<?xml version="1.0" encoding="UTF-8"?>        <rss version="2.0"
             xmlns:atom="http://www.w3.org/2005/Atom"
             xmlns:dc="http://purl.org/dc/elements/1.1/"
             xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
             xmlns:admin="http://webns.net/mvcb/"
             xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
             xmlns:content="http://purl.org/rss/1.0/modules/content/">
        <channel>
            <title>
									Seminar - MMLAB Forum				            </title>
            <link>https://mmlab.snu.ac.kr/community/seminar/</link>
            <description>MMLAB Discussion Board</description>
            <language>ko-KR</language>
            <lastBuildDate>Mon, 20 Apr 2026 12:47:58 +0000</lastBuildDate>
            <generator>wpForo</generator>
            <ttl>60</ttl>
							                    <item>
                        <title> Dangers Behind Access Control: Understanding and Exploiting Implicit Permissions in Kubernetes</title>
                        <link>https://mmlab.snu.ac.kr/community/seminar/2026-04-09-dangers-behind-access-control-understanding-and-exploiting-implicit-permissions-in-kubernetes/</link>
                        <pubDate>Thu, 09 Apr 2026 04:52:56 +0000</pubDate>
                        <description><![CDATA[Abstract:
As the de-facto standard for container orchestration, Kubernetes is extensively adopted by numerous companies and cloud vendors, making its security critical. In this paper, we de...]]></description>
                        <content:encoded><![CDATA[<p>Abstract:</p>
<p>As the de-facto standard for container orchestration, Kubernetes is extensively adopted by numerous companies and cloud vendors, making its security critical. In this paper, we define a new attack surface called implicit permission: The execution of explicitly granted permissions in Kubernetes dynamically leads to implicit operations on other resources, enabling new permissions beyond the explicitly granted ones. Such implicit permissions create security vulnerabilities that attackers can exploit to compromise an entire cluster. Automatically identifying implicit permissions is challenging due to implicit relation reasoning and dynamic behaviors across diverse components of Kubernetes. To address that, we devise a systematic approach that combines static analysis techniques with the advanced capabilities of the large language model (LLM, e.g., GPT-4.5). Initially, we develop a static analysis to identify all Kubernetes resources. Building on this, we use static analysis to identify all explicit permissions for each resource. Finally, by combining the semantic reasoning capabilities of LLMs with the pattern-based precision of static analysis, we reason about what explicit permissions<br />may dynamically lead to implicit permissions through complex interactions and uncover 593 implicit permissions derived from explicit permissions. We use the implicit permission references as insights to identify potential risks of CNCF projects and applications provided by the top four cloud vendors. With responsible disclosure, we obtain five new CVEs, six acknowledgments of cloud vendors, and a bounty awarded by Google. These acknowledgments underlie the practical impact of our attack.</p>
<div id="wpfa-17835" class="wpforo-attached-file"><a class="wpforo-default-attachment" title="20260409_AC-EP_huko_vfin.pptx" href="//mmlab.snu.ac.kr/wp-content/uploads/wpforo/default_attachments/1775710376-20260409_AC-EP_huko_vfin.pptx" target="_blank" rel="noopener"><i class="fas fa-paperclip"></i> 20260409_AC-EP_huko_vfin.pptx</a></div>
<div id="wpfa-17836" class="wpforo-attached-file"><a class="wpforo-default-attachment" title="kube_ac_ep.pdf" href="//mmlab.snu.ac.kr/wp-content/uploads/wpforo/default_attachments/1775710410-kube_ac_ep.pdf" target="_blank" rel="noopener"><i class="fas fa-paperclip"></i> kube_ac_ep.pdf</a></div>
<div id="wpfa-17837" class="wpforo-attached-file"><a class="wpforo-default-attachment" href="//mmlab.snu.ac.kr/wp-content/uploads/wpforo/default_attachments/1775710485-20260409_AC-EP_huko_vfin.pdf" target="_blank" title="20260409_AC-EP_huko_vfin.pdf"><i class="fas fa-paperclip"></i>&nbsp;20260409_AC-EP_huko_vfin.pdf</a></div>]]></content:encoded>
						                            <category domain="https://mmlab.snu.ac.kr/community/seminar/">Seminar</category>                        <dc:creator>고형욱</dc:creator>
                        <guid isPermaLink="true">https://mmlab.snu.ac.kr/community/seminar/2026-04-09-dangers-behind-access-control-understanding-and-exploiting-implicit-permissions-in-kubernetes/</guid>
                    </item>
				                    <item>
