<?xml version="1.0" encoding="UTF-8"?>        <rss version="2.0"
             xmlns:atom="http://www.w3.org/2005/Atom"
             xmlns:dc="http://purl.org/dc/elements/1.1/"
             xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
             xmlns:admin="http://webns.net/mvcb/"
             xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
             xmlns:content="http://purl.org/rss/1.0/modules/content/">
        <channel>
            <title>
									MMLAB Forum - 최근 주제들				            </title>
            <link>https://mmlab.snu.ac.kr/community/</link>
            <description>MMLAB Discussion Board</description>
            <language>ko-KR</language>
            <lastBuildDate>Sat, 09 May 2026 14:35:11 +0000</lastBuildDate>
            <generator>wpForo</generator>
            <ttl>60</ttl>
							                    <item>
                        <title> One Email, Many Faces: A Deep Dive into Identity Confusion in Email Aliases</title>
                        <link>https://mmlab.snu.ac.kr/community/seminar/2026-05-07-one-email-many-faces-a-deep-dive-into-identity-confusion-in-email-aliases/</link>
                        <pubDate>Thu, 07 May 2026 04:22:15 +0000</pubDate>
                        <description><![CDATA[
Email addresses serve as a universal identifier for online account management, however, their aliasing mechanisms introduce significant identity confusion between email providers...]]></description>
                        <content:encoded><![CDATA[<p></p>
<p>Email addresses serve as a universal identifier for online account management, however, their aliasing mechanisms introduce significant identity confusion between email providers and external platforms. This paper presents the first systematic analysis of the inconsistencies arising from email aliasing, where providers view alias addresses (<em>e.g.,<span> </span>ALICE@example.com,<span> </span>alice+work@example.com</em>) as additional entrances of the base email (<em>alice@example.com</em>), while platforms often treat them as distinct identities.</p>
<p>Through empirical evaluations the alias mechanisms of 28 email providers and 18 online platforms, we reveal critical gaps: (1) Only Gmail fully documents its aliasing rules, while 11 providers silently support undocumented alias behaviors; (2) Due to lack of standardization documentation and de facto implementation, platforms either failed to distinguish alias addresses or over aggressive excluded all emails containing specific symbol. Real-world abuse cases demonstrate attackers exploiting aliases to create up to 139 accounts from a single base email in npm for spam campaigns. Our user study further highlights security risks, showing 31.65% of participants with alias knowledge mistake phishing emails as legitimate emails alias due to inconsistent provider implementations. Users who believe they understand email aliasing, especially those highly educated, male, and technical participants, are more susceptible to being phished. Our findings underscore the urgent need for standardization and transparency in email aliasing. We contribute the OriginMail tool to help platforms resolve alias confusion and disclose vulnerabilities to affected stakeholders.</p>
<div id="wpfa-17917" class="wpforo-attached-file"><a class="wpforo-default-attachment" title="MainSeminar260507_OneEmailManyFaces_sykim.pptx" href="//mmlab.snu.ac.kr/wp-content/uploads/wpforo/default_attachments/1778127735-MainSeminar260507_OneEmailManyFaces_sykim.pptx" target="_blank" rel="noopener"><i class="fas fa-paperclip"></i> MainSeminar260507_OneEmailManyFaces_sykim.pptx</a></div>
<div id="wpfa-17918" class="wpforo-attached-file"><a class="wpforo-default-attachment" href="//mmlab.snu.ac.kr/wp-content/uploads/wpforo/default_attachments/1778127796-2026-s148-paper.pdf" target="_blank" title="2026-s148-paper.pdf"><i class="fas fa-paperclip"></i>&nbsp;2026-s148-paper.pdf</a></div>]]></content:encoded>
						                            <category domain="https://mmlab.snu.ac.kr/community/"></category>                        <dc:creator>sykim</dc:creator>
                        <guid isPermaLink="true">https://mmlab.snu.ac.kr/community/seminar/2026-05-07-one-email-many-faces-a-deep-dive-into-identity-confusion-in-email-aliases/</guid>
                    </item>
				                    <item>
                        <title> BGP-iSec: Improved security of internet routing against post-ROV attacks</title>
                        <link>https://mmlab.snu.ac.kr/community/seminar/2026-04-30-bgp-isec-improved-security-of-internet-routing-against-post-rov-attacks/</link>
                        <pubDate>Thu, 30 Apr 2026 04:52:32 +0000</pubDate>
                        <description><![CDATA[메인세미나 발표자료입니다. 
