{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:44:20Z","timestamp":1767339860825,"version":"3.45.0"},"publisher-location":"New York, NY, USA","reference-count":63,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,12]],"date-time":"2021-11-12T00:00:00Z","timestamp":1636675200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3485372","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:33Z","timestamp":1636805133000},"page":"955-969","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Warmonger: Inflicting Denial-of-Service via Serverless Functions in the Cloud"],"prefix":"10.1145","author":[{"given":"Junjie","family":"Xiong","sequence":"first","affiliation":[{"name":"University of South Florida, Tampa, FL, USA"}]},{"given":"Mingkui","family":"Wei","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, VA, USA"}]},{"given":"Zhuo","family":"Lu","sequence":"additional","affiliation":[{"name":"University of South Florida, Tampa, FL, USA"}]},{"given":"Yao","family":"Liu","sequence":"additional","affiliation":[{"name":"University of South Florida, Tampa, FL, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_2_1_1","first-page":"419","volume-title":"17th USENIX symposium on networked systems design and implementation (NSDI 20)","author":"Agache Alexandru","year":"2020","unstructured":"Alexandru Agache, Marc Brooker, Alexandra Iordache, Anthony Liguori, Rolf Neugebauer, Phil Piwonka, and Diana-Maria Popa. Firecracker: Lightweight virtualization for serverless applications. In 17th USENIX symposium on networked systems design and implementation (NSDI 20), pages 419--434, 2020."},{"key":"e_1_3_2_2_2_1","first-page":"923","volume-title":"2018 Usenix Annual Technical Conference (USENIX ATC 18)","author":"Akkus Istemi Ekin","year":"2018","unstructured":"Istemi Ekin Akkus, Ruichuan Chen, Ivica Rimac, Manuel Stein, Klaus Satzke, Andre Beck, Paarijaat Aditya, and Volker Hilt. SAND: Towards high-performance serverless computing. In 2018 Usenix Annual Technical Conference (USENIX ATC 18), pages 923--935, 2018."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-25660-1_25"},{"key":"e_1_3_2_2_4_1","volume-title":"Secure serverless computing using dynamic information flow control. arXiv preprint arXiv:1802.08984","author":"Alpernas Kalev","year":"2018","unstructured":"Kalev Alpernas, Cormac Flanagan, Sadjad Fouladi, Leonid Ryzhyk, Mooly Sagiv, Thomas Schmitz, and Keith Winstein. Secure serverless computing using dynamic information flow control. arXiv preprint arXiv:1802.08984, 2018."},{"key":"e_1_3_2_2_5_1","volume-title":"https:\/\/aws.amazon.com\/lambda\/","author":"Lambda AWS","year":"2021","unstructured":"Amazon. AWS Lambda. https:\/\/aws.amazon.com\/lambda\/, 2021."},{"volume-title":"IP Ranges AWS. https:\/\/ip-ranges.amazonaws.com\/ip-ranges.json","year":"2021","key":"e_1_3_2_2_6_1","unstructured":"Amazon. IP Ranges AWS. https:\/\/ip-ranges.amazonaws.com\/ip-ranges.json, 2021."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664168.2664179"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-5026-8_1"},{"key":"e_1_3_2_2_9_1","volume-title":"Coca Cola things-go-better-with-step-functions. https:\/\/aws.amazon.com\/blogs\/aws\/things-go-better-with-step-functions\/","author":"Barr Jeff","year":"2017","unstructured":"Jeff Barr. Coca Cola things-go-better-with-step-functions. https:\/\/aws.amazon.com\/blogs\/aws\/things-go-better-with-step-functions\/, 2017."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3232755.3232859"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2002.1189011"},{"key":"e_1_3_2_2_12_1","volume-title":"Securely connecting to VM instances. https:\/\/cloud.google.com\/solutions\/connecting-securely","author":"Cloud Google","year":"2021","unstructured":"Google Cloud. Securely connecting to VM instances. https:\/\/cloud.google.com\/solutions\/connecting-securely, 2021."},{"key":"e_1_3_2_2_13_1","volume-title":"https:\/\/workers.cloudflare.com\/","author":"Workers Cloudflare","year":"2021","unstructured":"Cloudflare. Cloudflare Workers. https:\/\/workers.cloudflare.com\/, 2021."