                        <title> Global, Passive Detection of Connection Tampering</title>
                        <link>https://mmlab.snu.ac.kr/community/seminar/2026-04-01-global-passive-detection-of-connection-tampering/</link>
                        <pubDate>Wed, 01 Apr 2026 03:40:53 +0000</pubDate>
                        <description><![CDATA[Abstract




In-network devices around the world monitor and tamper with connections for many reasons, including intrusion prevention, combating spam or phishing, and country-level cens...]]></description>
                        <content:encoded><![CDATA[<p>Abstract</p>
<div id=":zl" class="ii gt">
<div id=":zk" class="a3s aiL">
<div id="avWBGd-23">
<div dir="ltr">
<div dir="ltr">In-network devices around the world monitor and tamper with connections for many reasons, including intrusion prevention, combating spam or phishing, and country-level censorship. Connection tampering seeks to block access to specific domain names or keywords, and it affects billions of users worldwide with little-to-no transparency. To detect, diagnose, and measure connection-level blocking, "active" measurement techniques originate queries with domains or keywords believed to be blocked and send them from vantage points within networks of interest. Active measurement efforts have been critical to understanding how traffic tampering occurs, but they inherently are unable to capture critical parts of the picture. For instance, knowing the set of domains in a block-list (i.e., what could get blocked) is not the same as knowing what real users are actively experiencing (i.e., what is actively getting blocked). We present the first global study of connection tampering through a passive analysis of traffic received at a global CDN, Cloudflare. We analyze a sample of traffic to all of Cloudflare's servers to construct the first comprehensive list of tampering signatures: sequences of packet headers that are indicative of connection tampering. We then apply these tampering signatures to analyze our global dataset of real user traffic, yielding a more comprehensive view of connection tampering than has been possible with active measurements alone. In particular, our passive analysis allows us to report on how connection tampering is actively affecting users and clients from virtually every network, without active probes, vantage points in difficult-to-reach networks and regions, or test lists (which we analyze for completeness against our results). Our study shows that passive measurement can be a powerful complement to active measurement in understanding connection tampering and improving transparency.</div>
</div>
</div>
</div>
</div>
<div id="wpfa-17823" class="wpforo-attached-file"><a class="wpforo-default-attachment" title="Global-Passive-Detection-of-Connection-Tampering.pdf" href="//mmlab.snu.ac.kr/wp-content/uploads/wpforo/default_attachments/1775014853-Global-Passive-Detection-of-Connection-Tampering.pdf" target="_blank" rel="noopener"><i class="fas fa-paperclip"></i> Global-Passive-Detection-of-Connection-Tampering.pdf</a></div>
<div id="wpfa-17824" class="wpforo-attached-file"><a class="wpforo-default-attachment" title="Global-Passive-Detection-of-Connection-Tampering_CH.pdf" href="//mmlab.snu.ac.kr/wp-content/uploads/wpforo/default_attachments/1775014878-Global-Passive-Detection-of-Connection-Tampering_CH.pdf" target="_blank" rel="noopener"><i class="fas fa-paperclip"></i> Global-Passive-Detection-of-Connection-Tampering_CH.pdf</a></div>
<div id="wpfa-17825" class="wpforo-attached-file"><a class="wpforo-default-attachment" href="//mmlab.snu.ac.kr/wp-content/uploads/wpforo/default_attachments/1775014888-Global-Passive-Detection-of-Connection-Tampering_CH.pptx" target="_blank" title="Global-Passive-Detection-of-Connection-Tampering_CH.pptx"><i class="fas fa-paperclip"></i>&nbsp;Global-Passive-Detection-of-Connection-Tampering_CH.pptx</a></div>]]></content:encoded>
						                            <category domain="https://mmlab.snu.ac.kr/community/seminar/">Seminar</category>                        <dc:creator>chlee</dc:creator>
                        <guid isPermaLink="true">https://mmlab.snu.ac.kr/community/seminar/2026-04-01-global-passive-detection-of-connection-tampering/</guid>
                    </item>
				                    <item>
                        <title> Authenticated Private Information Retrieval</title>
                        <link>https://mmlab.snu.ac.kr/community/seminar/2026-03-18-authenticated-private-information-retrieval/</link>
                        <pubDate>Wed, 18 Mar 2026 02:33:48 +0000</pubDate>
                        <description><![CDATA[안녕하세요, 3월 18일 메인세미나 발표자 박홍근입니다.
