Posted by the Big Sleep team Introduction In our previous post, Project Naptime: Evaluating Offensive Security Capabilities of Large Language Models , we introduced our framework for large-l...
https://googleprojectzero.blogspot.com/2024/10/from-naptime-to-big-sleep.html
Posted by Mateusz Jurczyk, Google Project Zero To a normal user or even a Win32 application developer, the registry layout may seem simple: there are five root keys that we know from Regedit (a...
https://googleprojectzero.blogspot.com/2024/10/the-windows-registry-adventure-4-hives.html
Guest post by Nick Galloway, Senior Security Engineer, 20% time on Project Zero Late in 2023, while working on a 20% project with Project Zero, I found an integer overflow in the dav1d AV1 vi...
https://googleprojectzero.blogspot.com/2024/10/effective-fuzzing-dav1d-case-study.html
Posted by Mateusz Jurczyk, Google Project Zero When tackling a new vulnerability research target, especially a closed-source one, I prioritize gathering as much information about it as possible...
https://googleprojectzero.blogspot.com/2024/06/the-windows-registry-adventure-3.html
Posted by Sergei Glazunov and Mark Brand, Google Project Zero Introduction At Project Zero, we constantly seek to expand the scope and effectiveness of our vulnerability research. Though much o...
https://googleprojectzero.blogspot.com/2024/06/project-naptime.html
Posted by Seth Jenkins, Google Project Zero INTRODUCTION Android's open-source ecosystem has led to an incredible diversity of manufacturers and vendors developing software that runs on a broa...
https://googleprojectzero.blogspot.com/2024/06/driving-forward-in-android-drivers.html
Posted by Mateusz Jurczyk, Google Project Zero Before diving into the low-level security aspects of the registry, it is important to understand its role in the operating system and a bit of his...
https://googleprojectzero.blogspot.com/2024/04/the-windows-registry-adventure-2.html
Posted by Mateusz Jurczyk, Google Project Zero In the 20-month period between May 2022 and December 2023, I thoroughly audited the Windows Registry in search of local privilege escalation bugs....
https://googleprojectzero.blogspot.com/2024/04/the-windows-registry-adventure-1.html
By Mark Brand, Google Project Zero INTRODUCTION It's finally time for me to fulfill a long-standing promise. Since I first heard about ARM's Memory Tagging Extensions, I've said (to far too m...
https://googleprojectzero.blogspot.com/2023/11/first-handset-with-mte-on-market.html
BY IAN BEER A graph representation of the sandbox escape NSExpression payload In April this year Google's Threat Analysis Group, in collaboration with Amnesty International, discovered an ...
By Seth Jenkins, Project Zero INTRODUCTION In December 2022, Google’s Threat Analysis Group (TAG) discovered an in-the-wild exploit chain targeting Samsung Android devices. TAG’s blog post...
https://googleprojectzero.blogspot.com/2023/09/analyzing-modern-in-wild-android-exploit.html
By Mark Brand, Project Zero BACKGROUND In 2018, in the v8.5a version of the ARM architecture, ARM proposed a hardware implementation of tagged memory, referred to as MTE (Memory Tagging Exte...
https://googleprojectzero.blogspot.com/2023/08/mte-as-implemented-part-2-mitigation.html
By Mark Brand, Project Zero BACKGROUND In 2018, in the v8.5a version of the ARM architecture, ARM proposed a hardware implementation of tagged memory, referred to as MTE (Memory Tagging Exte...
https://googleprojectzero.blogspot.com/2023/08/mte-as-implemented-part-1.html
By Mark Brand, Project Zero In mid-2022, Project Zero was provided with access to pre-production hardware implementing the ARM MTE specification. This blog post series is based on that review, a...
https://googleprojectzero.blogspot.com/2023/08/summary-mte-as-implemented.html
By Mark Brand, Project Zero BACKGROUND In 2018, in the v8.5a version of the ARM architecture, ARM proposed a hardware implementation of tagged memory, referred to as MTE (Memory Tagging Exte...
https://googleprojectzero.blogspot.com/2023/08/mte-as-implemented-part-3-kernel.html
Today, members of Google Project Zero and Google Cloud are releasing a report on a security review of Intel's Trust Domain Extensions (TDX). TDX is a feature introduced to support Confidential ...
https://googleprojectzero.blogspot.com/2023/04/technical-report-into-intel-tdx.html
Posted by Tim Willis, Project Zero In late 2022 and early 2023, Project Zero reported eighteen 0-day vulnerabilities in Exynos Modems produced by Samsung Semiconductor. The four most severe of ...
https://googleprojectzero.blogspot.com/2023/03/multiple-internet-to-baseband-remote-rce.html
Posted by Seth Jenkins, Project Zero For a fair amount of time, null-deref bugs were a highly exploitable kernel bug class. Back when the kernel was able to access userland memory without restr...
https://googleprojectzero.blogspot.com/2023/01/exploiting-null-dereferences-in-linux.html
Posted by Ivan Fratric, Project Zero Note: The vulnerability discussed here, CVE-2022-42855, was fixed in iOS 15.7.2 and macOS Monterey 12.6.2. While the vulnerability did not appear to be expl...
https://googleprojectzero.blogspot.com/2023/01/der-entitlements-brief-return-of.html
Seth Jenkins, Project Zero This blog post details an exploit for CVE-2022-42703 (P0 issue 2351 - Fixed 5 September 2022), a bug Jann Horn found in the Linux kernel's memory management (MM) su...
By Ian Beer, Project Zero Note: The vulnerabilities discussed in this blog post (CVE-2022-33917) are fixed by the upstream vendor, but at the time of publication, these fixes have not yet made ...
https://googleprojectzero.blogspot.com/2022/11/mind-the-gap.html
Posted by Maddie Stone, Project Zero Note: The three vulnerabilities discussed in this blog were all fixed in Samsung’s March 2021 release. They were fixed as CVE-2021-25337, CVE-2021-25369, ...
By Felix Wilhelm, Project Zero Earlier this year, I discovered a surprising attack surface hidden deep inside Java’s standard library: A custom JIT compiler processing untrusted XSLT programs...
https://googleprojectzero.blogspot.com/2022/11/gregor-samsa-exploiting-java-xml.html
By James Forshaw, Project Zero I've been spending a lot of time researching Windows authentication implementations, specifically Kerberos. In June 2022 I found an interesting issue number 2310 ...
https://googleprojectzero.blogspot.com/2022/10/rc4-is-still-considered-harmful.html
A deep dive into an in-the-wild Android exploit Guest Post by Xingyu Jin, Android Security Research This is part one of a two-part guest blog post, where first we'll look at the root cause of...
https://googleprojectzero.blogspot.com/2022/08/the-quantum-state-of-linux-kernel.html