<?xml version="1.0" encoding="UTF-8"?>        <rss version="2.0"
             xmlns:atom="http://www.w3.org/2005/Atom"
             xmlns:dc="http://purl.org/dc/elements/1.1/"
             xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
             xmlns:admin="http://webns.net/mvcb/"
             xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
             xmlns:content="http://purl.org/rss/1.0/modules/content/">
        <channel>
            <title>
									Seminar - MMLAB Forum				            </title>
            <link>https://mmlab.snu.ac.kr/community/seminar/</link>
            <description>MMLAB Discussion Board</description>
            <language>ko-KR</language>
            <lastBuildDate>Tue, 10 Mar 2026 15:35:36 +0000</lastBuildDate>
            <generator>wpForo</generator>
            <ttl>60</ttl>
							                    <item>
                        <title> Protecting wi-fi beacons from outsider forgeries</title>
                        <link>https://mmlab.snu.ac.kr/community/seminar/2026-03-04-protecting-wi-fi-beacons-from-outsider-forgeries/</link>
                        <pubDate>Fri, 27 Feb 2026 03:51:59 +0000</pubDate>
                        <description><![CDATA[Abstract
All Wi-Fi networks periodically broadcast beacons to announce their presence to nearby clients. These beacons contain various properties of the network, including dynamic informati...]]></description>
                        <content:encoded><![CDATA[<p>Abstract</p>
<p><span>All Wi-Fi networks periodically broadcast beacons to announce their presence to nearby clients. These beacons contain various properties of the network, including dynamic information to manage the behavior of clients. We first show that an adversary can forge beacons to carry out various known as well as novel attacks. Motivated by these attacks, we propose a scheme to authenticate beacon frames that is efficient and has low bandwidth overhead. We evaluate the security properties of this scheme, and discuss its current implementation in Linux. By collaborating with industry partners, our scheme also got incorporated into the draft 802.11 standard, increasing the chance of it being implemented by vendors.</span></p>
<div id="wpfa-17691" class="wpforo-attached-file"><a class="wpforo-default-attachment" title="ProtectingWiFiBeacon.pdf" href="//mmlab.snu.ac.kr/wp-content/uploads/wpforo/default_attachments/1772164319-ProtectingWiFiBeacon.pdf" target="_blank" rel="noopener"><i class="fas fa-paperclip"></i> ProtectingWiFiBeacon.pdf</a></div>
<div id="wpfa-17720" class="wpforo-attached-file"><a class="wpforo-default-attachment" title="jblee_ProtectingWi-FiBeacons.pptx" href="//mmlab.snu.ac.kr/wp-content/uploads/wpforo/default_attachments/1772592721-jblee_ProtectingWi-FiBeacons.pptx" target="_blank" rel="noopener"><i class="fas fa-paperclip"></i> jblee_ProtectingWi-FiBeacons.pptx</a></div>
<div id="wpfa-17721" class="wpforo-attached-file"><a class="wpforo-default-attachment" href="//mmlab.snu.ac.kr/wp-content/uploads/wpforo/default_attachments/1772592738-jblee_ProtectingWi-FiBeacons.pdf" target="_blank" title="jblee_ProtectingWi-FiBeacons.pdf"><i class="fas fa-paperclip"></i>&nbsp;jblee_ProtectingWi-FiBeacons.pdf</a></div>]]></content:encoded>
						                            <category domain="https://mmlab.snu.ac.kr/community/seminar/">Seminar</category>                        <dc:creator>이정범</dc:creator>
                        <guid isPermaLink="true">https://mmlab.snu.ac.kr/community/seminar/2026-03-04-protecting-wi-fi-beacons-from-outsider-forgeries/</guid>
                    </item>
				                    <item>
                        <title> Prompt Injection Attack to Tool Selection in LLM Agents</title>
                        <link>https://mmlab.snu.ac.kr/community/seminar/2026-02-25-prompt-injection-attack-to-tool-selection-in-llm-agents/</link>
                        <pubDate>Tue, 24 Feb 2026 07:55:02 +0000</pubDate>
                        <description><![CDATA[메인 세미나 발표자료 첨부합니다.
