andrew Konwinski Gunho Lee David\u00a0A. Patterson Ariel Rabkin and Matei Zaharia. 2009. Above the Clouds: A Berkeley View of Cloud Computing. (2009)."},{"key":"e_1_3_2_1_40_1","volume-title":"SCONE: Secure Linux Containers with Intel SGX. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16)","author":"Arnautov Sergei","year":"2016","unstructured":"Sergei Arnautov , Bohdan Trach , Franz Gregor , Thomas Knauth , Andre Martin , Christian Priebe , Joshua Lind , Divya Muthukumaran , Dan O\u2019Keeffe , Mark\u00a0 L. Stillwell , David Goltzsche , Dave Eyers , R\u00fcdiger Kapitza , Peter Pietzuch , and Christof Fetzer . 2016 . SCONE: Secure Linux Containers with Intel SGX. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16) . USENIX Association, Savannah, GA, 689\u2013703. https:\/\/www.usenix.org\/conference\/osdi16\/technical-sessions\/presentation\/arnautov Sergei Arnautov, Bohdan Trach, Franz Gregor, Thomas Knauth, Andre Martin, Christian Priebe, Joshua Lind, Divya Muthukumaran, Dan O\u2019Keeffe, Mark\u00a0L. Stillwell, David Goltzsche, Dave Eyers, R\u00fcdiger Kapitza, Peter Pietzuch, and Christof Fetzer. 2016. SCONE: Secure Linux Containers with Intel SGX. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16). USENIX Association, Savannah, GA, 689\u2013703. https:\/\/www.usenix.org\/conference\/osdi16\/technical-sessions\/presentation\/arnautov"},{"key":"e_1_3_2_1_41_1","volume-title":"Serverless Computing: Current Trends and Open Problems","author":"Baldini Ioana","year":"2017","unstructured":"Ioana Baldini , Paul Castro , Kerry Chang , Perry Cheng , Stephen Fink , Vatche Ishakian , Nick Mitchell , Vinod Muthusamy , Rodric Rabbah , Aleksander Slominski , and Philippe Suter . 2017 . Serverless Computing: Current Trends and Open Problems . Springer Singapore , Singapore , 1\u201320. https:\/\/doi.org\/10.1007\/978-981-10-5026-8_1 10.1007\/978-981-10-5026-8_1 Ioana Baldini, Paul Castro, Kerry Chang, Perry Cheng, Stephen Fink, Vatche Ishakian, Nick Mitchell, Vinod Muthusamy, Rodric Rabbah, Aleksander Slominski, and Philippe Suter. 2017. Serverless Computing: Current Trends and Open Problems. Springer Singapore, Singapore, 1\u201320. https:\/\/doi.org\/10.1007\/978-981-10-5026-8_1"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366623.3368137"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/964001.964018"},{"key":"e_1_3_2_1_44_1","first-page":"712","article-title":"Permissions decisions in a service provider environment","volume":"9","author":"Brandwine Eric\u00a0Jason","year":"2017","unstructured":"Eric\u00a0Jason Brandwine . 2017 . Permissions decisions in a service provider environment . US Patent 9 , 712 ,542. Eric\u00a0Jason Brandwine. 2017. Permissions decisions in a service provider environment. US Patent 9,712,542.","journal-title":"US Patent"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319647.3325825"},{"key":"e_1_3_2_1_46_1","unstructured":"Cloudflare. 2020. What Is Bot Traffic?https:\/\/www.cloudflare.com\/learning\/bots\/what-is-bot-traffic\/  Cloudflare. 2020. What Is Bot Traffic?https:\/\/www.cloudflare.com\/learning\/bots\/what-is-bot-traffic\/"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380173"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/SEC.2018.00029"},{"key":"e_1_3_2_1_49_1","volume-title":"Proceedings of 15th NIST-NCSC National Computer Security Conference. 554\u2013563","author":"Ferriaolo David","year":"1992","unstructured":"David Ferriaolo and Richard Kuhn . 1992 . Role-based access controls . In Proceedings of 15th NIST-NCSC National Computer Security Conference. 