{"id":"https://openalex.org/W7115685851","doi":"https://doi.org/10.1109/tifs.2025.3644790","title":"Exploiting Cyber Threat Intelligence for Indirect Attacks Against Serverless Infrastructures","display_name":"Exploiting Cyber Threat Intelligence for Indirect Attacks Against Serverless Infrastructures","publication_year":2025,"publication_date":"2025-12-17","ids":{"openalex":"https://openalex.org/W7115685851","doi":"https://doi.org/10.1109/tifs.2025.3644790"},"language":null,"primary_location":{"id":"doi:10.1109/tifs.2025.3644790","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3644790","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Baojin Wang","orcid":"https://orcid.org/0009-0000-8401-2567"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Baojin Wang","raw_affiliation_strings":["School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Yongzhao Zhang","orcid":"https://orcid.org/0009-0002-2716-5369"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yongzhao Zhang","raw_affiliation_strings":["School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Xiong Li","orcid":"https://orcid.org/0000-0001-6619-554X"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiong Li","raw_affiliation_strings":["School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Jie Yang","orcid":"https://orcid.org/0000-0002-8244-2181"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jie Yang","raw_affiliation_strings":["School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Yijun Liu","orcid":"https://orcid.org/0009-0000-0533-055X"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yijun Liu","raw_affiliation_strings":["School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Jiazhen Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiazhen Liu","raw_affiliation_strings":["School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Ting Chen","orcid":"https://orcid.org/0000-0001-9165-8331"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ting Chen","raw_affiliation_strings":["School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Xiaosong Zhang","orcid":"https://orcid.org/0000-0001-9886-1412"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaosong Zhang","raw_affiliation_strings":["School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Dian Ding","orcid":"https://orcid.org/0000-0002-2190-0919"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dian Ding","raw_affiliation_strings":["Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"last","author":{"id":null,"display_name":"Yi-Chao Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yi-Chao Chen","raw_affiliation_strings":["Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":10,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I150229711"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.63945903,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"21","issue":null,"first_page":"373","last_page":"387"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.5164999961853027,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.5164999961853027,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.0729999989271164,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.06310000270605087,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cyber-threats","display_name":"Cyber threats","score":0.7081999778747559},{"id":"https://openalex.org/keywords/trustworthiness","display_name":"Trustworthiness","score":0.5928000211715698},{"id":"https://openalex.org/keywords/dissemination","display_name":"Dissemination","score":0.4426000118255615},{"id":"https://openalex.org/keywords/threat-model","display_name":"Threat model","score":0.3971000015735626},{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.3799999952316284},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.29030001163482666}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7867000102996826},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.715499997138977},{"id":"https://openalex.org/C3018725008","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber threats","level":2,"score":0.7081999778747559},{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.5928000211715698},{"id":"https://openalex.org/C101780184","wikidata":"https://www.wikidata.org/wiki/Q840576","display_name":"Dissemination","level":2,"score":0.4426000118255615},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.3971000015735626},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.3799999952316284},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3504999876022339},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.29030001163482666},{"id":"https://openalex.org/C207267971","wikidata":"https://www.wikidata.org/wiki/Q120208","display_name":"Emerging