 260225_메인세미나_Prompt-Injection-Attack-to-Tool-Selection-in-LLM-Agents_제출용.pdf
&nbsp;260225_메인세미나_Prompt-Injection-Attack-to-Tool-Selection-in-LLM-Agents_제출용.pptx]]></description>
                        <content:encoded><![CDATA[<p>메인 세미나 발표자료 첨부합니다.</p>
<div id="wpfa-17676" class="wpforo-attached-file"><a class="wpforo-default-attachment" title="260225_메인세미나_Prompt-Injection-Attack-to-Tool-Selection-in-LLM-Agents_제출용.pdf" href="//mmlab.snu.ac.kr/wp-content/uploads/wpforo/default_attachments/1771919702-260225__Prompt-Injection-Attack-to-Tool-Selection-in-LLM-Agents_.pdf" target="_blank" rel="noopener"><i class="fas fa-paperclip"></i> 260225_메인세미나_Prompt-Injection-Attack-to-Tool-Selection-in-LLM-Agents_제출용.pdf</a></div>
<div id="wpfa-17677" class="wpforo-attached-file"><a class="wpforo-default-attachment" href="//mmlab.snu.ac.kr/wp-content/uploads/wpforo/default_attachments/1771919736-260225__Prompt-Injection-Attack-to-Tool-Selection-in-LLM-Agents_.pptx" target="_blank" title="260225_메인세미나_Prompt-Injection-Attack-to-Tool-Selection-in-LLM-Agents_제출용.pptx"><i class="fas fa-paperclip"></i>&nbsp;260225_메인세미나_Prompt-Injection-Attack-to-Tool-Selection-in-LLM-Agents_제출용.pptx</a></div>]]></content:encoded>
						                            <category domain="https://mmlab.snu.ac.kr/community/seminar/">Seminar</category>                        <dc:creator>정경헌</dc:creator>
                        <guid isPermaLink="true">https://mmlab.snu.ac.kr/community/seminar/2026-02-25-prompt-injection-attack-to-tool-selection-in-llm-agents/</guid>
                    </item>
				                    <item>
                        <title> Cryptographically-Secured Domain Validation</title>
                        <link>https://mmlab.snu.ac.kr/community/seminar/2026-02-11-cryptographically-secured-domain-validation/</link>
                        <pubDate>Thu, 12 Feb 2026 02:12:28 +0000</pubDate>
                        <description><![CDATA[어제 메인세미나 발표자료 첨부합니다.
&nbsp;ms16_hskim_260211_v1.0.pdf]]></description>
                        <content:encoded><![CDATA[<p>어제 메인세미나 발표자료 첨부합니다.</p>
<div id="wpfa-17649" class="wpforo-attached-file"><a class="wpforo-default-attachment" href="//mmlab.snu.ac.kr/wp-content/uploads/wpforo/default_attachments/1770862348-ms16_hskim_260211_v10.pdf" target="_blank" title="ms16_hskim_260211_v1.0.pdf"><i class="fas fa-paperclip"></i>&nbsp;ms16_hskim_260211_v1.0.pdf</a></div>]]></content:encoded>
						                            <category domain="https://mmlab.snu.ac.kr/community/seminar/">Seminar</category>                        <dc:creator>김현수</dc:creator>
                        <guid isPermaLink="true">https://mmlab.snu.ac.kr/community/seminar/2026-02-11-cryptographically-secured-domain-validation/</guid>
                    </item>
				                    <item>
                        <title> The Emerged Security and Privacy of LLM Agent: A Survey with Case Studies</title>
                        <link>https://mmlab.snu.ac.kr/community/seminar/2026-01-21-the-emerged-security-and-privacy-of-llm-agent-a-survey-with-case-studies/</link>
                        <pubDate>Wed, 14 Jan 2026 12:11:07 +0000</pubDate>
                        <description><![CDATA[Abstract
Inspired by the rapid development of Large Language Models (LLMs), LLM agents have evolved to perform complex tasks. LLM agents are now extensively applied across various domains, ...]]></description>
                        <content:encoded><![CDATA[<p><strong>Abstract</strong></p>
