{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:23:54Z","timestamp":1761582234611,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":80,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,25]],"date-time":"2022-10-25T00:00:00Z","timestamp":1666656000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["EXC 2092 CASA - 390781972"],"award-info":[{"award-number":["EXC 2092 CASA - 390781972"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002347","name":"Bundesministerium f\u00fcr Bildung und Forschung","doi-asserted-by":"publisher","award":["16KIS1168"],"award-info":[{"award-number":["16KIS1168"]}],"id":[{"id":"10.13039\/501100002347","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,25]]},"DOI":"10.1145\/3517745.3561446","type":"proceedings-article","created":{"date-parts":[[2022,10,21]],"date-time":"2022-10-21T21:28:36Z","timestamp":1666387716000},"page":"619-632","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["No keys to the kingdom required"],"prefix":"10.1145","author":[{"given":"Manuel","family":"Karl","sequence":"first","affiliation":[{"name":"TU Braunschweig"}]},{"given":"Marius","family":"Musch","sequence":"additional","affiliation":[{"name":"TU Braunschweig"}]},{"given":"Guoli","family":"Ma","sequence":"additional","affiliation":[{"name":"Google"}]},{"given":"Martin","family":"Johns","sequence":"additional","affiliation":[{"name":"TU Braunschweig"}]},{"given":"Sebastian","family":"Lekies","sequence":"additional","affiliation":[{"name":"Google"}]}],"member":"320","published-online":{"date-parts":[[2022,10,25]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Proc. of USENIX Workshop on Offensive Technologies (WOOT)","author":"Adrian D.","year":"2014","unstructured":"D. Adrian , Z. Durumeric , G. Singh , and J. A. Halderman . Zippier zmap: internet-wide scanning at 10 gbps . In Proc. of USENIX Workshop on Offensive Technologies (WOOT) , 2014 . D. Adrian, Z. Durumeric, G. Singh, and J. A. Halderman. Zippier zmap: internet-wide scanning at 10 gbps. In Proc. of USENIX Workshop on Offensive Technologies (WOOT), 2014."},{"volume-title":"Online https:\/\/github.com\/ajenti\/ajenti","year":"2021","key":"e_1_3_2_2_2_1","unstructured":"Ajenti. Ajenti. Online https:\/\/github.com\/ajenti\/ajenti , 2021 . Ajenti. Ajenti. Online https:\/\/github.com\/ajenti\/ajenti, 2021."},{"key":"e_1_3_2_2_3_1","volume-title":"Running ajenti. Online https:\/\/docs.ajenti.org\/en\/latest\/man\/run.html","author":"Docs Ajenti","year":"2021","unstructured":"Ajenti Docs . Running ajenti. Online https:\/\/docs.ajenti.org\/en\/latest\/man\/run.html , 2021 . Ajenti Docs. Running ajenti. Online https:\/\/docs.ajenti.org\/en\/latest\/man\/run.html, 2021."},{"key":"e_1_3_2_2_4_1","volume-title":"Proc. of Network and Distributed System Security Symposium (NDSS)","author":"Antonatos S.","year":"2010","unstructured":"S. Antonatos , I. Polakis , T. Petsas , and E. P. Markatos . A systematic characterization of im threats using honeypots . In Proc. of Network and Distributed System Security Symposium (NDSS) , 2010 . S. Antonatos, I. Polakis, T. Petsas, and E. P. Markatos. A systematic characterization of im threats using honeypots. In Proc. of Network and Distributed System Security Symposium (NDSS), 2010."},{"volume-title":"Spark notebook. Online https:\/\/github.com\/spark-notebook\/spark-notebook","year":"2019","key":"e_1_3_2_2_5_1","unstructured":"Apache. Spark notebook. Online https:\/\/github.com\/spark-notebook\/spark-notebook , 2019 . Apache. Spark notebook. Online https:\/\/github.com\/spark-notebook\/spark-notebook, 2019."},{"volume-title":"Online https:\/\/github.com\/apache\/hadoop","year":"2021","key":"e_1_3_2_2_6_1","unstructured":"Apache. Hadoop. Online https:\/\/github.com\/apache\/hadoop , 2021 . Apache. Hadoop. Online https:\/\/github.com\/apache\/hadoop, 2021."