},{"volume-title":"IP Ranges Cloudflare. https:\/\/www.cloudflare.com\/ips\/","year":"2021","key":"e_1_3_2_2_14_1","unstructured":"Cloudflare. IP Ranges Cloudflare. https:\/\/www.cloudflare.com\/ips\/, 2021."},{"key":"e_1_3_2_2_15_1","volume-title":"Cloudflare Worker Limits. https:\/\/developers.cloudflare.com\/workers\/platform\/limits","author":"Docs Cloudflare","year":"2021","unstructured":"Cloudflare Docs. Cloudflare Worker Limits. https:\/\/developers.cloudflare.com\/workers\/platform\/limits, 2021."},{"key":"e_1_3_2_2_16_1","volume-title":"Serverless Architecture Market Is Expected to Reach $21.99 Billion by","author":"Correa David","year":"2025","unstructured":"David Correa. Serverless Architecture Market Is Expected to Reach $21.99 Billion by 2025, Says AMR. https:\/\/www.einnews.com\/pr_news\/526706260\/serverless-architecture-market-to-reach-21--99-billion-by-2025-says-amr, 2020."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380173"},{"key":"e_1_3_2_2_18_1","volume-title":"Build a slackbot. https:\/\/developers.cloudflare.com\/workers\/tutorials\/build-a-slackbot","author":"Docs Cloudflare","year":"2021","unstructured":"Cloudflare Docs. Build a slackbot. https:\/\/developers.cloudflare.com\/workers\/tutorials\/build-a-slackbot, 2021."},{"key":"e_1_3_2_2_19_1","volume-title":"Rate limits for GitHub Apps. https:\/\/docs.github.com\/en\/developers\/apps\/rate-limits-for-github-apps","author":"Docs Github","year":"2021","unstructured":"Github Docs. Rate limits for GitHub Apps. https:\/\/docs.github.com\/en\/developers\/apps\/rate-limits-for-github-apps, 2021."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2003.10.003"},{"key":"e_1_3_2_2_21_1","volume-title":"Top 10 best open source firewall to protect your enterprise network","author":"Dutta Tushar Subhra","year":"2021","unstructured":"Tushar Subhra Dutta. Top 10 best open source firewall to protect your enterprise network 2021. https:\/\/cybersecuritynews.com\/best-open-source-firewall\/, 2021."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815690"},{"key":"e_1_3_2_2_23_1","volume-title":"Rate limiting delivering more rules and greater control. https:\/\/blog.cloudflare.com\/rate-limiting-delivering-more-rules-and-greater-control\/","author":"Farmer Alex Cruz","year":"2018","unstructured":"Alex Cruz Farmer. Rate limiting delivering more rules and greater control. https:\/\/blog.cloudflare.com\/rate-limiting-delivering-more-rules-and-greater-control\/, 2018."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3075552"},{"key":"e_1_3_2_2_25_1","volume-title":"Status of serverless computing and function-as-a-service (faas) in industry and research. arXiv preprint arXiv:1708.08028","author":"Fox Geoffrey C","year":"2017","unstructured":"Geoffrey C Fox, Vatche Ishakian, Vinod Muthusamy, and Aleksander Slominski. Status of serverless computing and function-as-a-service (faas) in industry and research. arXiv preprint arXiv:1708.08028, 2017."},{"volume-title":"Google App Engine. https:\/\/cloud.google.com\/appengine","year":"2021","key":"e_1_3_2_2_26_1","unstructured":"Google. Google App Engine. https:\/\/cloud.google.com\/appengine, 2021."},{"volume-title":"IP Ranges Google. https:\/\/www.gstatic.com\/ipranges\/goog.json","year":"2021","key":"e_1_3_2_2_27_1","unstructured":"Google. IP Ranges Google. https:\/\/www.gstatic.com\/ipranges\/goog.json, 2021."},{"key":"e_1_3_2_2_28_1","volume-title":"NDSS","author":"Guo Run","year":"2020","unstructured":"Run Guo, Weizhong Li, Baojun Liu, Shuang Hao, Jia Zhang, Haixin Duan, Kaiwen Shen, Jianjun Chen, and Ying Liu. CDN judo: Breaking the CDN DoS protection with itself. NDSS, 2020."},{"key":"e_1_3_2_2_29_1","volume-title":"Serverless computing: One step forward, two steps back. arXiv preprint arXiv:1812.03651","author":"Hellerstein Joseph M","year":"2018","unstructured":"Joseph M Hellerstein, Jose Faleiro, Joseph E Gonzalez, Johann Schleier-Smith, Vikram Sreekanti, Alexey Tumanov, and Chenggang Wu. Serverless computing: One step forward, two steps back. arXiv preprint arXiv:1812.03651, 2018."