<p><span>Inspired by the rapid development of Large Language Models (LLMs), LLM agents have evolved to perform complex tasks. LLM agents are now extensively applied across various domains, handling vast amounts of data to interact with humans and execute tasks. The widespread applications of LLM agents demonstrate their significant commercial value; however, they also expose security and privacy vulnerabilities. At the current stage, comprehensive research on the security and privacy of LLM agents is highly needed. This survey aims to provide a comprehensive overview of the newly emerged privacy and security issues faced by LLM agents. We begin by introducing the fundamental knowledge of LLM agents, followed by a categorization and analysis of the threats. We then discuss the impacts of these threats on humans, environment, and other agents. Subsequently, we review existing defensive strategies, and finally explore future trends. Additionally, the survey incorporates diverse case studies to facilitate a more accessible understanding. By highlighting these critical security and privacy issues, the survey seeks to stimulate future research towards enhancing the security and privacy of LLM agents, thereby increasing their reliability and trustworthiness in future applications.</span></p>
<p><strong>Summary</strong></p>
<p><a class="wpforo-default-attachment" title="The-Emerged-Security-and-Privacy-of-LLM-Agent-A-Survey-with-Case-Studies_pub.pptx" href="//mmlab.snu.ac.kr/wp-content/uploads/wpforo/default_attachments/1770175408-The-Emerged-Security-and-Privacy-of-LLM-Agent-A-Survey-with-Case-Studies_pub.pptx" target="_blank" rel="noopener"> The-Emerged-Security-and-Privacy-of-LLM-Agent-A-Survey-with-Case-Studies_pub.pptx</a></p>
<p><strong>Paper </strong></p>
<div id="wpfa-17581" class="wpforo-attached-file"><a class="wpforo-default-attachment" title="The-Emerged-Security-and-Privacy-of-LLM-Agent-Survey-with-Case-Studies.pdf" href="//mmlab.snu.ac.kr/wp-content/uploads/wpforo/default_attachments/1768392667-The-Emerged-Security-and-Privacy-of-LLM-Agent-Survey-with-Case-Studies.pdf" target="_blank" rel="noopener"><i class="fas fa-paperclip"></i> The-Emerged-Security-and-Privacy-of-LLM-Agent-Survey-with-Case-Studies.pdf</a></div>]]></content:encoded>
						                            <category domain="https://mmlab.snu.ac.kr/community/seminar/">Seminar</category>                        <dc:creator>임상원</dc:creator>
                        <guid isPermaLink="true">https://mmlab.snu.ac.kr/community/seminar/2026-01-21-the-emerged-security-and-privacy-of-llm-agent-a-survey-with-case-studies/</guid>
                    </item>
				                    <item>
                        <title> CVEfixes: Automated Collection of Vulnerabilities and TheirFixes from Open-Source Software</title>
                        <link>https://mmlab.snu.ac.kr/community/seminar/2026-01-14-cvefixes-automated-collection-of-vulnerabilities-and-theirfixes-from-open-source-software/</link>
                        <pubDate>Wed, 14 Jan 2026 04:58:26 +0000</pubDate>
                        <description><![CDATA[Abstract:
Data-driven research on the automated discovery and repair of security vulnerabilities in source code requires comprehensive datasetsof real-life vulnerable code and their fixes. ...]]></description>
                        <content:encoded><![CDATA[<p><span>Abstract:</span></p>
<p>Data-driven research on the automated discovery and repair of security vulnerabilities in source code requires comprehensive datasets<br />of real-life vulnerable code and their fixes. To assist in such research, we propose a method to automatically collect and curate a comprehensive vulnerability dataset from Common Vulnerabilities and Exposures (CVE) records in the public National Vulnerability Database (NVD). We implement our approach in a fully automated dataset collection tool and share an initial release of the resulting vulnerability dataset named CVEfixes. The CVEfixes collection tool automatically fetches all available CVE records from the NVD, gathers the vulnerable code and corresponding fixes from associated open-source repositories, and organizes the collected information in a relational database. Moreover, the dataset is enriched with meta-data such as programming