 260423_BGPisec_jhoh_submission.pdf
&nbsp;260423_BGPisec_jhoh_submission.pptx]]></description>
                        <content:encoded><![CDATA[<p>메인세미나 발표자료입니다. </p>
<div id="wpfa-17908" class="wpforo-attached-file"><a class="wpforo-default-attachment" title="260423_BGPisec_jhoh_submission.pdf" href="//mmlab.snu.ac.kr/wp-content/uploads/wpforo/default_attachments/1777524752-260423_BGPisec_jhoh_submission.pdf" target="_blank" rel="noopener"><i class="fas fa-paperclip"></i> 260423_BGPisec_jhoh_submission.pdf</a></div>
<div id="wpfa-17909" class="wpforo-attached-file"><a class="wpforo-default-attachment" href="//mmlab.snu.ac.kr/wp-content/uploads/wpforo/default_attachments/1777524764-260423_BGPisec_jhoh_submission.pptx" target="_blank" title="260423_BGPisec_jhoh_submission.pptx"><i class="fas fa-paperclip"></i>&nbsp;260423_BGPisec_jhoh_submission.pptx</a></div>]]></content:encoded>
						                            <category domain="https://mmlab.snu.ac.kr/community/"></category>                        <dc:creator>jhoh</dc:creator>
                        <guid isPermaLink="true">https://mmlab.snu.ac.kr/community/seminar/2026-04-30-bgp-isec-improved-security-of-internet-routing-against-post-rov-attacks/</guid>
                    </item>
				                    <item>
                        <title> Les Dissonances: Cross-Tool Harvesting and Polluting in Pool-of-Tools Empowered LLM Agents</title>
                        <link>https://mmlab.snu.ac.kr/community/seminar/2026-4-23-les-dissonances-cross-tool-harvesting-and-polluting-in-pool-of-tools-empowered-llm-agents/</link>
                        <pubDate>Thu, 23 Apr 2026 04:45:54 +0000</pubDate>
                        <description><![CDATA[Abstract-
Large Language Model (LLM) agents are au tonomous systems powered by LLMs, capable of reasoning and planning to solve problems by leveraging a set of tools. However, the integrati...]]></description>
                        <content:encoded><![CDATA[<div>Abstract-</div>
<div>Large Language Model (LLM) agents are au tonomous systems powered by LLMs, capable of reasoning and planning to solve problems by leveraging a set of tools. However, the integration of multiple tools in LLM agents introduces chal lenges in securely managing tools, ensuring their compatibility, handling dependency relationships, and protecting control flows within LLM agent’s task workflows. In this paper, we present the f irst systematic security analysis of task control flows in multi tool-enabled LLM agents. We identify a novel threat, Cross-Tool Harvesting and Polluting (XTHP), which includes multiple attack vectors to first hijack the normal control flows of agent tasks, and then collect and pollute confidential or private information within LLM agent systems. To understand the impact of this threat, we developed Chord, a dynamic scanning tool designed to automatically detect real-world agent tools susceptible to XTHP attacks. Our evaluation of 66 real-world tools from two major LLM agent development frameworks, LangChain and Llama-Index, revealed that 75% are vulnerable to XTHP attacks, highlighting the prevalence of this threat.  </div>
<div id="wpfa-17876" class="wpforo-attached-file"><a class="wpforo-default-attachment" title="les_dissonances_ndss26.pdf" href="//mmlab.snu.ac.kr/wp-content/uploads/wpforo/default_attachments/1776919554-les_dissonances_ndss26.pdf" target="_blank" rel="noopener"><i class="fas fa-paperclip"></i> les_dissonances_ndss26.pdf</a></div>
<div id="wpfa-17877" class="wpforo-attached-file"><a class="wpforo-default-attachment" title="2026042_Les-Dissonances_jhkang.pdf" href="//mmlab.snu.ac.kr/wp-content/uploads/wpforo/default_attachments/1776919576-2026042_Les-Dissonances_jhkang.pdf" target="_blank" rel="noopener"><i class="fas fa-paperclip"></i> 2026042_Les-Dissonances_jhkang.pdf</a></div>]]></content:encoded>