554\u2013563 . David Ferriaolo and Richard Kuhn. 1992. Role-based access controls. In Proceedings of 15th NIST-NCSC National Computer Security Conference. 554\u2013563."},{"key":"e_1_3_2_1_50_1","volume-title":"2019 USENIX Annual Technical Conference (USENIX ATC 19)","author":"Fouladi Sadjad","year":"2019","unstructured":"Sadjad Fouladi , Francisco Romero , Dan Iter , Qian Li , Shuvo Chatterjee , Christos Kozyrakis , Matei Zaharia , and Keith Winstein . 2019 . From Laptop to Lambda: Outsourcing Everyday Jobs to Thousands of Transient Functional Containers . In 2019 USENIX Annual Technical Conference (USENIX ATC 19) . USENIX Association, Renton, WA, 475\u2013488. https:\/\/www.usenix.org\/conference\/atc19\/presentation\/fouladi Sadjad Fouladi, Francisco Romero, Dan Iter, Qian Li, Shuvo Chatterjee, Christos Kozyrakis, Matei Zaharia, and Keith Winstein. 2019. From Laptop to Lambda: Outsourcing Everyday Jobs to Thousands of Transient Functional Containers. In 2019 USENIX Annual Technical Conference (USENIX ATC 19). USENIX Association, Renton, WA, 475\u2013488. https:\/\/www.usenix.org\/conference\/atc19\/presentation\/fouladi"},{"key":"e_1_3_2_1_51_1","volume-title":"No Less","author":"Gabbrielli Maurizio","unstructured":"Maurizio Gabbrielli , Saverio Giallorenzo , Ivan Lanese , Fabrizio Montesi , Marco Peressotti , and Stefano\u00a0Pio Zingaro . 2019. No More , No Less . In Coordination Models and Languages, Hanne Riis\u00a0Nielson and Emilio Tuosto (Eds.). Springer International Publishing , Cham , 148\u2013157. Maurizio Gabbrielli, Saverio Giallorenzo, Ivan Lanese, Fabrizio Montesi, Marco Peressotti, and Stefano\u00a0Pio Zingaro. 2019. No More, No Less. In Coordination Models and Languages, Hanne Riis\u00a0Nielson and Emilio Tuosto (Eds.). Springer International Publishing, Cham, 148\u2013157."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354227"},{"key":"#cr-split#-e_1_3_2_1_53_1.1","doi-asserted-by":"crossref","unstructured":"X. Gao B. Steenkamer Z. Gu M. Kayaalp D. Pendarakis and H. Wang. 2018. A Study on the Security Implications of Information Leakages in Container Clouds. IEEE Transactions on Dependable and Secure Computing (2018) 1-1. https:\/\/doi.org\/10.1109\/TDSC.2018.2879605 10.1109\/TDSC.2018.2879605","DOI":"10.1109\/TDSC.2018.2879605"},{"key":"#cr-split#-e_1_3_2_1_53_1.2","doi-asserted-by":"crossref","unstructured":"X. Gao B. Steenkamer Z. Gu M. Kayaalp D. Pendarakis and H. Wang. 2018. A Study on the Security Implications of Information Leakages in Container Clouds. IEEE Transactions on Dependable and Secure Computing (2018) 1-1. https:\/\/doi.org\/10.1109\/TDSC.2018.2879605","DOI":"10.1109\/TDSC.2018.2879605"},{"key":"e_1_3_2_1_54_1","unstructured":"GitHub. 2018. GitHub DDOS Incident Report. https:\/\/github.blog\/2018-03-01-ddos-incident-report\/  GitHub. 2018. GitHub DDOS Incident Report. https:\/\/github.blog\/2018-03-01-ddos-incident-report\/"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3284014.3284019"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3302505.3310084"},{"key":"e_1_3_2_1_57_1","volume-title":"Serverless Computation with OpenLambda. In 8th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 16)","author":"Hendrickson Scott","year":"2016","unstructured":"Scott Hendrickson , Stephen Sturdevant , Tyler Harter , Venkateshwaran Venkataramani , Andrea\u00a0 C. Arpaci-Dusseau , and Remzi\u00a0 H. Arpaci-Dusseau . 