},{"volume-title":"Online https:\/\/github.com\/apache\/zeppelin","year":"2021","key":"e_1_3_2_2_7_1","unstructured":"Apache. Zeppelin. Online https:\/\/github.com\/apache\/zeppelin , 2021 . Apache. Zeppelin. Online https:\/\/github.com\/apache\/zeppelin, 2021."},{"key":"e_1_3_2_2_8_1","volume-title":"Hacking web applications before they are installed. Online https:\/\/www.golem.de\/news\/certificate-transparency-hacking-web-applications-before-they-are-installed-1707-129172.html","author":"B\u00f6ck H.","year":"2017","unstructured":"H. B\u00f6ck . Hacking web applications before they are installed. Online https:\/\/www.golem.de\/news\/certificate-transparency-hacking-web-applications-before-they-are-installed-1707-129172.html , 2017 . H. B\u00f6ck. Hacking web applications before they are installed. Online https:\/\/www.golem.de\/news\/certificate-transparency-hacking-web-applications-before-they-are-installed-1707-129172.html, 2017."},{"key":"e_1_3_2_2_9_1","volume-title":"Proc. of Network and Distributed System Security Symposium (NDSS)","author":"Canali D.","year":"2013","unstructured":"D. Canali and D. Balzarotti . Behind the scenes of online attacks: an analysis of exploitation behaviors on the web . In Proc. of Network and Distributed System Security Symposium (NDSS) , 2013 . D. Canali and D. Balzarotti. Behind the scenes of online attacks: an analysis of exploitation behaviors on the web. In Proc. of Network and Distributed System Security Symposium (NDSS), 2013."},{"key":"e_1_3_2_2_10_1","volume-title":"Online https:\/\/www.consul.io\/docs\/agent\/options","author":"Docs Consul","year":"2021","unstructured":"Consul Docs . Configuration. Online https:\/\/www.consul.io\/docs\/agent\/options , 2021 . Consul Docs. Configuration. Online https:\/\/www.consul.io\/docs\/agent\/options, 2021."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274736"},{"volume-title":"Online https:\/\/github.com\/docker\/compose","year":"2021","key":"e_1_3_2_2_12_1","unstructured":"Docker. Docker. Online https:\/\/github.com\/docker\/compose , 2021 . Docker. Docker. Online https:\/\/github.com\/docker\/compose, 2021."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14215-4_7"},{"key":"e_1_3_2_2_14_1","volume-title":"Proc. of USENIX Security Symposium","author":"Doup\u00e9 A.","year":"2012","unstructured":"A. Doup\u00e9 , L. Cavedon , C. Kruegel , and G. Vigna . Enemy of the state: A state-aware black-box web vulnerability scanner . In Proc. of USENIX Security Symposium , 2012 . A. Doup\u00e9, L. Cavedon, C. Kruegel, and G. Vigna. Enemy of the state: A state-aware black-box web vulnerability scanner. In Proc. of USENIX Security Symposium, 2012."},{"volume-title":"Online https:\/\/github.com\/drone\/drone","year":"2021","key":"e_1_3_2_2_15_1","unstructured":"Drone. Drone. Online https:\/\/github.com\/drone\/drone , 2021 . Drone. Drone. Online https:\/\/github.com\/drone\/drone, 2021."},{"volume-title":"Online https:\/\/github.com\/drupal\/drupal","year":"2021","key":"e_1_3_2_2_16_1","unstructured":"Drupal. Drupal. Online https:\/\/github.com\/drupal\/drupal , 2021 . Drupal. Drupal. Online https:\/\/github.com\/drupal\/drupal, 2021."},{"key":"e_1_3_2_2_17_1","first-page":"605","volume-title":"Proc. of USENIX Security Symposium","author":"Durumeric Z.","year":"2013","unstructured":"Z. Durumeric , E. Wustrow , and J. A. Halderman . Zmap: Fast internet-wide scanning and its security applications . In Proc. of USENIX Security Symposium , pages 605 -- 620 , 2013 . Z. Durumeric, E. Wustrow, and J. A. Halderman. Zmap: Fast internet-wide scanning and its security applications. In Proc. of USENIX Security Symposium, pages 605--620, 2013."