language, and detailed code and security metrics at five levels of abstraction. The collection can easily be repeated to keep up-to date with newly discovered or patched vulnerabilities. The initial release of CVEfixes spans all published CVEs up to 9 June 2021 covering 5365 CVE records for 1754 open-source projects that were addressed in a total of 5495 vulnerability fixing commits. CVEfixes supports various types of data-driven software security research, such as vulnerability prediction, vulnerability classification, vulnerability severity prediction, analysis of vulnerabilityrelated code changes, and automated vulnerability repair.</p>
<p>&nbsp;</p>
<div id="wpfa-17579" class="wpforo-attached-file"><a class="wpforo-default-attachment" title="20260114_CVEfixes_huko_vfin.pptx" href="//mmlab.snu.ac.kr/wp-content/uploads/wpforo/default_attachments/1768366706-20260114_CVEfixes_huko_vfin.pptx" target="_blank" rel="noopener"><i class="fas fa-paperclip"></i> 20260114_CVEfixes_huko_vfin.pptx</a></div>
<div id="wpfa-17580" class="wpforo-attached-file"><a class="wpforo-default-attachment" href="//mmlab.snu.ac.kr/wp-content/uploads/wpforo/default_attachments/1768366786-cvefixes.pdf" target="_blank" title="cvefixes.pdf"><i class="fas fa-paperclip"></i>&nbsp;cvefixes.pdf</a></div>]]></content:encoded>
						                            <category domain="https://mmlab.snu.ac.kr/community/seminar/">Seminar</category>                        <dc:creator>고형욱</dc:creator>
                        <guid isPermaLink="true">https://mmlab.snu.ac.kr/community/seminar/2026-01-14-cvefixes-automated-collection-of-vulnerabilities-and-theirfixes-from-open-source-software/</guid>
                    </item>
				                    <item>
                        <title> Universal Cross-app Attacks: Exploiting and Securing OAuth 2.0 in Integration Platforms</title>
                        <link>https://mmlab.snu.ac.kr/community/seminar/2026-01-07-universal-cross-app-attacks-exploiting-and-securing-oauth-2-0-in-integration-platforms/</link>
                        <pubDate>Wed, 07 Jan 2026 02:28:58 +0000</pubDate>
                        <description><![CDATA[AbstractIntegration Platforms such as Workflow Automation Platforms, Virtual Assistants and Smart Homes are becoming an integral part of the Internet. These platforms welcome third-parties t...]]></description>
                        <content:encoded><![CDATA[<p>Abstract<br /><br />Integration Platforms such as Workflow Automation Platforms, Virtual Assistants and Smart Homes are becoming an integral part of the Internet. These platforms welcome third-parties to develop and distribute apps in their open marketplaces, and support "account linking" to connect end-users' app accounts to their platform account. This enables the platform to orchestrate a wide range of external services on behalf of the end-users. While OAuth is the de facto standard for account linking, the open nature of integration platforms poses new threats, as their OAuth architecture could be exploited by untrusted integrated apps.<br /><br />In this paper, we examine the flawed designs of multi-app OAuth authorizations that support account linking in integration platforms. We unveil two new platform-wide attacks due to the lack of app differentiation: Cross-app OAuth Account Takeover (COAT) and Request Forgery (CORF). As long as a victim end-user establishes account linking with a malicious app, or potentially with just a click on a crafted link, they risk unauthorized access or privacy leakage of any apps on the platform.<br /><br />To facilitate systematic discovery of vulnerabilities, we develop COVScan, a semi-automated black-box testing tool that profiles varied OAuth designs to identify cross-app vulnerabilities in real-world platforms. Our measurement study reveals that among 18 popular consumer- or enterprise-facing integration platforms, 11 are vulnerable to COAT and another 5 to CORF, including those built by Microsoft, Google and Amazon. The vulnerabilities render widespread impact, leading to unauthorized control over end-users' services and devices, covert logging of sensitive information, and compromising a major ecosystem in single click (a CVE with CVSS 9.6). We responsibly reported the vulnerabilities and collaborated with the affected vendors to deploy comprehensive solutions.<br /><br /><br />For more information, see:<br />https://www.usenix.org/conference/usenixsecurity25/presentation/luo-kaixuan</p>