2016 . Serverless Computation with OpenLambda. In 8th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 16) . USENIX Association, Denver, CO. https:\/\/www.usenix.org\/conference\/hotcloud16\/workshop-program\/presentation\/hendrickson Scott Hendrickson, Stephen Sturdevant, Tyler Harter, Venkateshwaran Venkataramani, Andrea\u00a0C. Arpaci-Dusseau, and Remzi\u00a0H. Arpaci-Dusseau. 2016. Serverless Computation with OpenLambda. In 8th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 16). USENIX Association, Denver, CO. https:\/\/www.usenix.org\/conference\/hotcloud16\/workshop-program\/presentation\/hendrickson"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2015.33"},{"key":"e_1_3_2_1_59_1","unstructured":"Huang Xiaowei. 2019. Forensic Analysis in Access Control: a Case-Study of a Cloud Application. http:\/\/hdl.handle.net\/10012\/15265  Huang Xiaowei. 2019. Forensic Analysis in Access Control: a Case-Study of a Cloud Application. http:\/\/hdl.handle.net\/10012\/15265"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3322431.3325419"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3360575"},{"key":"e_1_3_2_1_62_1","unstructured":"Eric Jonas Johann Schleier-Smith Vikram Sreekanti Chia-che Tsai Anurag Khandelwal Qifan Pu Vaishaal Shankar Joao Carreira Karl Krauth Neeraja\u00a0Jayant Yadwadkar Joseph\u00a0E. Gonzalez Raluca\u00a0Ada Popa Ion Stoica and David\u00a0A. Patterson. 2019. Cloud Programming Simplified: A Berkeley View on Serverless Computing. CoRR abs\/1902.03383(2019). arxiv:1902.03383http:\/\/arxiv.org\/abs\/1902.03383  Eric Jonas Johann Schleier-Smith Vikram Sreekanti Chia-che Tsai Anurag Khandelwal Qifan Pu Vaishaal Shankar Joao Carreira Karl Krauth Neeraja\u00a0Jayant Yadwadkar Joseph\u00a0E. Gonzalez Raluca\u00a0Ada Popa Ion Stoica and David\u00a0A. Patterson. 2019. Cloud Programming Simplified: A Berkeley View on Serverless Computing. CoRR abs\/1902.03383(2019). arxiv:1902.03383http:\/\/arxiv.org\/abs\/1902.03383"},{"key":"e_1_3_2_1_63_1","unstructured":"Eric Jonas Johann Schleier-Smith Vikram Sreekanti Chia-Che Tsai Anurag Khandelwal Qifan Pu Vaishaal Shankar Joao Carreira Karl Krauth Neeraja Yadwadkar 2019. Cloud Programming Simplified: A Berkeley View on Serverless Computing. arXiv preprint arXiv:1902.03383(2019).  Eric Jonas Johann Schleier-Smith Vikram Sreekanti Chia-Che Tsai Anurag Khandelwal Qifan Pu Vaishaal Shankar Joao Carreira Karl Krauth Neeraja Yadwadkar 2019. Cloud Programming Simplified: A Berkeley View on Serverless Computing. arXiv preprint arXiv:1902.03383(2019)."},{"key":"e_1_3_2_1_64_1","unstructured":"Rich Jones. 2019. Gone in 60 Milliseconds: Intrusion and Exfiltration in Server-less Architectures. https:\/\/media.ccc.de\/v\/33c3-7865-gone_in_60_milliseconds.  Rich Jones. 2019. Gone in 60 Milliseconds: Intrusion and Exfiltration in Server-less Architectures. https:\/\/media.ccc.de\/v\/33c3-7865-gone_in_60_milliseconds."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3018896.3025152"},{"key":"e_1_3_2_1_66_1","volume-title":"Understanding Ephemeral Storage for Serverless Analytics. In 2018 USENIX Annual Technical Conference (USENIX ATC 18)","author":"Klimovic Ana","year":"2018","unstructured":"Ana Klimovic , Yawen Wang , Christos Kozyrakis , Patrick Stuedi , Jonas Pfefferle , and Animesh Trivedi . 2018 . Understanding Ephemeral Storage for Serverless Analytics. In 2018 USENIX Annual Technical Conference (USENIX ATC 18) . USENIX Association, Boston, MA, 789\u2013794. https:\/\/www.usenix.org\/conference\/atc18\/presentation\/klimovic-serverless Ana Klimovic, Yawen Wang, Christos Kozyrakis, Patrick Stuedi, Jonas Pfefferle, and Animesh Trivedi. 