&nbsp;
발표 자료와 논문 업로드 합니다.
감사합니다.
 260318_Authenticated-Private-Information-Retrieval_hgpark.pdf
 260318_Authenticated-Private-Information-Retrieval_hgpar...]]></description>
                        <content:encoded><![CDATA[<p>안녕하세요, 3월 18일 메인세미나 발표자 박홍근입니다.</p>
<p>&nbsp;</p>
<p>발표 자료와 논문 업로드 합니다.</p>
<p>감사합니다.</p>
<div id="wpfa-17772" class="wpforo-attached-file"><a class="wpforo-default-attachment" title="260318_Authenticated-Private-Information-Retrieval_hgpark.pdf" href="//mmlab.snu.ac.kr/wp-content/uploads/wpforo/default_attachments/1773801228-260318_Authenticated-Private-Information-Retrieval_hgpark.pdf" target="_blank" rel="noopener"><i class="fas fa-paperclip"></i> 260318_Authenticated-Private-Information-Retrieval_hgpark.pdf</a></div>
<div id="wpfa-17773" class="wpforo-attached-file"><a class="wpforo-default-attachment" title="260318_Authenticated-Private-Information-Retrieval_hgpark.pptx" href="//mmlab.snu.ac.kr/wp-content/uploads/wpforo/default_attachments/1773801256-260318_Authenticated-Private-Information-Retrieval_hgpark.pptx" target="_blank" rel="noopener"><i class="fas fa-paperclip"></i> 260318_Authenticated-Private-Information-Retrieval_hgpark.pptx</a></div>
<div id="wpfa-17774" class="wpforo-attached-file"><a class="wpforo-default-attachment" href="//mmlab.snu.ac.kr/wp-content/uploads/wpforo/default_attachments/1773801320-Colombo--Authenticated-private-information-retrieval.pdf" target="_blank" title="Colombo-등-Authenticated-private-information-retrieval.pdf"><i class="fas fa-paperclip"></i>&nbsp;Colombo-등-Authenticated-private-information-retrieval.pdf</a></div>]]></content:encoded>
						                            <category domain="https://mmlab.snu.ac.kr/community/seminar/">Seminar</category>                        <dc:creator>박홍근</dc:creator>
                        <guid isPermaLink="true">https://mmlab.snu.ac.kr/community/seminar/2026-03-18-authenticated-private-information-retrieval/</guid>
                    </item>
				                    <item>
                        <title> Resolution Without Dissent: In-Path Per-Query Sanitization to Defeat Surreptitious Communication Over DNS</title>
                        <link>https://mmlab.snu.ac.kr/community/seminar/2026-03-11-resolution-without-dissent-in-path-per-query-sanitization-to-defeat-surreptitious-communication-over-dns/</link>
                        <pubDate>Wed, 11 Mar 2026 03:58:27 +0000</pubDate>
                        <description><![CDATA[As one of the most fundamental Internet components, DNS has served various purposes and thus DNS traffic usually exhibits diverse patterns and is probably the least blocked by network admini...]]></description>
                        <content:encoded><![CDATA[<div>As one of the most fundamental Internet components, DNS has served various purposes and thus DNS traffic usually exhibits diverse patterns and is probably the least blocked by network administrators. These make DNS an attractive channel for attackers to establish surreptitious communications (i.e., DNS tunneling). In fact, such a surreptitious channel has been widely abused for command and control (C2) and enterprise-unapproved virtual private network (VPN). Existing approaches exclusively rely on the statistical characteristics of a sequence of DNS queries to detect DNS tunneling. Unfortunately, these approaches by nature cannot guarantee zero data leakage and can be evaded when the stolen data is exfiltrated over many root domains. As a result, state-of-the-art approaches are more suitable for threat investigation and forensic analysis, but not for DNS tunneling prevention.</div>