technologies","level":2,"score":0.2867000102996826},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.2791000008583069},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2624000012874603},{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.2529999911785126}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2025.3644790","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3644790","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6382952928543091,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W1767339332","https://openalex.org/W2129660502","https://openalex.org/W2506299962","https://openalex.org/W2810758612","https://openalex.org/W2962955124","https://openalex.org/W2968538311","https://openalex.org/W2994553655","https://openalex.org/W3006161904","https://openalex.org/W3009066821","https://openalex.org/W3012914409","https://openalex.org/W3082122021","https://openalex.org/W3128070938","https://openalex.org/W3158207578","https://openalex.org/W3163378277","https://openalex.org/W3164810656","https://openalex.org/W3170980000","https://openalex.org/W3179934812","https://openalex.org/W3211661740","https://openalex.org/W3212224036","https://openalex.org/W4200000055","https://openalex.org/W4206245037","https://openalex.org/W4226078703","https://openalex.org/W4292452313","https://openalex.org/W4308642220","https://openalex.org/W4383749509","https://openalex.org/W4386245196","https://openalex.org/W4393121627","https://openalex.org/W4396735064","https://openalex.org/W4400120057","https://openalex.org/W4401416760","https://openalex.org/W4402040376","https://openalex.org/W4402099621","https://openalex.org/W4408358681","https://openalex.org/W4414066512","https://openalex.org/W4414874068","https://openalex.org/W4415034651","https://openalex.org/W4416010304"],"related_works":[],"abstract_inverted_index":{"Cyber":[0],"Threat":[1],"Intelligence":[2],"(CTI)":[3],"and":[4,85,118,137,155,192,197],"serverless":[5,68,112,179],"computing":[6],"are":[7],"two":[8],"emerging":[9],"technologies":[10],"that":[11,46,99,133],"have":[12],"significantly":[13],"impacted":[14],"their":[15,22,82],"respective":[16],"domains":[17],"in":[18,67,125,168],"recent":[19],"years.":[20],"However,":[21],"interaction":[23],"remains":[24],"surprisingly":[25],"underexplored.":[26],"In":[27],"this":[28],"work,":[29],"through":[30,122],"in-depth":[31],"semi-structured":[32],"interviews":[33],"with":[34,60],"cybersecurity":[35],"experts,":[36],"we":[37,92],"identify":[38],"the":[39,43,116,143,185,208],"trust":[40],"issues":[41],"within":[42,142],"CTI":[44,53,78,102,141,144,195],"ecosystem":[45],"can":[47,73,135],"be":[48,74],"exploited":[49],"to":[50,81,104,147,162,200],"introduce":[51],"fake":[52,101,140],"manipulation,":[54],"enabling":[55],"indirect":[56,108],"attacks":[57,72,110],"against":[58,111],"entities":[59],"dynamic":[61],"IP":[62],"allocation,":[63],"such":[64],"as":[65],"those":[66],"computing.":[69],"Furthermore,":[70],"these":[71,90],"amplified":[75],"by":[76],"commercial":[77],"platforms":[79,196],"due":[80],"widespread":[83],"adoption":[84],"sharing":[86],"mechanisms.":[87],"Based":[88],"on":[89],"insights,":[91],"propose":[93],"Ares,":[94],"a":[95,126,156,173,202],"novel":[96],"attack":[97],"strategy":[98],"leverages":[100],"manipulation":[103],"enable":[105],"large-scale,":[106],"stealthy":[107],"denial-of-service":[109],"infrastructures.":[113],"We":[114],"demonstrate":[115],"feasibility":[117],"impact":[119],"of":[120,153,160],"Ares":[121,134],"extensive":[123],"evaluations":[124],"controlled":[127],"experimental":[128],"environment.":[129],"Our":[130],"results":[131],"show":[132],"rapidly":[136],"widely":[138],"disseminate":[139],"ecosystem,":[145],"leading":[146],"an":[148],"overall":[149],"average":[150],"reject":[151,158],"rate":[152,159,176],"23.03%":[154],"high":[157],"up":[161],"45.42%":[163],"when":[164],"accessing":[165],"top":[166],"websites":[167],"certain":[169],"industries,":[170],"while":[171],"maintaining":[172],"low":[174],"detection":[175],"across":[177,207],"state-of-the-art":[178],"security":[180],"systems.":[181],"These":[182],"findings":[183],"underscore":[184],"urgent":[186],"need":[187],"for":[188],"more":[189,203],"frequent":[190],"communication":[191],"collaboration":[193],"among":[194],"related":[198],"stakeholders":[199],"develop":[201],"robust":[204],"trustworthiness":[205],"model":[206],"ecosystem.":[209]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-12-17T00:00:00"}