2018. Understanding Ephemeral Storage for Serverless Analytics. In 2018 USENIX Annual Technical Conference (USENIX ATC 18). USENIX Association, Boston, MA, 789\u2013794. https:\/\/www.usenix.org\/conference\/atc18\/presentation\/klimovic-serverless"},{"key":"e_1_3_2_1_67_1","volume-title":"Pocket: Elastic Ephemeral Storage for Serverless Analytics. In 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18)","author":"Klimovic Ana","year":"2018","unstructured":"Ana Klimovic , Yawen Wang , Patrick Stuedi , Animesh Trivedi , Jonas Pfefferle , and Christos Kozyrakis . 2018 . Pocket: Elastic Ephemeral Storage for Serverless Analytics. In 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18) . USENIX Association, Carlsbad, CA, 427\u2013444. https:\/\/www.usenix.org\/conference\/osdi18\/presentation\/klimovic Ana Klimovic, Yawen Wang, Patrick Stuedi, Animesh Trivedi, Jonas Pfefferle, and Christos Kozyrakis. 2018. Pocket: Elastic Ephemeral Storage for Serverless Analytics. In 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18). USENIX Association, Carlsbad, CA, 427\u2013444. https:\/\/www.usenix.org\/conference\/osdi18\/presentation\/klimovic"},{"key":"e_1_3_2_1_68_1","volume-title":"Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies","author":"Koch M.","unstructured":"M. Koch , L.\u00a0 V. Mancini , and F. Parisi-Presicce . 2001. On the Specification and Evolution of Access Control Policies . In Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies ( Chantilly, Virginia, USA) (SACMAT \u201901). Association for Computing Machinery, New York, NY, USA, 121\u2013130. https:\/\/doi.org\/10.1145\/373256.373280 10.1145\/373256.373280 M. Koch, L.\u00a0V. Mancini, and F. Parisi-Presicce. 2001. On the Specification and Evolution of Access Control Policies. In Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies (Chantilly, Virginia, USA) (SACMAT \u201901). Association for Computing Machinery, New York, NY, USA, 121\u2013130. https:\/\/doi.org\/10.1145\/373256.373280"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/545186.545191"},{"key":"e_1_3_2_1_70_1","volume-title":"Proceedings of the Ninth ACM Symposium on Access Control Models and Technologies","author":"Koch M.","unstructured":"M. Koch , L.\u00a0 V. Mancini , and F. Parisi-Presicce . 2004. Administrative Scope in the Graph-Based Framework . In Proceedings of the Ninth ACM Symposium on Access Control Models and Technologies ( Yorktown Heights, New York, USA) (SACMAT \u201904). Association for Computing Machinery, New York, NY, USA, 97\u2013104. https:\/\/doi.org\/10.1145\/990036.990051 10.1145\/990036.990051 M. Koch, L.\u00a0V. Mancini, and F. Parisi-Presicce. 2004. Administrative Scope in the Graph-Based Framework. In Proceedings of the Ninth ACM Symposium on Access Control Models and Technologies (Yorktown Heights, New York, USA) (SACMAT \u201904). Association for Computing Machinery, New York, NY, USA, 97\u2013104. https:\/\/doi.org\/10.1145\/990036.990051"},{"key":"e_1_3_2_1_71_1","unstructured":"Andrew Krug and Graham Jones. 2019. Hacking serverless runtimes: Profiling AWS Lambda Azure Functions And more. https:\/\/www.blackhat.com\/us-17\/briefings\/schedule\/#hacking-serverless-runtimes-profiling-aws-lambda-azure-functions-and-more-6434.  Andrew Krug and Graham Jones. 2019. Hacking serverless runtimes: Profiling AWS Lambda Azure Functions And more. https:\/\/www.blackhat.com\/us-17\/briefings\/schedule\/#hacking-serverless-runtimes-profiling-aws-lambda-azure-functions-and-more-6434."