<div id="wpfa-17558" class="wpforo-attached-file"><a class="wpforo-default-attachment" title="260107_sec25-luo_jhnam.pdf" href="//mmlab.snu.ac.kr/wp-content/uploads/wpforo/default_attachments/1767752938-260107_sec25-luo_jhnam.pdf" target="_blank" rel="noopener"><i class="fas fa-paperclip"></i> 260107_sec25-luo_jhnam.pdf</a></div>
<div id="wpfa-17559" class="wpforo-attached-file"><a class="wpforo-default-attachment" title="260107_sec25-luo_jhnam.key" href="//mmlab.snu.ac.kr/wp-content/uploads/wpforo/default_attachments/1767753039-260107_sec25-luo_jhnam.key" target="_blank" rel="noopener"><i class="fas fa-paperclip"></i> 260107_sec25-luo_jhnam.key</a></div>
<div id="wpfa-17562" class="wpforo-attached-file"><a class="wpforo-default-attachment" href="//mmlab.snu.ac.kr/wp-content/uploads/wpforo/default_attachments/1767778394-260107_sec25-luo_jhnam.pptx" target="_blank" title="260107_sec25-luo_jhnam.pptx"><i class="fas fa-paperclip"></i>&nbsp;260107_sec25-luo_jhnam.pptx</a></div>]]></content:encoded>
						                            <category domain="https://mmlab.snu.ac.kr/community/seminar/">Seminar</category>                        <dc:creator>남재호</dc:creator>
                        <guid isPermaLink="true">https://mmlab.snu.ac.kr/community/seminar/2026-01-07-universal-cross-app-attacks-exploiting-and-securing-oauth-2-0-in-integration-platforms/</guid>
                    </item>
				                    <item>
                        <title> PIANO: Extremely Simple, Single-Server PIR with Sublinear Server Computation</title>
                        <link>https://mmlab.snu.ac.kr/community/seminar/2025-12-15-piano-extremely-simple-single-server-pir-with-sublinear-server-computation/</link>
                        <pubDate>Sun, 14 Dec 2025 18:59:27 +0000</pubDate>
                        <description><![CDATA[안녕하세요, 석사과정생 박홍근입니다.
&nbsp;
메인세미나 발표 자료 업로드 합니다.
Abstract:We construct a sublinear-time single-server preprocessing Private Information Retrieval (PIR) scheme with an optimal tradeoff bet...]]></description>
                        <content:encoded><![CDATA[<p>안녕하세요, 석사과정생 박홍근입니다.</p>
<p>&nbsp;</p>
<p>메인세미나 발표 자료 업로드 합니다.</p>
<p><span>Abstract:</span><br /><span>We construct a sublinear-time single-server preprocessing Private Information Retrieval (PIR) scheme with an optimal tradeoff between client storage and server computation (up to poly-logarithmic factors). Our scheme achieves amortized </span><span><span aria-hidden="true">~O(√n)</span></span><span> server and client computation and </span><span><span aria-hidden="true">O(√n)</span></span><span> online communication per query, and requires </span><span><span aria-hidden="true">~Oλ(√n)</span></span><span> client storage. Unlike prior single-server PIR schemes that rely on heavy cryptographic machinery such as Homomorphic Encryption, our scheme relies only on Pseudo-Random Functions (PRF). To the best of our knowledge, Piano is the first practical single-server sublinear-time PIR scheme, and we outperform the state-of-the-art single-server PIR by 10×-300×. In comparison with the best known two-server PIR scheme, Piano enjoys comparable performance but our construction is considerably simpler. Experimental results show that for a 100GB database and with 60ms round-trip latency, Piano achieves 93ms response time, while the best known prior scheme requires 11s or more.</span><br /><br /></p>