},{"key":"e_1_3_2_2_30_1","volume-title":"List of blocked websites in China. https:\/\/www.vpnmentor.com\/blog\/the-complete-list-of-blocked-websites-in-china-how-to-access-them\/","author":"Hochstadt Ariel","year":"2021","unstructured":"Ariel Hochstadt. List of blocked websites in China. https:\/\/www.vpnmentor.com\/blog\/the-complete-list-of-blocked-websites-in-china-how-to-access-them\/, 2021."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813696"},{"key":"e_1_3_2_2_32_1","volume-title":"Thomas Eisenbarth, and Berk Sunar. Seriously, get off my cloud! Cross-VM RSA Key Recovery in a Public Cloud. IACR Cryptol. ePrint Arch.","author":"Inci Mehmet Sinan","year":"2015","unstructured":"Mehmet Sinan Inci, Berk G\u00fclmezoglu, Gorka Irazoqui Apecechea, Thomas Eisenbarth, and Berk Sunar. Seriously, get off my cloud! Cross-VM RSA Key Recovery in a Public Cloud. IACR Cryptol. ePrint Arch., 2015:898, 2015."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3360575"},{"key":"e_1_3_2_2_34_1","volume-title":"XSS filter evasion cheat sheet. https:\/\/owasp.org\/www-community\/xss-filter-evasion-cheatsheet","author":"Snake Hansen Jim Manico Robert","year":"2021","unstructured":"Robert RSnake Hansen Jim Manico. XSS filter evasion cheat sheet. https:\/\/owasp.org\/www-community\/xss-filter-evasion-cheatsheet, 2021."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2019.8888058"},{"key":"e_1_3_2_2_36_1","first-page":"427","volume-title":"13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18)","author":"Klimovic Ana","year":"2018","unstructured":"Ana Klimovic, Yawen Wang, Patrick Stuedi, Animesh Trivedi, Jonas Pfefferle, and Christos Kozyrakis. Pocket: Elastic ephemeral storage for serverless analytics. In 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18), pages 427--444, 2018."},{"key":"e_1_3_2_2_37_1","first-page":"851","volume-title":"28th $$USENIX$$ Security Symposium ($$USENIX$$ Security 19)","author":"Li Vector Guo","year":"2019","unstructured":"Vector Guo Li, Matthew Dunn, Paul Pearce, Damon McCoy, Geoffrey M Voelker, and Stefan Savage. Reading the tea leaves: A comparative analysis of threat intelligence. In 28th $$USENIX$$ Security Symposium ($$USENIX$$ Security 19), pages 851--867, 2019."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402981"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2017.36"},{"volume-title":"Azure IP Ranges Microsoft. https:\/\/www.microsoft.com\/en-us\/download\/details.aspx?id=56519","year":"2021","key":"e_1_3_2_2_40_1","unstructured":"Microsoft. Azure IP Ranges Microsoft. https:\/\/www.microsoft.com\/en-us\/download\/details.aspx?id=56519, 2021."},{"key":"e_1_3_2_2_41_1","volume-title":"https:\/\/azure.microsoft.com\/en-us\/services\/functions\/","author":"Azure Microsoft","year":"2021","unstructured":"Microsoft. Microsoft Azure. https:\/\/azure.microsoft.com\/en-us\/services\/functions\/, 2021."},{"key":"e_1_3_2_2_42_1","volume-title":"Scheduling ssh jobs using AWS lambda. https:\/\/aws.amazon.com\/blogs\/compute\/scheduling-ssh-jobs-using-aws-lambda\/","author":"Nagrani Vyom","year":"2016","unstructured":"Vyom Nagrani. Scheduling ssh jobs using AWS lambda. https:\/\/aws.amazon.com\/blogs\/compute\/scheduling-ssh-jobs-using-aws-lambda\/, 2016."},{"volume-title":"Netgate pfSense Plus Firewall\/VPN\/Router. https:\/\/aws.amazon.com\/marketplace\/pp\/B076TCMRWJ","year":"2021","key":"e_1_3_2_2_43_1","unstructured":"Netgate. Netgate pfSense Plus Firewall\/VPN\/Router. https:\/\/aws.amazon.com\/marketplace\/pp\/B076TCMRWJ, 2021."},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSA-C50368.2020.00016"},{"key":"e_1_3_2_2_45_1","first-page":"57","volume-title":"2018 USENIX Annual Technical Conference (USENIX ATC 18)","author":"Oakes Edward","year":"2018","unstructured":"Edward Oakes, Leon Yang, Dennis Zhou, Kevin Houck, Tyler Harter, Andrea Arpaci-Dusseau, and Remzi Arpaci-Dusseau. SOCK: Rapid task provisioning with serverless-optimized containers. In 2018 USENIX Annual Technical Conference (USENIX ATC 18), pages 57--70, 2018."},{"key":"e_1_3_2_2_46_1","first-page":"193","volume-title":"16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19)","author":"Pu Qifan","year":"2019","unstructured":"Qifan Pu, Shivaram Venkataraman, and Ion Stoica. Shuffling, fast and slow: Scalable analytics on serverless infrastructure. In 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19), pages 193--206, 2019."