},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3344341.3368796"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2018.12.013"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23418"},{"key":"e_1_3_2_1_75_1","volume-title":"Troubleshooting Serverless functions: a combined monitoring and debugging approach. SICS Software-Intensive Cyber-Physical Systems 34, 2 (01","author":"Manner Johannes","year":"2019","unstructured":"Johannes Manner , Stefan Kolb , and Guido Wirtz . 2019. Troubleshooting Serverless functions: a combined monitoring and debugging approach. SICS Software-Intensive Cyber-Physical Systems 34, 2 (01 Jun 2019 ), 99\u2013104. https:\/\/doi.org\/10.1007\/s00450-019-00398-6 10.1007\/s00450-019-00398-6 Johannes Manner, Stefan Kolb, and Guido Wirtz. 2019. Troubleshooting Serverless functions: a combined monitoring and debugging approach. SICS Software-Intensive Cyber-Physical Systems 34, 2 (01 Jun 2019), 99\u2013104. https:\/\/doi.org\/10.1007\/s00450-019-00398-6"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2017.36"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/3210284.3210285"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366623.3368133"},{"key":"e_1_3_2_1_79_1","volume-title":"SOCK: Rapid Task Provisioning with Serverless-Optimized Containers. In 2018 USENIX Annual Technical Conference (USENIX ATC 18)","author":"Oakes Edward","year":"2018","unstructured":"Edward Oakes , Leon Yang , Dennis Zhou , Kevin Houck , Tyler Harter , Andrea Arpaci-Dusseau , and Remzi Arpaci-Dusseau . 2018 . SOCK: Rapid Task Provisioning with Serverless-Optimized Containers. In 2018 USENIX Annual Technical Conference (USENIX ATC 18) . USENIX Association, Boston, MA, 57\u201370. https:\/\/www.usenix.org\/conference\/atc18\/presentation\/oakes Edward Oakes, Leon Yang, Dennis Zhou, Kevin Houck, Tyler Harter, Andrea Arpaci-Dusseau, and Remzi Arpaci-Dusseau. 2018. SOCK: Rapid Task Provisioning with Serverless-Optimized Containers. In 2018 USENIX Annual Technical Conference (USENIX ATC 18). USENIX Association, Boston, MA, 57\u201370. https:\/\/www.usenix.org\/conference\/atc18\/presentation\/oakes"},{"key":"e_1_3_2_1_80_1","volume-title":"Service-Oriented and Cloud Computing","author":"Obetz Matthew","unstructured":"Matthew Obetz , Anirban Das , Timothy Castiglia , Stacy Patterson , and Ana Milanova . 2020. Formalizing Event-Driven Behavior of Serverless Applications . In Service-Oriented and Cloud Computing , Antonio Brogi, Wolf Zimmermann, and Kyriakos Kritikos(Eds.). Springer International Publishing , Cham , 19\u201329. Matthew Obetz, Anirban Das, Timothy Castiglia, Stacy Patterson, and Ana Milanova. 2020. Formalizing Event-Driven Behavior of Serverless Applications. In Service-Oriented and Cloud Computing, Antonio Brogi, Wolf Zimmermann, and Kyriakos Kritikos(Eds.). Springer International Publishing, Cham, 19\u201329."},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/344287.344299"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/3154847.3154853"},{"key":"e_1_3_2_1_83_1","unstructured":"Protego. 2020. Is AWS Lambda the Most Secure Application Platform? Probably.https:\/\/www.protego.io\/is-aws-lambda-secure\/.  Protego. 2020. Is AWS Lambda the Most Secure Application Platform? Probably.https:\/\/www.protego.io\/is-aws-lambda-secure\/."},{"key":"e_1_3_2_1_84_1","volume-title":"Fast and Slow: Scalable Analytics on Serverless Infrastructure. In 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19)","author":"Pu Qifan","year":"2019","unstructured":"Qifan Pu , Shivaram Venkataraman , and Ion Stoica . 