<div>To fill this protection gap, we propose TunTight, the first system that is able to achieve in-path per-query DNS tunneling prevention. Our key insight is that DNS tunneling domains have unique characteristics in their authoritative nameservers, domain usage, and domain name patterns. Based on these characteristics, a set of unique features are defined and extracted which are fed to a machine learning model. To validate the efficacy of TunTight, we integrate it into the cloud backend of an enterprise firewall product by one of the largest security vendors. In our two-months real-world deployment, TunTight has successfully detected 349 confirmed tunnels at the very first query with negligible false positives and negatives. We also conduct the first large-scale study of DNS tunneling activities in the wild. One interesting finding is that most DNS tunneling traffic in enterprise networks come from public tunneling tools and enterprise-unapproved VPN services.</div>
<div id="wpfa-17738" class="wpforo-attached-file"><a class="wpforo-default-attachment" href="//mmlab.snu.ac.kr/wp-content/uploads/wpforo/default_attachments/1773201556-223600a004_v10.pdf" target="_blank" title="223600a004_v1.0.pdf"><i class="fas fa-paperclip"></i>&nbsp;223600a004_v1.0.pdf</a></div>]]></content:encoded>
						                            <category domain="https://mmlab.snu.ac.kr/community/seminar/">Seminar</category>                        <dc:creator>황은비</dc:creator>
                        <guid isPermaLink="true">https://mmlab.snu.ac.kr/community/seminar/2026-03-11-resolution-without-dissent-in-path-per-query-sanitization-to-defeat-surreptitious-communication-over-dns/</guid>
                    </item>
				                    <item>
                        <title> Protecting wi-fi beacons from outsider forgeries</title>
                        <link>https://mmlab.snu.ac.kr/community/seminar/2026-03-04-protecting-wi-fi-beacons-from-outsider-forgeries/</link>
                        <pubDate>Fri, 27 Feb 2026 03:51:59 +0000</pubDate>
                        <description><![CDATA[Abstract
All Wi-Fi networks periodically broadcast beacons to announce their presence to nearby clients. These beacons contain various properties of the network, including dynamic informati...]]></description>
                        <content:encoded><![CDATA[<p>Abstract</p>
<p><span>All Wi-Fi networks periodically broadcast beacons to announce their presence to nearby clients. These beacons contain various properties of the network, including dynamic information to manage the behavior of clients. We first show that an adversary can forge beacons to carry out various known as well as novel attacks. Motivated by these attacks, we propose a scheme to authenticate beacon frames that is efficient and has low bandwidth overhead. We evaluate the security properties of this scheme, and discuss its current implementation in Linux. By collaborating with industry partners, our scheme also got incorporated into the draft 802.11 standard, increasing the chance of it being implemented by vendors.</span></p>
<div id="wpfa-17691" class="wpforo-attached-file"><a class="wpforo-default-attachment" title="ProtectingWiFiBeacon.pdf" href="//mmlab.snu.ac.kr/wp-content/uploads/wpforo/default_attachments/1772164319-ProtectingWiFiBeacon.pdf" target="_blank" rel="noopener"><i class="fas fa-paperclip"></i> ProtectingWiFiBeacon.pdf</a></div>