},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3423657"},{"key":"e_1_3_2_2_48_1","volume-title":"NDSS","author":"Ramanathan Sivaramakrishnan","year":"2020","unstructured":"Sivaramakrishnan Ramanathan, Jelena Mirkovic, and Minlan Yu. Blag: Improving the accuracy of blacklists. In NDSS, 2020."},{"key":"e_1_3_2_2_49_1","volume-title":"Announcing SSH Access through Cloudflare. https:\/\/blog.cloudflare.com\/releasing-the-cloudflare-access-feature-that-let-us-smash-a-vpn-on-stage\/","author":"Rhea Sam","year":"2016","unstructured":"Sam Rhea. Announcing SSH Access through Cloudflare. https:\/\/blog.cloudflare.com\/releasing-the-cloudflare-access-feature-that-let-us-smash-a-vpn-on-stage\/, 2016."},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2766330.2766335"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.132"},{"volume-title":"IP Address Fraud Check. https:\/\/scamalytics.com\/ip","year":"2021","key":"e_1_3_2_2_52_1","unstructured":"Scamalytics. IP Address Fraud Check. https:\/\/scamalytics.com\/ip, 2021."},{"key":"e_1_3_2_2_53_1","volume-title":"Irobot case study. https:\/\/aws.amazon.com\/solutions\/case-studies\/irobot\/","author":"Services Amazon Web","year":"2016","unstructured":"Amazon Web Services. Irobot case study. https:\/\/aws.amazon.com\/solutions\/case-studies\/irobot\/, 2016."},{"key":"e_1_3_2_2_54_1","volume-title":"Starling bank case study. https:\/\/aws.amazon.com\/solutions\/case-studies\/starling-bank-case-study\/?did=cr_card&trk=cr_card","author":"Services Amazon Web","year":"2020","unstructured":"Amazon Web Services. Starling bank case study. https:\/\/aws.amazon.com\/solutions\/case-studies\/starling-bank-case-study\/?did=cr_card&trk=cr_card, 2020."},{"key":"e_1_3_2_2_55_1","volume-title":"January 3","author":"Shulman Avraham","year":"2019","unstructured":"Avraham Shulman, Ory Segal, and Shaked Yosef Zin. Methods for securing serverless functions, January 3 2019. US Patent App. 16\/024,863."},{"key":"e_1_3_2_2_56_1","volume-title":"Guarding Serverless Applications with SecLambda. arXiv e-prints","author":"Jegan Deepak Sirone","year":"2011","unstructured":"Deepak Sirone Jegan, Liang Wang, Siddhant Bhagat, Thomas Ristenpart, and Michael Swift. Guarding Serverless Applications with SecLambda. arXiv e-prints, pages arXiv--2011, 2020."},{"volume-title":"Composite Blocking List. https:\/\/www.abuseat.org\/","year":"2021","key":"e_1_3_2_2_57_1","unstructured":"Spamhaus. Composite Blocking List. https:\/\/www.abuseat.org\/, 2021."},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1080\/01972243.2014.944728"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813633"},{"volume-title":"Usage statistics of IPv6 for websites. https:\/\/w3techs.com\/technologies\/details\/ce-ipv6","year":"2021","key":"e_1_3_2_2_60_1","unstructured":"W3Techs. Usage statistics of IPv6 for websites. https:\/\/w3techs.com\/technologies\/details\/ce-ipv6, 2021."},{"key":"e_1_3_2_2_61_1","first-page":"133","volume-title":"2018 USENIX Annual Technical Conference (USENIX ATC 18)","author":"Wang Liang","year":"2018","unstructured":"Liang Wang, Mengyuan Li, Yinqian Zhang, Thomas Ristenpart, and Michael Swift. Peeking behind the curtains of serverless platforms. In 2018 USENIX Annual Technical Conference (USENIX ATC 18), pages 133--146, 2018."},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131374"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3007203.3007217"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Virtual Event Republic of Korea","acronym":"CCS '21"},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3485372","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3485372","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:54:23Z","timestamp":1763499263000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3485372"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":63,"alternative-id":["10.1145\/3460120.3485372","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3485372","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}