Carl Smith

316 posts

Carl Smith banner
Carl Smith

Carl Smith

@cffsmith

Security @Google; @FluxFingers/@Sauercl0ud; previously V8 Security, Intern {Project Zero, @XI_Research}. Personal account. https://t.co/w9zosKSHdh on Bluesky.

Switzerland, Germany, USA 参加日 Mayıs 2014
720 フォロー中1.1K フォロワー
Carl Smith がリツイート
POC_Crew
POC_Crew@POC_Crew·
#Zer0Con2026 - SPEAKER 🎃 Pumpkin Chang(@u1f383) from DEVCORE - “Modern Android Kernel Exploitation Through a Mali Driver Vulnerability” For more: zer0con.org
POC_Crew tweet media
English
0
14
117
4.5K
Carl Smith がリツイート
POC_Crew
POC_Crew@POC_Crew·
#Zer0Con2026 - SPEAKER 🌌 Brendon Tiszka from Google Project Zero - “Researcher’s Guide to the Galaxy: Digging into Samsung 0-click, Android Messengers, DNG, and other image formats” For more: zer0con.org
POC_Crew tweet media
English
0
4
58
2.8K
Carl Smith がリツイート
Samuel Groß
Samuel Groß@5aelo·
We derestricted crbug.com/382005099 today which might just be my favorite bug of the last few years: bad interaction between WebAudio changing the CPU's handling of floats and V8 not expecting that. See #comment19" target="_blank" rel="nofollow noopener">crbug.com/382005099#comm… for a PoC exploit. Also affected other browsers
English
4
48
245
22.1K
Carl Smith がリツイート
Samuel Groß
Samuel Groß@5aelo·
I'm pretty excited about this (POE2 in particular)! It's basically what we've been preparing for with the PKEY-based hardware sandboxing prototype for V8 (docs.google.com/document/d/1l3…)
Dmitry Vyukov@dvyukov

More HW security goodness from Arm: community.arm.com/arm-community-… vMTE (Virtual Memory Tagging) allows to use MTE in a more flexible way, consuming less RAM. POE2 allows to build efficient in-process sandboxes and isolation. More-or-less improvement over x86 Memory Protection Keys.

English
0
9
60
13.3K
Carl Smith がリツイート
stephen
stephen@_tsuro·
If you like Chrome IPC shenanigans like this, you might also enjoy my talk from black hat 25: youtu.be/qhhJCLy0YBA?si…
YouTube video
YouTube
xvonfers@xvonfers

Whoah... $250000 (CVE-2025-4609, similar to CVE-2025-2783/412578726)[412578726][Mojo][IpczDriver]ipcz bug -> renderer duplicate browser process handle -> escape sbx is now open with PoC & exploit(success rate is nearly 70%-80%) issues.chromium.org/issues/4125787… #comment11" target="_blank" rel="nofollow noopener">issues.chromium.org/issues/4125787…

English
3
35
225
37.4K
Carl Smith がリツイート
Tim Willis
Tim Willis@itswillis·
That time when @tehjh was just reviewing a new Linux kernel feature, found a security vuln, then went on a journey to see if he could exploit it from inside the Chrome Linux Desktop renderer sandbox (spoiler: very yes) googleprojectzero.blogspot.com/2025/08/from-c…
English
0
48
132
23.9K
Carl Smith がリツイート
Samuel Groß
Samuel Groß@5aelo·
We released our Fuzzilli-based V8 Sandbox fuzzer: github.com/googleprojectz… It explores the heap to find interesting objects and corrupts them in a deterministic way using V8's memory corruption API. Happy fuzzing!
English
2
74
294
24.2K
Carl Smith がリツイート
Samuel Groß
Samuel Groß@5aelo·
If you have a machine with PKEY support and recent Linux kernel you can now play around with hardware support for the V8 sandbox. When active, JS + Wasm code has no write permissions outside the sandbox address space. To enable, set `v8_enable_sandbox_hardware_support = true`.
English
3
17
78
11.4K
Carl Smith がリツイート
stephen
stephen@_tsuro·
V8 Security is hiring in Warsaw! If you want to work on improving our JavaScript and Wasm fuzzers, check out the links below!
English
2
26
89
22.5K
Carl Smith がリツイート
Ivan Fratric 💙💛
Ivan Fratric 💙💛@ifsecure·
I tweeted before about the Apple CoreAudio issues found by Google TAG. Well, the fuzz harness used to find these issues is now included in Jackalope examples, see github.com/googleprojectz… . Happy fuzzing! :)
Ivan Fratric 💙💛@ifsecure

The latest Apple security update contains fixes for three CoreAudio issues (CVE-2025-24160, CVE-2025-24161, CVE-2025-24163). These were found by Google Threat Analysis Group using Jackalope fuzzer.

English
2
39
182
30.1K
Carl Smith がリツイート
Mr. Anthony 安東尼
Mr. Anthony 安東尼@darkfloyd1014·
Congratulations to Carl Smith from v8 Security team and join Blackhat USA review board as guest reviewer. He is willing to share, and an open-minded, hardcore researcher and developer. @cffsmith @BlackHatEvents
Mr. Anthony 安東尼 tweet media
English
0
2
27
1.4K
Carl Smith
Carl Smith@cffsmith·
Make sure to update to the latest swift version too!
English
0
1
6
1.1K
Carl Smith
Carl Smith@cffsmith·
I’m very excited to announce that we at V8 Security have finally published our first version of Fuzzilli that understands Wasm! Go check it out at github.com/googleprojectz…. While we still have a way to go in improving it, we think it shows a promising approach!
English
15
109
474
37.4K