Opens profile photo
Follow
Samuel Groß
@5aelo
V8 Security technical lead. Previously Project Zero. Personal account. Also @saelo@chaos.social
Zürich, Switzerlandphrack.org/author_saelo.h…Joined May 2013

Samuel Groß’s Tweets

Fuzzilli (github.com/googleprojectz), the great coverage-guided fuzzer for dynamic language interpreters based on a custom intermediate language built by , is finally documented in a paper. You can find the paper at ndss-symposium.org/ndss-paper/fuz
Quote Tweet
Fascinating discussion ongoing in Fuzzing session at #NDSS23: FUZZILLI: Fuzzing for JavaScript JIT Compiler Vulnerabilities.
Image
80
With github.com/googleprojectz Fuzzilli now finally has a (supported) JavaScript-to-FuzzIL compiler, making it possible to import and mutate existing JavaScript code. It's not feature complete (contributions welcome!) but should support the most important things. Happy Fuzzing!
124
Unfortunately my BlackHat US submission about the V8 sandbox was rejected, but we should still have some cool announcements to share about how we're making V8 harder to exploit soon. In any case I'll be around at the conference! :)
6
186
Show this thread
I'm excited (and also a little sad) to announce that after 3 fantastic years with Project Zero, it's time for me to try something new. So starting this month, I'll be building up and leading a new V8 security team at Google!
37
988
Show this thread
Awesome to see the (upcoming) V8 Sandbox already showing up in CTFs! Really enjoying those writeups by @r3tr0sp3ct2019 (twitter.com/r3tr0sp3ct2019) and (twitter.com/ky1ebot/status)
Quote Tweet
I played DiceCTF this weekend and solved a V8 challenge. I bypassed the latest "Virtual Memory Cage" protection in V8 and here is how I achieved it XD blog.kylebot.net/2022/02/06/Dic
Show this thread
109
I usually let the team's work speak for itself, but I wanted to make sure a few larger points aren't lost in this work. Firstly, the takeaway here isn't "NSO exceptionalism". It's just that NSO was caught this time and we get a peek at how they are attacking iOS/iMessage.
Quote Tweet
Today we're publishing a detailed technical writeup of FORCEDENTRY, the zero-click iMessage exploit linked by Citizen Lab to the exploitation of journalists, activists and dissidents around the world. googleprojectzero.blogspot.com/2021/12/a-deep
Show this thread
5
153
Show this thread
All of this will likely take a couple of iterations (reserving lots of virtual memory can be surprisingly complex...), and we'll need to add support for Android as well (or rather, Linux on ARM64). But it's an important first step for the V8 sandbox. EOF
19
Show this thread
If all goes well and we are confident that the cage works everywhere, we'll enable CagedPointers. Objects in the cage then reference each other through offsets instead of pointers, stopping exploits from (ab)using them for arbitrary memory read/write (i.e. a v8 sandbox escape).
4
17
Show this thread
When the cage is enabled, V8 tries to reserve 1TB of virtual address space and will place its heaps, ArrayBuffers, and WASM memory in there. To allow for a smooth rollout, we can still fall back to allocating these objects outside the cage (or not creating a cage at all) though.
1
10
Show this thread
This week we are starting an experiment that enables V8's Virtual Memory Cage in Chrome on Desktop (currently only on Dev + Canary channels, then Beta and finally Stable). Here is how that'll work:
3
263
Show this thread