<div id="wpfa-17720" class="wpforo-attached-file"><a class="wpforo-default-attachment" title="jblee_ProtectingWi-FiBeacons.pptx" href="//mmlab.snu.ac.kr/wp-content/uploads/wpforo/default_attachments/1772592721-jblee_ProtectingWi-FiBeacons.pptx" target="_blank" rel="noopener"><i class="fas fa-paperclip"></i> jblee_ProtectingWi-FiBeacons.pptx</a></div>
<div id="wpfa-17721" class="wpforo-attached-file"><a class="wpforo-default-attachment" href="//mmlab.snu.ac.kr/wp-content/uploads/wpforo/default_attachments/1772592738-jblee_ProtectingWi-FiBeacons.pdf" target="_blank" title="jblee_ProtectingWi-FiBeacons.pdf"><i class="fas fa-paperclip"></i>&nbsp;jblee_ProtectingWi-FiBeacons.pdf</a></div>]]></content:encoded>
						                            <category domain="https://mmlab.snu.ac.kr/community/seminar/">Seminar</category>                        <dc:creator>이정범</dc:creator>
                        <guid isPermaLink="true">https://mmlab.snu.ac.kr/community/seminar/2026-03-04-protecting-wi-fi-beacons-from-outsider-forgeries/</guid>
                    </item>
				                    <item>
                        <title> Prompt Injection Attack to Tool Selection in LLM Agents</title>
                        <link>https://mmlab.snu.ac.kr/community/seminar/2026-02-25-prompt-injection-attack-to-tool-selection-in-llm-agents/</link>
                        <pubDate>Tue, 24 Feb 2026 07:55:02 +0000</pubDate>
                        <description><![CDATA[메인 세미나 발표자료 첨부합니다.
 260225_메인세미나_Prompt-Injection-Attack-to-Tool-Selection-in-LLM-Agents_제출용.pdf
&nbsp;260225_메인세미나_Prompt-Injection-Attack-to-Tool-Selection-in-LLM-Agents_제출용.pptx]]></description>
                        <content:encoded><![CDATA[<p>메인 세미나 발표자료 첨부합니다.</p>
<div id="wpfa-17676" class="wpforo-attached-file"><a class="wpforo-default-attachment" title="260225_메인세미나_Prompt-Injection-Attack-to-Tool-Selection-in-LLM-Agents_제출용.pdf" href="//mmlab.snu.ac.kr/wp-content/uploads/wpforo/default_attachments/1771919702-260225__Prompt-Injection-Attack-to-Tool-Selection-in-LLM-Agents_.pdf" target="_blank" rel="noopener"><i class="fas fa-paperclip"></i> 260225_메인세미나_Prompt-Injection-Attack-to-Tool-Selection-in-LLM-Agents_제출용.pdf</a></div>
<div id="wpfa-17677" class="wpforo-attached-file"><a class="wpforo-default-attachment" href="//mmlab.snu.ac.kr/wp-content/uploads/wpforo/default_attachments/1771919736-260225__Prompt-Injection-Attack-to-Tool-Selection-in-LLM-Agents_.pptx" target="_blank" title="260225_메인세미나_Prompt-Injection-Attack-to-Tool-Selection-in-LLM-Agents_제출용.pptx"><i class="fas fa-paperclip"></i>&nbsp;260225_메인세미나_Prompt-Injection-Attack-to-Tool-Selection-in-LLM-Agents_제출용.pptx</a></div>]]></content:encoded>
						                            <category domain="https://mmlab.snu.ac.kr/community/seminar/">Seminar</category>                        <dc:creator>정경헌</dc:creator>
                        <guid isPermaLink="true">https://mmlab.snu.ac.kr/community/seminar/2026-02-25-prompt-injection-attack-to-tool-selection-in-llm-agents/</guid>
                    </item>
				                    <item>
                        <title> Cryptographically-Secured Domain Validation</title>
                        <link>https://mmlab.snu.ac.kr/community/seminar/2026-02-11-cryptographically-secured-domain-validation/</link>
                        <pubDate>Thu, 12 Feb 2026 02:12:28 +0000</pubDate>
                        <description><![CDATA[어제 메인세미나 발표자료 첨부합니다.