},{"key":"e_1_3_2_2_18_1","volume-title":"Proc. of USENIX Security Symposium","author":"Durumeric Z.","year":"2014","unstructured":"Z. Durumeric , M. Bailey , and J. A. Halderman . An internet-wide view of internet-wide scanning . In Proc. of USENIX Security Symposium , 2014 . Z. Durumeric, M. Bailey, and J. A. Halderman. An internet-wide view of internet-wide scanning. In Proc. of USENIX Security Symposium, 2014."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813703"},{"volume-title":"Lightweight shipper for audit data. Online https:\/\/www.elastic.co\/beats\/auditbeat","year":"2021","key":"e_1_3_2_2_20_1","unstructured":"Elasticsearch. Lightweight shipper for audit data. Online https:\/\/www.elastic.co\/beats\/auditbeat , 2021 . Elasticsearch. Lightweight shipper for audit data. Online https:\/\/www.elastic.co\/beats\/auditbeat, 2021."},{"volume-title":"The heart of the free and open elastic stack. Online https:\/\/www.elastic.co\/elasticsearch\/","year":"2021","key":"e_1_3_2_2_21_1","unstructured":"Elasticsearch. The heart of the free and open elastic stack. Online https:\/\/www.elastic.co\/elasticsearch\/ , 2021 . Elasticsearch. The heart of the free and open elastic stack. Online https:\/\/www.elastic.co\/elasticsearch\/, 2021."},{"volume-title":"Lightweight shipper for network data. Online https:\/\/www.elastic.co\/beats\/packetbeat","year":"2021","key":"e_1_3_2_2_22_1","unstructured":"Elasticsearch. Lightweight shipper for network data. Online https:\/\/www.elastic.co\/beats\/packetbeat , 2021 . Elasticsearch. Lightweight shipper for network data. Online https:\/\/www.elastic.co\/beats\/packetbeat, 2021."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00022"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427260"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSecPODS.2018.8560675"},{"key":"e_1_3_2_2_26_1","volume-title":"Shovat: Shodan-based vulnerability assessment tool for internet-facing services. Security and communication networks","author":"Genge B.","year":"2016","unstructured":"B. Genge and C. En\u0103chescu . Shovat: Shodan-based vulnerability assessment tool for internet-facing services. Security and communication networks , 2016 . B. Genge and C. En\u0103chescu. Shovat: Shodan-based vulnerability assessment tool for internet-facing services. Security and communication networks, 2016."},{"volume-title":"Grav cms. Online https:\/\/github.com\/getgrav\/grav","year":"2021","key":"e_1_3_2_2_27_1","unstructured":"Getgrav. Grav cms. Online https:\/\/github.com\/getgrav\/grav , 2021 . Getgrav. Grav cms. Online https:\/\/github.com\/getgrav\/grav, 2021."},{"volume-title":"Online https:\/\/github.com\/TryGhost\/Ghost","year":"2021","key":"e_1_3_2_2_28_1","unstructured":"Ghost. Ghost. Online https:\/\/github.com\/TryGhost\/Ghost , 2021 . Ghost. Ghost. Online https:\/\/github.com\/TryGhost\/Ghost, 2021."},{"volume-title":"Online https:\/\/github.com\/gitlabhq\/gitlabhq","year":"2021","key":"e_1_3_2_2_29_1","unstructured":"Gitlab. Gitlab. Online https:\/\/github.com\/gitlabhq\/gitlabhq , 2021 . Gitlab. Gitlab. Online https:\/\/github.com\/gitlabhq\/gitlabhq, 2021."},{"key":"e_1_3_2_2_30_1","volume-title":"Online https:\/\/docs.gocd.org\/current\/configuration\/dev_authentication.html","author":"Docs CD","year":"2021","unstructured":"Go CD Docs . Authentication. Online https:\/\/docs.gocd.org\/current\/configuration\/dev_authentication.html , 2021 . GoCD Docs. Authentication. Online https:\/\/docs.gocd.org\/current\/configuration\/dev_authentication.html, 2021."