<p>&nbsp;</p>
<div id="wpfa-17513" class="wpforo-attached-file"><a class="wpforo-default-attachment" title="PIANO-Extremely-Simple-Single-Server-PIR-with-Sublinear-Server-Computation.pdf" href="//mmlab.snu.ac.kr/wp-content/uploads/wpforo/default_attachments/1765738806-PIANO-Extremely-Simple-Single-Server-PIR-with-Sublinear-Server-Computation.pdf" target="_blank" rel="noopener"><i class="fas fa-paperclip"></i> PIANO-Extremely-Simple-Single-Server-PIR-with-Sublinear-Server-Computation.pdf</a></div>
<div id="wpfa-17514" class="wpforo-attached-file"><a class="wpforo-default-attachment" title="251215_PIANO-Extremely-Simple-Single-Server-PIR-with-Sublinear-Server-Computation_hgpark_final.pdf" href="//mmlab.snu.ac.kr/wp-content/uploads/wpforo/default_attachments/1765749226-251215_PIANO-Extremely-Simple-Single-Server-PIR-with-Sublinear-Server-Computation_hgpark_final.pdf" target="_blank" rel="noopener"><i class="fas fa-paperclip"></i> 251215_PIANO-Extremely-Simple-Single-Server-PIR-with-Sublinear-Server-Computation_hgpark_final.pdf</a></div>
<div id="wpfa-17515" class="wpforo-attached-file"><a class="wpforo-default-attachment" href="//mmlab.snu.ac.kr/wp-content/uploads/wpforo/default_attachments/1765749239-251215_PIANO-Extremely-Simple-Single-Server-PIR-with-Sublinear-Server-Computation_hgpark_final.pptx" target="_blank" title="251215_PIANO-Extremely-Simple-Single-Server-PIR-with-Sublinear-Server-Computation_hgpark_final.pptx"><i class="fas fa-paperclip"></i>&nbsp;251215_PIANO-Extremely-Simple-Single-Server-PIR-with-Sublinear-Server-Computation_hgpark_final.pptx</a></div>]]></content:encoded>
						                            <category domain="https://mmlab.snu.ac.kr/community/seminar/">Seminar</category>                        <dc:creator>박홍근</dc:creator>
                        <guid isPermaLink="true">https://mmlab.snu.ac.kr/community/seminar/2025-12-15-piano-extremely-simple-single-server-pir-with-sublinear-server-computation/</guid>
                    </item>
				                    <item>
                        <title> Forward to Hell? On the Potentials of Misusing Transparent DNS Forwarders in Reflective Amplification Attacks</title>
                        <link>https://mmlab.snu.ac.kr/community/seminar/2025-12-01-forward-to-hell-on-the-potentials-of-misusing-transparent-dns-forwarders-in-reflective-amplification-attacks/</link>
                        <pubDate>Mon, 01 Dec 2025 09:13:33 +0000</pubDate>
                        <description><![CDATA[발표 자료 첨부합니다. 감사합니다.
 Forward-to-Hell-On-the-Potentials-of-Misusing-Transparent-DNS-Forwarders-in-Reflective-Amplification-Attacks_v1.0.pdf
&nbsp;v2.0_ebhwang.pdf]]></description>
                        <content:encoded><![CDATA[<p>발표 자료 첨부합니다. 감사합니다.</p>
<div id="wpfa-17486" class="wpforo-attached-file"><a class="wpforo-default-attachment" title="Forward-to-Hell-On-the-Potentials-of-Misusing-Transparent-DNS-Forwarders-in-Reflective-Amplification-Attacks_v1.0.pdf" href="//mmlab.snu.ac.kr/wp-content/uploads/wpforo/default_attachments/1764580413-Forward-to-Hell-On-the-Potentials-of-Misusing-Transparent-DNS-Forwarders-in-Reflective-Amplification-Attacks_v10.pdf" target="_blank" rel="noopener"><i class="fas fa-paperclip"></i> Forward-to-Hell-On-the-Potentials-of-Misusing-Transparent-DNS-Forwarders-in-Reflective-Amplification-Attacks_v1.0.pdf</a></div>
<div id="wpfa-17487" class="wpforo-attached-file"><a class="wpforo-default-attachment" href="//mmlab.snu.ac.kr/wp-content/uploads/wpforo/default_attachments/1764580512-v20_ebhwang.pdf" target="_blank" title="v2.0_ebhwang.pdf"><i class="fas fa-paperclip"></i>&nbsp;v2.0_ebhwang.pdf</a></div>]]></content:encoded>
						                            <category domain="https://mmlab.snu.ac.kr/community/seminar/">Seminar</category>                        <dc:creator>황은비</dc:creator>