&nbsp;ms16_hskim_260211_v1.0.pdf]]></description>
                        <content:encoded><![CDATA[<p>어제 메인세미나 발표자료 첨부합니다.</p>
<div id="wpfa-17649" class="wpforo-attached-file"><a class="wpforo-default-attachment" href="//mmlab.snu.ac.kr/wp-content/uploads/wpforo/default_attachments/1770862348-ms16_hskim_260211_v10.pdf" target="_blank" title="ms16_hskim_260211_v1.0.pdf"><i class="fas fa-paperclip"></i>&nbsp;ms16_hskim_260211_v1.0.pdf</a></div>]]></content:encoded>
						                            <category domain="https://mmlab.snu.ac.kr/community/seminar/">Seminar</category>                        <dc:creator>김현수</dc:creator>
                        <guid isPermaLink="true">https://mmlab.snu.ac.kr/community/seminar/2026-02-11-cryptographically-secured-domain-validation/</guid>
                    </item>
				                    <item>
                        <title> The Emerged Security and Privacy of LLM Agent: A Survey with Case Studies</title>
                        <link>https://mmlab.snu.ac.kr/community/seminar/2026-01-21-the-emerged-security-and-privacy-of-llm-agent-a-survey-with-case-studies/</link>
                        <pubDate>Wed, 14 Jan 2026 12:11:07 +0000</pubDate>
                        <description><![CDATA[Abstract
Inspired by the rapid development of Large Language Models (LLMs), LLM agents have evolved to perform complex tasks. LLM agents are now extensively applied across various domains, ...]]></description>
                        <content:encoded><![CDATA[<p><strong>Abstract</strong></p>
<p><span>Inspired by the rapid development of Large Language Models (LLMs), LLM agents have evolved to perform complex tasks. LLM agents are now extensively applied across various domains, handling vast amounts of data to interact with humans and execute tasks. The widespread applications of LLM agents demonstrate their significant commercial value; however, they also expose security and privacy vulnerabilities. At the current stage, comprehensive research on the security and privacy of LLM agents is highly needed. This survey aims to provide a comprehensive overview of the newly emerged privacy and security issues faced by LLM agents. We begin by introducing the fundamental knowledge of LLM agents, followed by a categorization and analysis of the threats. We then discuss the impacts of these threats on humans, environment, and other agents. Subsequently, we review existing defensive strategies, and finally explore future trends. Additionally, the survey incorporates diverse case studies to facilitate a more accessible understanding. By highlighting these critical security and privacy issues, the survey seeks to stimulate future research towards enhancing the security and privacy of LLM agents, thereby increasing their reliability and trustworthiness in future applications.</span></p>
<p><strong>Summary</strong></p>
<p><a class="wpforo-default-attachment" title="The-Emerged-Security-and-Privacy-of-LLM-Agent-A-Survey-with-Case-Studies_pub.pptx" href="//mmlab.snu.ac.kr/wp-content/uploads/wpforo/default_attachments/1770175408-The-Emerged-Security-and-Privacy-of-LLM-Agent-A-Survey-with-Case-Studies_pub.pptx" target="_blank" rel="noopener"> The-Emerged-Security-and-Privacy-of-LLM-Agent-A-Survey-with-Case-Studies_pub.pptx</a></p>
<p><strong>Paper </strong></p>
<div id="wpfa-17581" class="wpforo-attached-file"><a class="wpforo-default-attachment" title="The-Emerged-Security-and-Privacy-of-LLM-Agent-Survey-with-Case-Studies.pdf" href="//mmlab.snu.ac.kr/wp-content/uploads/wpforo/default_attachments/1768392667-The-Emerged-Security-and-Privacy-of-LLM-Agent-Survey-with-Case-Studies.pdf" target="_blank" rel="noopener"><i class="fas fa-paperclip"></i> The-Emerged-Security-and-Privacy-of-LLM-Agent-Survey-with-Case-Studies.pdf</a></div>]]></content:encoded>
						                            <category domain="https://mmlab.snu.ac.kr/community/seminar/">Seminar</category>                        <dc:creator>임상원</dc:creator>