},{"volume-title":"Tsunami web service fingerprinter. Onlince https:\/\/github.com\/google\/tsunami-security-scanner-plugins\/tree\/master\/google\/fingerprinters\/web","year":"2022","key":"e_1_3_2_2_31_1","unstructured":"Google. Tsunami web service fingerprinter. Onlince https:\/\/github.com\/google\/tsunami-security-scanner-plugins\/tree\/master\/google\/fingerprinters\/web , 2022 . Google. Tsunami web service fingerprinter. Onlince https:\/\/github.com\/google\/tsunami-security-scanner-plugins\/tree\/master\/google\/fingerprinters\/web, 2022."},{"volume-title":"Tsunami security scanner plugins. Onlince https:\/\/github.com\/google\/tsunami-security-scanner-plugins","year":"2022","key":"e_1_3_2_2_32_1","unstructured":"Google. Tsunami security scanner plugins. Onlince https:\/\/github.com\/google\/tsunami-security-scanner-plugins , 2022 . Google. Tsunami security scanner plugins. Onlince https:\/\/github.com\/google\/tsunami-security-scanner-plugins, 2022."},{"volume-title":"Tsunami security scanner. Onlince https:\/\/github.com\/google\/tsunami-security-scanner","year":"2022","key":"e_1_3_2_2_33_1","unstructured":"Google. Tsunami security scanner. Onlince https:\/\/github.com\/google\/tsunami-security-scanner , 2022 . Google. Tsunami security scanner. Onlince https:\/\/github.com\/google\/tsunami-security-scanner, 2022."},{"key":"e_1_3_2_2_34_1","volume-title":"Masscan: Mass ip port scanner. Online https:\/\/github.com\/robertdavidgraham\/masscan","author":"Graham R. D.","year":"2013","unstructured":"R. D. Graham . Masscan: Mass ip port scanner. Online https:\/\/github.com\/robertdavidgraham\/masscan , 2013 . R. D. Graham. Masscan: Mass ip port scanner. Online https:\/\/github.com\/robertdavidgraham\/masscan, 2013."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3055186.3055192"},{"volume-title":"Online https:\/\/github.com\/hashicorp\/consul","year":"2021","key":"e_1_3_2_2_36_1","unstructured":"Hashicorp. Consul. Online https:\/\/github.com\/hashicorp\/consul , 2021 . Hashicorp. Consul. Online https:\/\/github.com\/hashicorp\/consul, 2021."},{"volume-title":"Online https:\/\/github.com\/hashicorp\/nomad","year":"2021","key":"e_1_3_2_2_37_1","unstructured":"Hashicorp. Nomad. Online https:\/\/github.com\/hashicorp\/nomad , 2021 . Hashicorp. Nomad. Online https:\/\/github.com\/hashicorp\/nomad, 2021."},{"key":"e_1_3_2_2_38_1","volume-title":"Online https:\/\/github.com\/urbanadventurer\/WhatWeb","author":"Horton A.","year":"2021","unstructured":"A. Horton and B. Coles . Whatweb . Online https:\/\/github.com\/urbanadventurer\/WhatWeb , 2021 . A. Horton and B. Coles. Whatweb. Online https:\/\/github.com\/urbanadventurer\/WhatWeb, 2021."},{"key":"e_1_3_2_2_39_1","volume-title":"Ipv4 address space registry. Online https:\/\/www.iana.org\/assignments\/ipv4-address-space\/ipv4-address-space.xhtml","author":"IANA.","year":"2021","unstructured":"IANA. Ipv4 address space registry. Online https:\/\/www.iana.org\/assignments\/ipv4-address-space\/ipv4-address-space.xhtml , 2021 . IANA. Ipv4 address space registry. Online https:\/\/www.iana.org\/assignments\/ipv4-address-space\/ipv4-address-space.xhtml, 2021."},{"key":"e_1_3_2_2_40_1","volume-title":"Onlince https:\/\/iphub.info\/","author":"Proxy","year":"2022","unstructured":"IPHub. Proxy & vpn detection api. Onlince https:\/\/iphub.info\/ , 2022 . IPHub. Proxy & vpn detection api. Onlince https:\/\/iphub.info\/, 2022."},{"key":"e_1_3_2_2_41_1","volume-title":"Proc. of USENIX Security Symposium","author":"Izhikevich L.","year":"2021","unstructured":"L. Izhikevich , R. Teixeira , and Z. Durumeric . LZR: Identifying unexpected internet services . In Proc. of USENIX Security Symposium , 2021 . L. Izhikevich, R. Teixeira, and Z. Durumeric. LZR: Identifying unexpected internet services. In Proc. of USENIX Security Symposium, 2021."},{"volume-title":"Online https:\/\/github.com\/jenkinsci\/jenkins","year":"2021","key":"e_1_3_2_2_42_1","unstructured":"Jenkins. Jenkins. Online https:\/\/github.com\/jenkinsci\/jenkins , 2021 . Jenkins. Jenkins. Online https:\/\/github.com\/jenkinsci\/jenkins, 2021."