						                            <category domain="https://mmlab.snu.ac.kr/community/"></category>                        <dc:creator>jhkang</dc:creator>
                        <guid isPermaLink="true">https://mmlab.snu.ac.kr/community/seminar/2026-4-23-les-dissonances-cross-tool-harvesting-and-polluting-in-pool-of-tools-empowered-llm-agents/</guid>
                    </item>
				                    <item>
                        <title> Dangers Behind Access Control: Understanding and Exploiting Implicit Permissions in Kubernetes</title>
                        <link>https://mmlab.snu.ac.kr/community/seminar/2026-04-09-dangers-behind-access-control-understanding-and-exploiting-implicit-permissions-in-kubernetes/</link>
                        <pubDate>Thu, 09 Apr 2026 04:52:56 +0000</pubDate>
                        <description><![CDATA[Abstract:
As the de-facto standard for container orchestration, Kubernetes is extensively adopted by numerous companies and cloud vendors, making its security critical. In this paper, we de...]]></description>
                        <content:encoded><![CDATA[<p>Abstract:</p>
<p>As the de-facto standard for container orchestration, Kubernetes is extensively adopted by numerous companies and cloud vendors, making its security critical. In this paper, we define a new attack surface called implicit permission: The execution of explicitly granted permissions in Kubernetes dynamically leads to implicit operations on other resources, enabling new permissions beyond the explicitly granted ones. Such implicit permissions create security vulnerabilities that attackers can exploit to compromise an entire cluster. Automatically identifying implicit permissions is challenging due to implicit relation reasoning and dynamic behaviors across diverse components of Kubernetes. To address that, we devise a systematic approach that combines static analysis techniques with the advanced capabilities of the large language model (LLM, e.g., GPT-4.5). Initially, we develop a static analysis to identify all Kubernetes resources. Building on this, we use static analysis to identify all explicit permissions for each resource. Finally, by combining the semantic reasoning capabilities of LLMs with the pattern-based precision of static analysis, we reason about what explicit permissions<br />may dynamically lead to implicit permissions through complex interactions and uncover 593 implicit permissions derived from explicit permissions. We use the implicit permission references as insights to identify potential risks of CNCF projects and applications provided by the top four cloud vendors. With responsible disclosure, we obtain five new CVEs, six acknowledgments of cloud vendors, and a bounty awarded by Google. These acknowledgments underlie the practical impact of our attack.</p>
<div id="wpfa-17835" class="wpforo-attached-file"><a class="wpforo-default-attachment" title="20260409_AC-EP_huko_vfin.pptx" href="//mmlab.snu.ac.kr/wp-content/uploads/wpforo/default_attachments/1775710376-20260409_AC-EP_huko_vfin.pptx" target="_blank" rel="noopener"><i class="fas fa-paperclip"></i> 20260409_AC-EP_huko_vfin.pptx</a></div>
<div id="wpfa-17836" class="wpforo-attached-file"><a class="wpforo-default-attachment" title="kube_ac_ep.pdf" href="//mmlab.snu.ac.kr/wp-content/uploads/wpforo/default_attachments/1775710410-kube_ac_ep.pdf" target="_blank" rel="noopener"><i class="fas fa-paperclip"></i> kube_ac_ep.pdf</a></div>