2019 . Shuffling , Fast and Slow: Scalable Analytics on Serverless Infrastructure. In 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19) . USENIX Association, Boston, MA, 193\u2013206. https:\/\/www.usenix.org\/conference\/nsdi19\/presentation\/pu Qifan Pu, Shivaram Venkataraman, and Ion Stoica. 2019. Shuffling, Fast and Slow: Scalable Analytics on Serverless Infrastructure. In 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19). USENIX Association, Boston, MA, 193\u2013206. https:\/\/www.usenix.org\/conference\/nsdi19\/presentation\/pu"},{"key":"e_1_3_2_1_85_1","first-page":"438","article-title":"Identity and access management-based access control in virtual networks","volume":"9","author":"Ryland Mark","year":"2016","unstructured":"Mark Ryland . 2016 . Identity and access management-based access control in virtual networks . US Patent 9 , 438 ,506. Mark Ryland. 2016. Identity and access management-based access control in virtual networks. US Patent 9,438,506.","journal-title":"US Patent"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/3284028.3284029"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366623.3368140"},{"key":"e_1_3_2_1_88_1","unstructured":"Nordstrom Technology. 2019. Hello Retail!https:\/\/github.com\/Nordstrom\/hello-retail  Nordstrom Technology. 2019. Hello Retail!https:\/\/github.com\/Nordstrom\/hello-retail"},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/1750389.1750393"},{"key":"e_1_3_2_1_90_1","unstructured":"Kailas Vodrahalli and Eric Zhou. [n.d.]. Using Software-defined Caching to Enable Efficient Communication in a Serverless Environment. ([n.\u00a0d.]).  Kailas Vodrahalli and Eric Zhou. [n.d.]. Using Software-defined Caching to Enable Efficient Communication in a Serverless Environment. ([n.\u00a0d.])."},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1145\/1266840.1266865"},{"key":"e_1_3_2_1_92_1","volume-title":"Peeking Behind the Curtains of Serverless Platforms. In 2018 USENIX Annual Technical Conference (USENIX ATC 18)","author":"Wang Liang","year":"2018","unstructured":"Liang Wang , Mengyuan Li , Yinqian Zhang , Thomas Ristenpart , and Michael Swift . 2018 . Peeking Behind the Curtains of Serverless Platforms. In 2018 USENIX Annual Technical Conference (USENIX ATC 18) . USENIX Association, Boston, MA, 133\u2013146. https:\/\/www.usenix.org\/conference\/atc18\/presentation\/wang-liang Liang Wang, Mengyuan Li, Yinqian Zhang, Thomas Ristenpart, and Michael Swift. 2018. Peeking Behind the Curtains of Serverless Platforms. In 2018 USENIX Annual Technical Conference (USENIX ATC 18). USENIX Association, Boston, MA, 133\u2013146. https:\/\/www.usenix.org\/conference\/atc18\/presentation\/wang-liang"},{"key":"e_1_3_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1145\/3304112.3325608"}],"event":{"name":"ACSAC '20: Annual Computer Security Applications Conference","location":"Austin USA","acronym":"ACSAC '20"},"container-title":["Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427665","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3427228.3427665","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3427228.3427665","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:25Z","timestamp":1750197745000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427665"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,7]]},"references-count":94,"alternative-id":["10.1145\/3427228.3427665","10.1145\/3427228"],"URL":"https:\/\/doi.org\/10.1145\/3427228.3427665","relation":{},"subject":[],"published":{"date-parts":[[2020,12,7]]},"assertion":[{"value":"2020-12-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}