No keys to the kingdom required: a comprehensive investigation of missing authentication vulnerabilities in the wild. Karl, M., Musch, M., Ma, G., Johns, M., & Lekies, S. In Barakat, C., Pelsser, C., Benson, T. A., & Choffnes, D., editors, Proceedings of the 22nd ACM Internet Measurement Conference, IMC 2022, Nice, France, October 25-27, 2022, pages 619–632, 2022. ACM.
Paper doi bibtex @inproceedings{DBLP:conf/imc/KarlMMJL22,
author = {Manuel Karl and
Marius Musch and
Guoli Ma and
Martin Johns and
Sebastian Lekies},
editor = {Chadi Barakat and
Cristel Pelsser and
Theophilus A. Benson and
David Choffnes},
title = {No keys to the kingdom required: a comprehensive investigation of
missing authentication vulnerabilities in the wild},
booktitle = {Proceedings of the 22nd {ACM} Internet Measurement Conference, {IMC}
2022, Nice, France, October 25-27, 2022},
pages = {619--632},
publisher = {{ACM}},
year = {2022},
url = {https://doi.org/10.1145/3517745.3561446},
doi = {10.1145/3517745.3561446},
timestamp = {Tue, 25 Oct 2022 15:35:37 +0200},
biburl = {https://dblp.org/rec/conf/imc/KarlMMJL22.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"hzJgZcgxWiKCfPTpJ","bibbaseid":"karl-musch-ma-johns-lekies-nokeystothekingdomrequiredacomprehensiveinvestigationofmissingauthenticationvulnerabilitiesinthewild-2022","author_short":["Karl, M.","Musch, M.","Ma, G.","Johns, M.","Lekies, S."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Manuel"],"propositions":[],"lastnames":["Karl"],"suffixes":[]},{"firstnames":["Marius"],"propositions":[],"lastnames":["Musch"],"suffixes":[]},{"firstnames":["Guoli"],"propositions":[],"lastnames":["Ma"],"suffixes":[]},{"firstnames":["Martin"],"propositions":[],"lastnames":["Johns"],"suffixes":[]},{"firstnames":["Sebastian"],"propositions":[],"lastnames":["Lekies"],"suffixes":[]}],"editor":[{"firstnames":["Chadi"],"propositions":[],"lastnames":["Barakat"],"suffixes":[]},{"firstnames":["Cristel"],"propositions":[],"lastnames":["Pelsser"],"suffixes":[]},{"firstnames":["Theophilus","A."],"propositions":[],"lastnames":["Benson"],"suffixes":[]},{"firstnames":["David"],"propositions":[],"lastnames":["Choffnes"],"suffixes":[]}],"title":"No keys to the kingdom required: a comprehensive investigation of missing authentication vulnerabilities in the wild","booktitle":"Proceedings of the 22nd ACM Internet Measurement Conference, IMC 2022, Nice, France, October 25-27, 2022","pages":"619–632","publisher":"ACM","year":"2022","url":"https://doi.org/10.1145/3517745.3561446","doi":"10.1145/3517745.3561446","timestamp":"Tue, 25 Oct 2022 15:35:37 +0200","biburl":"https://dblp.org/rec/conf/imc/KarlMMJL22.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@inproceedings{DBLP:conf/imc/KarlMMJL22,\n author = {Manuel Karl and\n Marius Musch and\n Guoli Ma and\n Martin Johns and\n Sebastian Lekies},\n editor = {Chadi Barakat and\n Cristel Pelsser and\n Theophilus A. Benson and\n David Choffnes},\n title = {No keys to the kingdom required: a comprehensive investigation of\n missing authentication vulnerabilities in the wild},\n booktitle = {Proceedings of the 22nd {ACM} Internet Measurement Conference, {IMC}\n 2022, Nice, France, October 25-27, 2022},\n pages = {619--632},\n publisher = {{ACM}},\n year = {2022},\n url = {https://doi.org/10.1145/3517745.3561446},\n doi = {10.1145/3517745.3561446},\n timestamp = {Tue, 25 Oct 2022 15:35:37 +0200},\n biburl = {https://dblp.org/rec/conf/imc/KarlMMJL22.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Karl, M.","Musch, M.","Ma, G.","Johns, M.","Lekies, S."],"editor_short":["Barakat, C.","Pelsser, C.","Benson, T. A.","Choffnes, D."],"key":"DBLP:conf/imc/KarlMMJL22","id":"DBLP:conf/imc/KarlMMJL22","bibbaseid":"karl-musch-ma-johns-lekies-nokeystothekingdomrequiredacomprehensiveinvestigationofmissingauthenticationvulnerabilitiesinthewild-2022","role":"author","urls":{"Paper":"https://doi.org/10.1145/3517745.3561446"},"metadata":{"authorlinks":{}}},"bibtype":"inproceedings","biburl":"https://dblp.org/pid/82/359.bib","dataSources":["sA5JSGkk3PZnWmqoJ"],"keywords":[],"search_terms":["keys","kingdom","required","comprehensive","investigation","missing","authentication","vulnerabilities","wild","karl","musch","ma","johns","lekies"],"title":"No keys to the kingdom required: a comprehensive investigation of missing authentication vulnerabilities in the wild","year":2022}