                        <guid isPermaLink="true">https://mmlab.snu.ac.kr/community/seminar/2025-12-01-forward-to-hell-on-the-potentials-of-misusing-transparent-dns-forwarders-in-reflective-amplification-attacks/</guid>
                    </item>
				                    <item>
                        <title> A Security Analysis of WPA3-PK: Implementation and Precomputation Attacks</title>
                        <link>https://mmlab.snu.ac.kr/community/seminar/2025-11-03-a-security-analysis-of-wpa3-pk-implementation-and-precomputation-attacks/</link>
                        <pubDate>Mon, 27 Oct 2025 02:27:35 +0000</pubDate>
                        <description><![CDATA[ACNS24
Abstract
Creating secure Wi-Fi hotspots has historically been challenging: when using an open network it is trivial for an adversary to eavesdrop traffic. Alternatively, when using ...]]></description>
                        <content:encoded><![CDATA[<p>ACNS24</p>
<p><br />Abstract</p>
<p>Creating secure Wi-Fi hotspots has historically been challenging: when using an open network it is trivial for an adversary to eavesdrop traffic. Alternatively, when using a password-protected network and sharing the password publicly, anyone who knows the password can create a rogue clone of the network to intercept traffic. To overcome this problem, the Wi-Fi Alliance released SAE-PK as part of an update to WPA3, which we will call WPA3-PK. In this protocol, a public key is used to verify the hotspot’s authenticity, and the password of the network encodes a fingerprint of this public key. As a result, someone who knows the password can no longer clone the network, because they do not know the corresponding private key.</p>
<p>In this paper, we systematically analyze the security of WPA3-PK. We first study implementations, where we show that the private WPA3-PK password gets leaked when using a flawed random number generator, and confirm that this may indeed happen in practice. We then study network aspects, where we show how a malicious insider can intercept the traffic of others. Our third focus is cryptographic attacks, where we perform an evaluation of time-memory trade-off attacks against WPA3-PK, and we optimize these attacks by combining the technique of rainbow tables with distinguished points. Additionally, we construct multi-network password collisions that allow an adversary to build a single rainbow table that can be used to attack multiple networks. Finally, we discuss defenses against our attacks and propose updates to the WPA3-PK standard</p>
<div id="wpfa-17404" class="wpforo-attached-file"><a class="wpforo-default-attachment" href="//mmlab.snu.ac.kr/wp-content/uploads/wpforo/default_attachments/1761532055-jblee_A-Security-Analysis-of-WPA3-PK.pdf" target="_blank" title="jblee_A-Security-Analysis-of-WPA3-PK.pdf"><i class="fas fa-paperclip"></i>&nbsp;jblee_A-Security-Analysis-of-WPA3-PK.pdf</a></div>]]></content:encoded>
						                            <category domain="https://mmlab.snu.ac.kr/community/seminar/">Seminar</category>                        <dc:creator>이정범</dc:creator>
                        <guid isPermaLink="true">https://mmlab.snu.ac.kr/community/seminar/2025-11-03-a-security-analysis-of-wpa3-pk-implementation-and-precomputation-attacks/</guid>
                    </item>
				                    <item>
                        <title> Catch Me If You Can: Covert Information Leakage from Drones using MAVLink Protocol</title>
                        <link>https://mmlab.snu.ac.kr/community/seminar/2025-10-13-catch-me-if-you-can-covert-information-leakage-from-drones-using-mavlink-protocol/</link>
                        <pubDate>Mon, 13 Oct 2025 09:21:20 +0000</pubDate>
                        <description><![CDATA[Abstract:
The number of applications of unmanned aerial vehicles (UAVs) (aka drones) is rapidly expanding. However, the wireless and broadcast nature of communications between the drones an...]]></description>