                        <guid isPermaLink="true">https://mmlab.snu.ac.kr/community/seminar/2026-01-21-the-emerged-security-and-privacy-of-llm-agent-a-survey-with-case-studies/</guid>
                    </item>
				                    <item>
                        <title> CVEfixes: Automated Collection of Vulnerabilities and TheirFixes from Open-Source Software</title>
                        <link>https://mmlab.snu.ac.kr/community/seminar/2026-01-14-cvefixes-automated-collection-of-vulnerabilities-and-theirfixes-from-open-source-software/</link>
                        <pubDate>Wed, 14 Jan 2026 04:58:26 +0000</pubDate>
                        <description><![CDATA[Abstract:
Data-driven research on the automated discovery and repair of security vulnerabilities in source code requires comprehensive datasetsof real-life vulnerable code and their fixes. ...]]></description>
                        <content:encoded><![CDATA[<p><span>Abstract:</span></p>
<p>Data-driven research on the automated discovery and repair of security vulnerabilities in source code requires comprehensive datasets<br />of real-life vulnerable code and their fixes. To assist in such research, we propose a method to automatically collect and curate a comprehensive vulnerability dataset from Common Vulnerabilities and Exposures (CVE) records in the public National Vulnerability Database (NVD). We implement our approach in a fully automated dataset collection tool and share an initial release of the resulting vulnerability dataset named CVEfixes. The CVEfixes collection tool automatically fetches all available CVE records from the NVD, gathers the vulnerable code and corresponding fixes from associated open-source repositories, and organizes the collected information in a relational database. Moreover, the dataset is enriched with meta-data such as programming language, and detailed code and security metrics at five levels of abstraction. The collection can easily be repeated to keep up-to date with newly discovered or patched vulnerabilities. The initial release of CVEfixes spans all published CVEs up to 9 June 2021 covering 5365 CVE records for 1754 open-source projects that were addressed in a total of 5495 vulnerability fixing commits. CVEfixes supports various types of data-driven software security research, such as vulnerability prediction, vulnerability classification, vulnerability severity prediction, analysis of vulnerabilityrelated code changes, and automated vulnerability repair.</p>
<p>&nbsp;</p>
<div id="wpfa-17579" class="wpforo-attached-file"><a class="wpforo-default-attachment" title="20260114_CVEfixes_huko_vfin.pptx" href="//mmlab.snu.ac.kr/wp-content/uploads/wpforo/default_attachments/1768366706-20260114_CVEfixes_huko_vfin.pptx" target="_blank" rel="noopener"><i class="fas fa-paperclip"></i> 20260114_CVEfixes_huko_vfin.pptx</a></div>
<div id="wpfa-17580" class="wpforo-attached-file"><a class="wpforo-default-attachment" href="//mmlab.snu.ac.kr/wp-content/uploads/wpforo/default_attachments/1768366786-cvefixes.pdf" target="_blank" title="cvefixes.pdf"><i class="fas fa-paperclip"></i>&nbsp;cvefixes.pdf</a></div>]]></content:encoded>
						                            <category domain="https://mmlab.snu.ac.kr/community/seminar/">Seminar</category>                        <dc:creator>고형욱</dc:creator>
                        <guid isPermaLink="true">https://mmlab.snu.ac.kr/community/seminar/2026-01-14-cvefixes-automated-collection-of-vulnerabilities-and-theirfixes-from-open-source-software/</guid>
                    </item>
				                    <item>
                        <title> Universal Cross-app Attacks: Exploiting and Securing OAuth 2.0 in Integration Platforms</title>
                        <link>https://mmlab.snu.ac.kr/community/seminar/2026-01-07-universal-cross-app-attacks-exploiting-and-securing-oauth-2-0-in-integration-platforms/</link>