},{"volume-title":"Joomla cms. Online https:\/\/github.com\/joomla\/joomla-cms","year":"2021","key":"e_1_3_2_2_43_1","unstructured":"Joomla. Joomla cms. Online https:\/\/github.com\/joomla\/joomla-cms , 2021 . Joomla. Joomla cms. Online https:\/\/github.com\/joomla\/joomla-cms, 2021."},{"volume-title":"Secured procedure for installing joomla with a remote database. Online https:\/\/docs.joomla.org\/J3.x:Secured_procedure_for_installing_Joomla_with_a_remote_database","year":"2017","key":"e_1_3_2_2_44_1","unstructured":"Joomla! Documentation. Secured procedure for installing joomla with a remote database. Online https:\/\/docs.joomla.org\/J3.x:Secured_procedure_for_installing_Joomla_with_a_remote_database , 2017 . Joomla! Documentation. Secured procedure for installing joomla with a remote database. Online https:\/\/docs.joomla.org\/J3.x:Secured_procedure_for_installing_Joomla_with_a_remote_database, 2017."},{"volume-title":"Online https:\/\/github.com\/jupyter\/jupyter","year":"2020","key":"e_1_3_2_2_45_1","unstructured":"Jupyter. Notebook. Online https:\/\/github.com\/jupyter\/jupyter , 2020 . Jupyter. Notebook. Online https:\/\/github.com\/jupyter\/jupyter, 2020."},{"volume-title":"Online https:\/\/github.com\/jupyterlab\/jupyterlab","year":"2021","key":"e_1_3_2_2_46_1","unstructured":"Jupyter. Lab . Online https:\/\/github.com\/jupyterlab\/jupyterlab , 2021 . Jupyter. Lab. Online https:\/\/github.com\/jupyterlab\/jupyterlab, 2021."},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135817"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987457"},{"volume-title":"Online https:\/\/github.com\/kubernetes\/kubernetes","year":"2021","key":"e_1_3_2_2_49_1","unstructured":"Kubernetes. Kubernetes. Online https:\/\/github.com\/kubernetes\/kubernetes , 2021 . Kubernetes. Kubernetes. Online https:\/\/github.com\/kubernetes\/kubernetes, 2021."},{"volume-title":"Controlling access to the kubernetes api. Online https:\/\/kubernetes.io\/docs\/concepts\/security\/controlling-access\/","year":"2021","key":"e_1_3_2_2_50_1","unstructured":"Kubernetes. Controlling access to the kubernetes api. Online https:\/\/kubernetes.io\/docs\/concepts\/security\/controlling-access\/ , 2021 . Kubernetes. Controlling access to the kubernetes api. Online https:\/\/kubernetes.io\/docs\/concepts\/security\/controlling-access\/, 2021."},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23386"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00079"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423356"},{"key":"e_1_3_2_2_54_1","volume-title":"A generic toolkit for converting web applications into high-interaction honeypots","author":"M\u00fcter M.","year":"2008","unstructured":"M. M\u00fcter , F. Freiling , T. Holz , and J. Matthews . A generic toolkit for converting web applications into high-interaction honeypots . University of Mannheim , 2008 . M. M\u00fcter, F. Freiling, T. Holz, and J. Matthews. A generic toolkit for converting web applications into high-interaction honeypots. University of Mannheim, 2008."},{"key":"e_1_3_2_2_55_1","volume-title":"Online https:\/\/www.nomadproject.io\/docs\/internals\/security","author":"Docs Nomad","year":"2021","unstructured":"Nomad Docs . Overview. Online https:\/\/www.nomadproject.io\/docs\/internals\/security , 2021 . Nomad Docs. Overview. Online https:\/\/www.nomadproject.io\/docs\/internals\/security, 2021."},{"key":"e_1_3_2_2_56_1","volume-title":"Online https:\/\/issues.jenkins.io\/browse\/JENKINS-30749","author":"Nord J.","year":"2015","unstructured":"J. Nord . Jenkins should be secure out of the box by default. Online https:\/\/issues.jenkins.io\/browse\/JENKINS-30749 , 2015 . J. Nord. Jenkins should be secure out of the box by default. Online https:\/\/issues.jenkins.io\/browse\/JENKINS-30749, 2015."