                        <content:encoded><![CDATA[<p>Abstract:</p>
<p><span>The number of applications of unmanned aerial vehicles (UAVs) (aka drones) is rapidly expanding. However, the wireless and broadcast nature of communications between the drones and their operators (i.e., Ground control station (GCS)) presents a risk for this channel to be exploited by outsiders. Specifically, an attacker can abuse benign communications as a cover to leak sensitive drone data secretly to nearby adversaries within the transmission range of a drone. Therefore, in this paper, we investigate the threat of information leakage through MAVLink, a drone control protocol that is widely used in the majority of drone autopilot systems and is considered a de-facto standard. We show that multiple covert channels can be created in MAVLink by exploiting its lack of security mechanisms, default broadcast messages, and redundant features. We design and implement the novel covert channels on a realistic drone testbed in practical settings and assess their feasibility. Our extensive results demonstrate that attackers can effectively exfiltrate different types of sensitive data from drones with a high throughput via MAVLink-based covert channels in the presence of an active warden at the GCS. Finally, we provide an in-depth analysis of several countermeasures for MAVLink-based covert channels to improve the protocol's security. To the best of our knowledge, this is the first work exploiting the popular MAVLink protocol for covert communications and demonstrating how it can be manipulated by the adversary for secret communications over commodity drones.</span></p>
<p>&nbsp;</p>
<div id="wpfa-17342" class="wpforo-attached-file"><a class="wpforo-default-attachment" title="ASIACCS-24-Catch-Me-If-You-Can_Covert-Information-Leakage-from-Drones-using-MAVLink-Protocol_swkang_20251013.pdf" href="//mmlab.snu.ac.kr/wp-content/uploads/wpforo/default_attachments/1760347280-ASIACCS-24-Catch-Me-If-You-Can_Covert-Information-Leakage-from-Drones-using-MAVLink-Protocol_swkang_20251013.pdf" target="_blank" rel="noopener"><i class="fas fa-paperclip"></i> ASIACCS-24-Catch-Me-If-You-Can_Covert-Information-Leakage-from-Drones-using-MAVLink-Protocol_swkang_20251013.pdf</a></div>
<div id="wpfa-17343" class="wpforo-attached-file"><a class="wpforo-default-attachment" title="ASIACCS-24-Catch-Me-If-You-Can_Covert-Information-Leakage-from-Drones-using-MAVLink-Protocol_swkang_20251013.pptx" href="//mmlab.snu.ac.kr/wp-content/uploads/wpforo/default_attachments/1760347308-ASIACCS-24-Catch-Me-If-You-Can_Covert-Information-Leakage-from-Drones-using-MAVLink-Protocol_swkang_20251013.pptx" target="_blank" rel="noopener"><i class="fas fa-paperclip"></i> ASIACCS-24-Catch-Me-If-You-Can_Covert-Information-Leakage-from-Drones-using-MAVLink-Protocol_swkang_20251013.pptx</a></div>
<div id="wpfa-17344" class="wpforo-attached-file"><a class="wpforo-default-attachment" href="//mmlab.snu.ac.kr/wp-content/uploads/wpforo/default_attachments/1760347322-ASIACCS-24-Catch-me-if-you-can_Covert-Information-Leakage-from-Drones-using-MAVLink-Protocol.pdf" target="_blank" title="ASIACCS-24-Catch-me-if-you-can_Covert-Information-Leakage-from-Drones-using-MAVLink-Protocol.pdf"><i class="fas fa-paperclip"></i>&nbsp;ASIACCS-24-Catch-me-if-you-can_Covert-Information-Leakage-from-Drones-using-MAVLink-Protocol.pdf</a></div>]]></content:encoded>
						                            <category domain="https://mmlab.snu.ac.kr/community/seminar/">Seminar</category>                        <dc:creator>강상위</dc:creator>
                        <guid isPermaLink="true">https://mmlab.snu.ac.kr/community/seminar/2025-10-13-catch-me-if-you-can-covert-information-leakage-from-drones-using-mavlink-protocol/</guid>
                    </item>
							        </channel>
        </rss>
		