<div id="wpfa-17837" class="wpforo-attached-file"><a class="wpforo-default-attachment" href="//mmlab.snu.ac.kr/wp-content/uploads/wpforo/default_attachments/1775710485-20260409_AC-EP_huko_vfin.pdf" target="_blank" title="20260409_AC-EP_huko_vfin.pdf"><i class="fas fa-paperclip"></i>&nbsp;20260409_AC-EP_huko_vfin.pdf</a></div>]]></content:encoded>
						                            <category domain="https://mmlab.snu.ac.kr/community/"></category>                        <dc:creator>고형욱</dc:creator>
                        <guid isPermaLink="true">https://mmlab.snu.ac.kr/community/seminar/2026-04-09-dangers-behind-access-control-understanding-and-exploiting-implicit-permissions-in-kubernetes/</guid>
                    </item>
				                    <item>
                        <title> Global, Passive Detection of Connection Tampering</title>
                        <link>https://mmlab.snu.ac.kr/community/seminar/2026-04-01-global-passive-detection-of-connection-tampering/</link>
                        <pubDate>Wed, 01 Apr 2026 03:40:53 +0000</pubDate>
                        <description><![CDATA[Abstract




In-network devices around the world monitor and tamper with connections for many reasons, including intrusion prevention, combating spam or phishing, and country-level cens...]]></description>
                        <content:encoded><![CDATA[<p>Abstract</p>
<div id=":zl" class="ii gt">
<div id=":zk" class="a3s aiL">
<div id="avWBGd-23">
<div dir="ltr">
<div dir="ltr">In-network devices around the world monitor and tamper with connections for many reasons, including intrusion prevention, combating spam or phishing, and country-level censorship. Connection tampering seeks to block access to specific domain names or keywords, and it affects billions of users worldwide with little-to-no transparency. To detect, diagnose, and measure connection-level blocking, "active" measurement techniques originate queries with domains or keywords believed to be blocked and send them from vantage points within networks of interest. Active measurement efforts have been critical to understanding how traffic tampering occurs, but they inherently are unable to capture critical parts of the picture. For instance, knowing the set of domains in a block-list (i.e., what could get blocked) is not the same as knowing what real users are actively experiencing (i.e., what is actively getting blocked). We present the first global study of connection tampering through a passive analysis of traffic received at a global CDN, Cloudflare. We analyze a sample of traffic to all of Cloudflare's servers to construct the first comprehensive list of tampering signatures: sequences of packet headers that are indicative of connection tampering. We then apply these tampering signatures to analyze our global dataset of real user traffic, yielding a more comprehensive view of connection tampering than has been possible with active measurements alone. In particular, our passive analysis allows us to report on how connection tampering is actively affecting users and clients from virtually every network, without active probes, vantage points in difficult-to-reach networks and regions, or test lists (which we analyze for completeness against our results). Our study shows that passive measurement can be a powerful complement to active measurement in understanding connection tampering and improving transparency.</div>
</div>
</div>
</div>
</div>
<div id="wpfa-17823" class="wpforo-attached-file"><a class="wpforo-default-attachment" title="Global-Passive-Detection-of-Connection-Tampering.pdf" href="//mmlab.snu.ac.kr/wp-content/uploads/wpforo/default_attachments/1775014853-Global-Passive-Detection-of-Connection-Tampering.pdf" target="_blank" rel="noopener"><i class="fas fa-paperclip"></i> Global-Passive-Detection-of-Connection-Tampering.pdf</a></div>