},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICGS3.2019.8688018"},{"key":"e_1_3_2_2_58_1","volume-title":"Online https:\/\/github.com\/OmniDB\/OmniDB","author":"Omnidb DB.","year":"2020","unstructured":"Omni DB. Omnidb . Online https:\/\/github.com\/OmniDB\/OmniDB , 2020 . OmniDB. Omnidb. Online https:\/\/github.com\/OmniDB\/OmniDB, 2020."},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26362-5_14"},{"volume-title":"phpmyadmin. Online https:\/\/github.com\/phpmyadmin\/phpmyadmin","year":"2021","key":"e_1_3_2_2_60_1","unstructured":"phpMyAdmin. phpmyadmin. Online https:\/\/github.com\/phpmyadmin\/phpmyadmin , 2021 . phpMyAdmin. phpmyadmin. Online https:\/\/github.com\/phpmyadmin\/phpmyadmin, 2021."},{"volume-title":"Online https:\/\/github.com\/polynote\/polynote","year":"2021","key":"e_1_3_2_2_61_1","unstructured":"Polynote. Polynote. Online https:\/\/github.com\/polynote\/polynote , 2021 . Polynote. Polynote. Online https:\/\/github.com\/polynote\/polynote, 2021."},{"key":"e_1_3_2_2_62_1","volume-title":"Installing polynote. Online https:\/\/polynote.org\/docs\/01-installation.html","author":"Docs Polynote","year":"2021","unstructured":"Polynote Docs . Installing polynote. Online https:\/\/polynote.org\/docs\/01-installation.html , 2021 . Polynote Docs. Installing polynote. Online https:\/\/polynote.org\/docs\/01-installation.html, 2021."},{"key":"e_1_3_2_2_63_1","volume-title":"Security release: Jupyter notebook 4.3.1. Online https:\/\/blog.jupyter.org\/security-release-jupyter-notebook-4-3-1-808e1f3bb5e2","author":"Jupyter Project","year":"2016","unstructured":"Project Jupyter . Security release: Jupyter notebook 4.3.1. Online https:\/\/blog.jupyter.org\/security-release-jupyter-notebook-4-3-1-808e1f3bb5e2 , 2016 . Project Jupyter. Security release: Jupyter notebook 4.3.1. Online https:\/\/blog.jupyter.org\/security-release-jupyter-notebook-4-3-1-808e1f3bb5e2, 2016."},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355595"},{"key":"e_1_3_2_2_65_1","volume-title":"Online https:\/\/securityintelligence.com\/news\/kinsing-malware-hits-container-api-ports-with-thousands-of-attacks-per-day\/","author":"Schick S.","year":"2020","unstructured":"S. Schick . Kinsing malware hits container api ports with thousands of attacks per day. Online https:\/\/securityintelligence.com\/news\/kinsing-malware-hits-container-api-ports-with-thousands-of-attacks-per-day\/ , 2020 . S. Schick. Kinsing malware hits container api ports with thousands of attacks per day. Online https:\/\/securityintelligence.com\/news\/kinsing-malware-hits-container-api-ports-with-thousands-of-attacks-per-day\/, 2020."},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2021.3088333"},{"volume-title":"Search engine. Online https:\/\/www.shodan.io\/","year":"2021","key":"e_1_3_2_2_67_1","unstructured":"Shodan. Search engine. Online https:\/\/www.shodan.io\/ , 2021 . Shodan. Search engine. Online https:\/\/www.shodan.io\/, 2021."},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2016.52"},{"volume-title":"How to disable password request for a jupyter notebook session? Online https:\/\/stackoverflow.com\/a\/47509274","year":"2016","key":"e_1_3_2_2_69_1","unstructured":"StackOverflow. How to disable password request for a jupyter notebook session? Online https:\/\/stackoverflow.com\/a\/47509274 , 2016 . StackOverflow. How to disable password request for a jupyter notebook session? Online https:\/\/stackoverflow.com\/a\/47509274, 2016."