                        <pubDate>Wed, 07 Jan 2026 02:28:58 +0000</pubDate>
                        <description><![CDATA[AbstractIntegration Platforms such as Workflow Automation Platforms, Virtual Assistants and Smart Homes are becoming an integral part of the Internet. These platforms welcome third-parties t...]]></description>
                        <content:encoded><![CDATA[<p>Abstract<br /><br />Integration Platforms such as Workflow Automation Platforms, Virtual Assistants and Smart Homes are becoming an integral part of the Internet. These platforms welcome third-parties to develop and distribute apps in their open marketplaces, and support "account linking" to connect end-users' app accounts to their platform account. This enables the platform to orchestrate a wide range of external services on behalf of the end-users. While OAuth is the de facto standard for account linking, the open nature of integration platforms poses new threats, as their OAuth architecture could be exploited by untrusted integrated apps.<br /><br />In this paper, we examine the flawed designs of multi-app OAuth authorizations that support account linking in integration platforms. We unveil two new platform-wide attacks due to the lack of app differentiation: Cross-app OAuth Account Takeover (COAT) and Request Forgery (CORF). As long as a victim end-user establishes account linking with a malicious app, or potentially with just a click on a crafted link, they risk unauthorized access or privacy leakage of any apps on the platform.<br /><br />To facilitate systematic discovery of vulnerabilities, we develop COVScan, a semi-automated black-box testing tool that profiles varied OAuth designs to identify cross-app vulnerabilities in real-world platforms. Our measurement study reveals that among 18 popular consumer- or enterprise-facing integration platforms, 11 are vulnerable to COAT and another 5 to CORF, including those built by Microsoft, Google and Amazon. The vulnerabilities render widespread impact, leading to unauthorized control over end-users' services and devices, covert logging of sensitive information, and compromising a major ecosystem in single click (a CVE with CVSS 9.6). We responsibly reported the vulnerabilities and collaborated with the affected vendors to deploy comprehensive solutions.<br /><br /><br />For more information, see:<br />https://www.usenix.org/conference/usenixsecurity25/presentation/luo-kaixuan</p>
<div id="wpfa-17558" class="wpforo-attached-file"><a class="wpforo-default-attachment" title="260107_sec25-luo_jhnam.pdf" href="//mmlab.snu.ac.kr/wp-content/uploads/wpforo/default_attachments/1767752938-260107_sec25-luo_jhnam.pdf" target="_blank" rel="noopener"><i class="fas fa-paperclip"></i> 260107_sec25-luo_jhnam.pdf</a></div>
<div id="wpfa-17559" class="wpforo-attached-file"><a class="wpforo-default-attachment" title="260107_sec25-luo_jhnam.key" href="//mmlab.snu.ac.kr/wp-content/uploads/wpforo/default_attachments/1767753039-260107_sec25-luo_jhnam.key" target="_blank" rel="noopener"><i class="fas fa-paperclip"></i> 260107_sec25-luo_jhnam.key</a></div>
<div id="wpfa-17562" class="wpforo-attached-file"><a class="wpforo-default-attachment" href="//mmlab.snu.ac.kr/wp-content/uploads/wpforo/default_attachments/1767778394-260107_sec25-luo_jhnam.pptx" target="_blank" title="260107_sec25-luo_jhnam.pptx"><i class="fas fa-paperclip"></i>&nbsp;260107_sec25-luo_jhnam.pptx</a></div>]]></content:encoded>
						                            <category domain="https://mmlab.snu.ac.kr/community/seminar/">Seminar</category>                        <dc:creator>남재호</dc:creator>
                        <guid isPermaLink="true">https://mmlab.snu.ac.kr/community/seminar/2026-01-07-universal-cross-app-attacks-exploiting-and-securing-oauth-2-0-in-integration-platforms/</guid>
                    </item>
							        </channel>
        </rss>
		