Alex Rebert

118 posts

Alex Rebert

Alex Rebert

@ayper

Security @ Google. Previously co-founder of @ForAllSecure. Opinions here are my own. @[email protected]

Pittsburgh Katılım Ağustos 2008
662 Takip Edilen520 Takipçiler
Alex Rebert retweetledi
Heather Adkins - Ꜻ - Spes consilium non est
Hardening the C++ Standard Library at massive scale. A look at increasing memory safety with libc++ hardening — a collaborative paper from engineers at Apple and Google. The results have been impressive: at Google the team discovered and fixed 1000+ bugs as hardening was enabled. queue.acm.org/detail.cfm?id=…
English
1
33
280
23.9K
Alex Rebert
Alex Rebert@ayper·
We're joining forces with industry & academia to call for memory safety standardization: security.googleblog.com/2025/02/securi…. It's a recognition that memory unsafety is no longer a niche technical problem but a societal one, impacting everything from national security to personal privacy.
English
2
16
62
4.5K
Alex Rebert retweetledi
Google VRP (Google Bug Hunters)
🛡️Want to help make the open source world safer and earn up to $45k 💰? We've revamped our Patch Rewards Program, extending its scope and increasing rewards for security patches – with a particular focus on memory safety, including bonus multipliers! bughunters.google.com/blog/527306491…
English
0
29
146
41.5K
Alex Rebert
Alex Rebert@ayper·
@kupiakos Oops, I missed this. OOB accesses terminate the program immediately. See #hardening-assertion-failure" target="_blank" rel="nofollow noopener">libcxx.llvm.org/Hardening.html…
English
0
0
1
108
Alex Rebert
Alex Rebert@ayper·
Excited to share our latest post on memory safety! We're tackling spatial safety in our massive C++ codebase by hardening libc++ *by default*. It adds bounds checks to things like std::vector, preventing a fair bit of out-of-bounds vulnerabilities: security.googleblog.com/2024/11/retrof…
English
2
50
249
76.9K
Alex Rebert retweetledi
Kinuko Yasuda
Kinuko Yasuda@kinu·
Bounds-checking in C++: so people ask if the .3% overhead is real. It's not just a benchmark result, we got this through our Google-Wide profiling, that gives us the live insights from DCs. This surprised us too as it was much cheaper than we thought research.google/pubs/google-wi…
Alex Rebert@ayper

Excited to share our latest post on memory safety! We're tackling spatial safety in our massive C++ codebase by hardening libc++ *by default*. It adds bounds checks to things like std::vector, preventing a fair bit of out-of-bounds vulnerabilities: security.googleblog.com/2024/11/retrof…

English
1
14
26
21.6K
Alex Rebert
Alex Rebert@ayper·
@RoseSilicon The blog post is mostly about server-side code, where it was recently rolled out. But chrome also has it on since 2022.
English
0
0
1
648
Alex Rebert
Alex Rebert@ayper·
@seanbax That's right! Hardening does a few more things than just bounds checking: empty optional checks, sanity checks on sizes, sort ... I'm not aware of a comprehensive list -- I usually grep for the 2 enabled libc++ macros defined in #L43" target="_blank" rel="nofollow noopener">github.com/llvm/llvm-proj…
English
1
1
4
209
Alex Rebert
Alex Rebert@ayper·
The best part? It's incredibly cost-effective, with an average performance overhead of just 0.30%.  So there's really no reason not to do it if you're running C++ code :)
English
1
2
26
2.5K
Alex Rebert
Alex Rebert@ayper·
This improves spatial memory safety across Google's services, including performance-critical components of Search, Gmail, Drive, YouTube, and Maps.  We've already seen it disrupt a red team exercise, reduce segfaults by 30%, and improve code correctness.
English
2
5
43
27.6K
Alex Rebert retweetledi
Lukas Weichselbaum
Lukas Weichselbaum@we1x·
The dedication and hard work has payed off: "for hundreds of complex web applications that are built on Google’s hardened and safe-by-design frameworks, we've averaged less than one XSS report per year in total" (see page 9 of the whitepaper).
Heather Adkins - Ꜻ - Spes consilium non est@argvee

Secure by design takes dedication and years of hard work to get the balance right between velocity and safety. Read a bit about @Google’s commitment and journey in our new white paper. Humbled to work with the professionals that make this happen everyday. blog.google/technology/saf…

English
3
6
28
5K
Alex Rebert retweetledi
Alex Rebert
Alex Rebert@ayper·
Excited to share Google's memory safety strategy! We're working to build safer software by migrating to memory-safe languages like Rust as well as hardening our existing C++: security.googleblog.com/2024/10/safer-…. We'll be sharing more details in upcoming posts.
English
2
72
234
63K
LaurieWired
LaurieWired@lauriewired·
Regular, sustained changes in non-concentrated periods do not have the same correlation with defects. What do you think? It seems like a fascinating early-warning canary of future code issues. I'd love to see a trained model warn a team of future maintenance load based on current code commits. Cassandra seems like an appropriate name.
English
12
5
252
29.2K
LaurieWired
LaurieWired@lauriewired·
The half-life of code is an interesting predictor of project quality. Linux, has one of the longest code half-life’s at 6.6 years. WordPress, less than 2. Every software change induces some risk. Repos with numerous "change bursts" have the highest incidence of defects.
LaurieWired tweet media
English
111
564
5.8K
479.2K
Alex Rebert
Alex Rebert@ayper·
@sephr The simulated results, which closely match the empirical data in Android, did not assume any prioritization. So prioritization does not appear to explain the effectiveness of this strategy, although it may explain why the Android results outperformed the simulation.
English
0
0
1
35
🕊
🕊@sephr·
@ayper Isn't it obvious that if you have a choice to use memory-safe languages, it will be used where it matters most? I don't find these results counterintuitive.
English
1
0
0
57
Alex Rebert
Alex Rebert@ayper·
The drop in Android's memory safety vulnerabilities is astonishing. It's counterintuitive, but prioritizing memory-safe languages in new code quickly reduces memory-safety risks. Once we turn off the tap of new vulnerabilities, they start decreasing exponentially.
Jeff Vander Stoep@jeffvanderstoep

I’m super excited about this blogpost. The approach is so counterintuitive, and yet the results are so much better than anything else that we’ve tried for memory safety. We finally understand why. security.googleblog.com/2024/09/elimin…

English
2
3
35
3.7K
Alex Rebert
Alex Rebert@ayper·
@sephr Because the risk reduction far outweighs what one would expect from the % of memory-safe code. Android has *more* memory-unsafe code than it did in 2019, and yet, it has almost an order of magnitude fewer memory safety vulns.
English
1
0
0
64
🕊
🕊@sephr·
@ayper How is it counterintuitive that prioritizing memory-safe languages in new code reduces memory-safety risks?
English
1
0
0
91
Alex Rebert
Alex Rebert@ayper·
@seanbax Thanks :) And yep, ~1.7y would be the half life in the simulation based on the 2.5y average lifetime.
English
0
0
2
126
Sean Baxter
Sean Baxter@seanbax·
@ayper Cool result. It seems both crazy and perfectly logical. What's the half-life used in the simulation? The foot note says the average lifetime is 2.5 years, does that mean the half-life is only 2.5y * ln(2) = 1.7y?
English
1
0
0
344