},{"key":"e_1_3_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292006.3300024"},{"key":"e_1_3_2_2_71_1","volume-title":"Online https:\/\/sourceforge.net\/projects\/blindelephant\/","author":"Thomas P.","year":"2012","unstructured":"P. Thomas . Blindelephant. Online https:\/\/sourceforge.net\/projects\/blindelephant\/ , 2012 . P. Thomas. Blindelephant. Online https:\/\/sourceforge.net\/projects\/blindelephant\/, 2012."},{"volume-title":"Online https:\/\/github.com\/GoCD\/GoCD","year":"2021","key":"e_1_3_2_2_72_1","unstructured":"ThoughtWorks. Gocd. Online https:\/\/github.com\/GoCD\/GoCD , 2021 . ThoughtWorks. Gocd. Online https:\/\/github.com\/GoCD\/GoCD, 2021."},{"key":"e_1_3_2_2_73_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40667-1_13"},{"volume-title":"Online https:\/\/github.com\/travis-ci\/travis-ci","year":"2020","key":"e_1_3_2_2_74_1","unstructured":"Travis. Travis. Online https:\/\/github.com\/travis-ci\/travis-ci , 2020 . Travis. Travis. Online https:\/\/github.com\/travis-ci\/travis-ci, 2020."},{"key":"e_1_3_2_2_75_1","volume-title":"Vesta cp. Online https:\/\/github.com\/serghey-rodin\/vesta","author":"Vesta","year":"2020","unstructured":"Vesta CP. Vesta cp. Online https:\/\/github.com\/serghey-rodin\/vesta , 2020 . Vesta CP. Vesta cp. Online https:\/\/github.com\/serghey-rodin\/vesta, 2020."},{"key":"e_1_3_2_2_76_1","volume-title":"Accessing a database without a password. Online https:\/\/www.adminer.org\/en\/password\/","author":"Vr\u00e1na J.","year":"2018","unstructured":"J. Vr\u00e1na . Accessing a database without a password. Online https:\/\/www.adminer.org\/en\/password\/ , 2018 . J. Vr\u00e1na. Accessing a database without a password. Online https:\/\/www.adminer.org\/en\/password\/, 2018."},{"key":"e_1_3_2_2_77_1","volume-title":"Online https:\/\/github.com\/vrana\/adminer","author":"Vr\u00e1na J.","year":"2021","unstructured":"J. Vr\u00e1na . Adminer. Online https:\/\/github.com\/vrana\/adminer , 2021 . J. Vr\u00e1na. Adminer. Online https:\/\/github.com\/vrana\/adminer, 2021."},{"volume-title":"Usage statistics of content management systems. Online https:\/\/w3techs.com\/technologies\/overview\/content_management","year":"2021","key":"e_1_3_2_2_78_1","unstructured":"W3Techs. Usage statistics of content management systems. Online https:\/\/w3techs.com\/technologies\/overview\/content_management , 2021 . W3Techs. Usage statistics of content management systems. Online https:\/\/w3techs.com\/technologies\/overview\/content_management, 2021."},{"key":"e_1_3_2_2_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3424214"},{"volume-title":"Online https:\/\/github.com\/WordPress\/WordPress","year":"2021","key":"e_1_3_2_2_80_1","unstructured":"WordPress. Wordpress. Online https:\/\/github.com\/WordPress\/WordPress , 2021 . WordPress. Wordpress. Online https:\/\/github.com\/WordPress\/WordPress, 2021."}],"event":{"name":"IMC '22: ACM Internet Measurement Conference","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication","USENIX Assoc USENIX Assoc"],"location":"Nice France","acronym":"IMC '22"},"container-title":["Proceedings of the 22nd ACM Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3517745.3561446","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3517745.3561446","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:17Z","timestamp":1750182557000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3517745.3561446"}},"subtitle":["a comprehensive investigation of missing authentication vulnerabilities in the wild"],"short-title":[],"issued":{"date-parts":[[2022,10,25]]},"references-count":80,"alternative-id":["10.1145\/3517745.3561446","10.1145\/3517745"],"URL":"https:\/\/doi.org\/10.1145\/3517745.3561446","relation":{},"subject":[],"published":{"date-parts":[[2022,10,25]]},"assertion":[{"value":"2022-10-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}