<div id="wpfa-17824" class="wpforo-attached-file"><a class="wpforo-default-attachment" title="Global-Passive-Detection-of-Connection-Tampering_CH.pdf" href="//mmlab.snu.ac.kr/wp-content/uploads/wpforo/default_attachments/1775014878-Global-Passive-Detection-of-Connection-Tampering_CH.pdf" target="_blank" rel="noopener"><i class="fas fa-paperclip"></i> Global-Passive-Detection-of-Connection-Tampering_CH.pdf</a></div>
<div id="wpfa-17825" class="wpforo-attached-file"><a class="wpforo-default-attachment" href="//mmlab.snu.ac.kr/wp-content/uploads/wpforo/default_attachments/1775014888-Global-Passive-Detection-of-Connection-Tampering_CH.pptx" target="_blank" title="Global-Passive-Detection-of-Connection-Tampering_CH.pptx"><i class="fas fa-paperclip"></i>&nbsp;Global-Passive-Detection-of-Connection-Tampering_CH.pptx</a></div>]]></content:encoded>
						                            <category domain="https://mmlab.snu.ac.kr/community/"></category>                        <dc:creator>chlee</dc:creator>
                        <guid isPermaLink="true">https://mmlab.snu.ac.kr/community/seminar/2026-04-01-global-passive-detection-of-connection-tampering/</guid>
                    </item>
				                    <item>
                        <title> Authenticated Private Information Retrieval</title>
                        <link>https://mmlab.snu.ac.kr/community/seminar/2026-03-18-authenticated-private-information-retrieval/</link>
                        <pubDate>Wed, 18 Mar 2026 02:33:48 +0000</pubDate>
                        <description><![CDATA[안녕하세요, 3월 18일 메인세미나 발표자 박홍근입니다.
&nbsp;
발표 자료와 논문 업로드 합니다.
감사합니다.
 260318_Authenticated-Private-Information-Retrieval_hgpark.pdf
 260318_Authenticated-Private-Information-Retrieval_hgpar...]]></description>
                        <content:encoded><![CDATA[<p>안녕하세요, 3월 18일 메인세미나 발표자 박홍근입니다.</p>
<p>&nbsp;</p>
<p>발표 자료와 논문 업로드 합니다.</p>
<p>감사합니다.</p>
<div id="wpfa-17772" class="wpforo-attached-file"><a class="wpforo-default-attachment" title="260318_Authenticated-Private-Information-Retrieval_hgpark.pdf" href="//mmlab.snu.ac.kr/wp-content/uploads/wpforo/default_attachments/1773801228-260318_Authenticated-Private-Information-Retrieval_hgpark.pdf" target="_blank" rel="noopener"><i class="fas fa-paperclip"></i> 260318_Authenticated-Private-Information-Retrieval_hgpark.pdf</a></div>
<div id="wpfa-17773" class="wpforo-attached-file"><a class="wpforo-default-attachment" title="260318_Authenticated-Private-Information-Retrieval_hgpark.pptx" href="//mmlab.snu.ac.kr/wp-content/uploads/wpforo/default_attachments/1773801256-260318_Authenticated-Private-Information-Retrieval_hgpark.pptx" target="_blank" rel="noopener"><i class="fas fa-paperclip"></i> 260318_Authenticated-Private-Information-Retrieval_hgpark.pptx</a></div>
<div id="wpfa-17774" class="wpforo-attached-file"><a class="wpforo-default-attachment" href="//mmlab.snu.ac.kr/wp-content/uploads/wpforo/default_attachments/1773801320-Colombo--Authenticated-private-information-retrieval.pdf" target="_blank" title="Colombo-등-Authenticated-private-information-retrieval.pdf"><i class="fas fa-paperclip"></i>&nbsp;Colombo-등-Authenticated-private-information-retrieval.pdf</a></div>]]></content:encoded>
						                            <category domain="https://mmlab.snu.ac.kr/community/"></category>                        <dc:creator>박홍근</dc:creator>
                        <guid isPermaLink="true">https://mmlab.snu.ac.kr/community/seminar/2026-03-18-authenticated-private-information-retrieval/</guid>
                    </item>
							        </channel>
        </rss>
		