{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T13:36:30Z","timestamp":1767706590712,"version":"build-2065373602"},"reference-count":61,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T00:00:00Z","timestamp":1719187200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T00:00:00Z","timestamp":1719187200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CNS-2000681"],"award-info":[{"award-number":["CNS-2000681"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,24]]},"DOI":"10.1109\/dsn58291.2024.00025","type":"proceedings-article","created":{"date-parts":[[2024,8,30]],"date-time":"2024-08-30T17:31:02Z","timestamp":1725039062000},"page":"115-128","source":"Crossref","is-referenced-by-count":5,"title":["Grunt Attack: Exploiting Execution Dependencies in Microservices"],"prefix":"10.1109","author":[{"given":"Xuhang","family":"Gu","sequence":"first","affiliation":[{"name":"Louisiana State University"}]},{"given":"Qingyang","family":"Wang","sequence":"additional","affiliation":[{"name":"Louisiana State University"}]},{"given":"Jianshu","family":"Liu","sequence":"additional","affiliation":[{"name":"Louisiana State University"}]},{"given":"Jinpeng","family":"Wei","sequence":"additional","affiliation":[{"name":"University of North Carolina at Charlotte"}]}],"member":"263","reference":[{"volume-title":"20 best open source automation testing tools in 2022","year":"2022","key":"ref1"},{"volume-title":"Amazon cloudwatch introduces high-resolution custom metrics and alarms","year":"2017","key":"ref2"},{"volume-title":"Automate software testing \u2014 testim","year":"2022","key":"ref3"},{"volume-title":"Cloudlab","year":"2021","key":"ref4"},{"volume-title":"Collectl","year":"2022","key":"ref5"},{"volume-title":"Docker container stats","year":"2023","key":"ref6"},{"volume-title":"Short, stealthy, sub-saturating ddos attacks pose greatest security threat to businesses","year":"2022","key":"ref7"},{"volume-title":"Snort - network intrusion detection","year":"2021","key":"ref8"},{"volume-title":"Amazon cloudwatch","year":"2017","key":"ref9"},{"volume-title":"Cloudflare ddos threat report for 2022 q4","year":"2022","key":"ref10"},{"volume-title":"Autoscale common metrics","year":"2023","key":"ref11"},{"volume-title":"Monitor cloudwatch metrics for your auto scaling","year":"2023","key":"ref12"},{"volume-title":"Amazon ec2","year":"2021","key":"ref13"},{"volume-title":"Microsoft azure","year":"2021","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2022.3155447"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3380786.3391395"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34135-9_20"},{"volume-title":"Why havent ddos attacks gone away?","year":"2022","author":"Chickowski","key":"ref18"},{"volume-title":"Decomposing twitter: Adventures in service-oriented architecture","year":"2013","author":"Cloud","key":"ref19"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3232559"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2023.3236447"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3277539.3277541"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304013"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2382553.2382556"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3634737.3644991"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2004.1348109"},{"key":"ref27","first-page":"419","article-title":"Lifting the veil on {Metas} microservice architecture: Analyses of topology and request workflows","volume-title":"2023 USENIX Annual Technical Conference (USENIX ATC23)","author":"Huye","year":"2023"},{"volume-title":"Jaeger: open source, end-to-end distributed tracing","year":"2022","author":"Jaeger","key":"ref28"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/511446.511485"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1115\/1.3662552"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.19"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897866"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1281192.1281295"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2007.328"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863966"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2019.2942591"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3590140.3592851"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3472883.3487003"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3567955.3567964"},{"article-title":"On a new class of pulsing denial-of-service attacks and the defense","volume-title":"NDSS","author":"Luo","key":"ref40"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89173-4_17"},{"volume-title":"Adopting microservices at netflix: Lessons for architectural design","year":"2015","author":"Mauro","key":"ref42"},{"volume-title":"Collect windows and linux performance data sources with log analytics agent","year":"2023","key":"ref43"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2009.5199191"},{"volume-title":"Shorter, sharper ddos attacks are on the rise - and attackers are sidestepping traditional mitigation approaches","year":"2021","author":"Weaver","key":"ref45"},{"key":"ref46","first-page":"805","article-title":"{FIRM}: An intelligent fine-grained resource management framework for slo-oriented microservices","author":"Qiu","year":"2020","journal-title":"14th ({OSDI} 20)"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655019"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.926503"},{"key":"ref49","first-page":"487","article-title":"Dasu: Pushing experiments to the internets edge","author":"S\u00e1nchez","year":"2013","journal-title":"NSDI"},{"volume-title":"Amazon, microservices and the birth of aws cloud computing","year":"2013","author":"Satnic","key":"ref50"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133968"},{"key":"ref52","first-page":"45","article-title":"Very short intermittent ddos attacks in an unsaturated system","volume-title":"International Conference on Security and Privacy in Communication Systems","author":"Shan"},{"key":"ref53","first-page":"177","article-title":"{$\\mu$ Tune}: {Auto-Tuned} threading for {OLDI} microservices","author":"Sriraman","year":"2018","journal-title":"OSDI 18"},{"key":"ref54","first-page":"361","article-title":"Freezing the web: A study of redos vulnerabilities in javascript-based web servers","volume-title":"27th {USENIX} Security Symposium ({USENIX} Security 18)","author":"Staicu","year":"2018"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.07.006"},{"volume-title":"Azure ddos protection-2021 q3 and q4 ddos attack trends","year":"2022","author":"Toh","key":"ref56"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2013.17"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.32"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3485372"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.031413.00127"},{"key":"ref61","first-page":"655","article-title":"{CRISP}: Critical path analysis of {Large-Scale} microservice architectures","author":"Zhang","year":"2022","journal-title":"USENIX ATC 22"}],"event":{"name":"2024 54th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN)","start":{"date-parts":[[2024,6,24]]},"location":"Brisbane, Australia","end":{"date-parts":[[2024,6,27]]}},"container-title":["2024 54th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10646626\/10646630\/10646949.pdf?arnumber=10646949","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T04:53:12Z","timestamp":1725252792000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10646949\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,24]]},"references-count":61,"URL":"https:\/\/doi.org\/10.1109\/dsn58291.2024.00025","relation":{},"subject":[],"published":{"date-parts":[[2024,6,24]]}}}