Jack Ren

51 posts

Jack Ren

Jack Ren

@bjrjk

Pursuit for a broad horizon. | Opinions are my own.

Katılım Nisan 2013
309 Takip Edilen699 Takipçiler
Jack Ren retweetledi
whw
whw@WHW_0x455·
Bypass PAC in JIT - CVE-2024-27834 And I'm ready for my Spring Festival holiday 🥳 gist.github.com/WHW0x455/3c219…
English
1
30
138
7.4K
Jack Ren
Jack Ren@bjrjk·
A carefully structured, tiered root cause analysis for CVE-2025-43529 (JSC UAF). Spent quite some time refining the structure to make the reasoning explicit and readable. Shoutout to @jir4vv1t for his detailed analysis and exploit. github.com/bjrjk/CVE-2025…
English
2
32
133
11.6K
Jack Ren retweetledi
Mr. Anthony 安東尼
Mr. Anthony 安東尼@darkfloyd1014·
This time is a real thrilling announcement as our paper about template-based fuzzing for JavaScript engine is accepted in OOPSLA24-25. Thank you so much to every co-authors including Ken Wong, Dongwei Xiao, Dr. Daoyuan Wu Dr. Shuai Wang and Yiteng Peng. What a good evening! @wwkenwong @wangshuai901
Mr. Anthony 安東尼 tweet media
English
3
8
51
6.5K
Jack Ren
Jack Ren@bjrjk·
Thanks to the reminder of @mistymntncop , I'm able to find an official writeup of Kaspersky and construct AddressOf / FakeObject primitives using their directives. The repository has been updated to include the codes and analysis.
English
0
0
7
330
Jack Ren retweetledi
j j
j j@mistymntncop·
My writeup for CVE-2024-7971. Just a POC. Let me know if u have any questions. github.com/mistymntncop/C…
English
9
64
248
21.2K
Jack Ren
Jack Ren@bjrjk·
@buptsb Sincere thanks to you, V8 developers!🤣
English
0
0
5
254
sakura
sakura@eternalsakura13·
@xvonfers Perhaps they also need to prove the amount of work they've done?
English
2
0
1
577
xvonfers
xvonfers@xvonfers·
Turbolev(Turboshaft with Maglev as a frontend(faster & simpler arch)) is a new attack surfaces Flags: "--turboshaft" & "--turbolev" Discrepancies between the two IR frameworks might lead to... chromium-review.googlesource.com/q/hashtag:%22t… chromium-review.googlesource.com/q/project:v8/v…
xvonfers@xvonfers

Maglev as a Frontend for Turboshaft docs.google.com/document/d/1Ba… Turboshaft Frontend - Preliminary Design Elements #heading=h.blf7hk3dfqsq" target="_blank" rel="nofollow noopener">docs.google.com/document/d/1vL… Turboshaft JS Inlining and In-place Mutations #heading=h.awqb85skrfrf" target="_blank" rel="nofollow noopener">docs.google.com/document/d/1_L… Maglev with the Reducer Framework docs.google.com/document/d/1i1…

English
16
6
32
18.1K
xvonfers
xvonfers@xvonfers·
@bjrjk @__nils_ Excellent RCA and concise PoC & Exploit! Great job, Jack🔥🔥🔥 As always, at the highest level!
English
1
0
1
337
Jack Ren
Jack Ren@bjrjk·
Analysis and Exploit for CVE-2024-8381, a SpiderMonkey Interpreter Type Confusion Bug! Unfortunately, due to nature of this bug, exploit is only applicable when ASLR is disabled. Shoutout to @__nils_ for finding this bug. github.com/bjrjk/CVE-2024…
English
3
36
166
10.1K
Jack Ren
Jack Ren@bjrjk·
@mistymntncop @__nils_ Unfortunately, I'm only able to exploit without ASLR. Hope even in that case, it will help you😄
English
1
0
0
291
j j
j j@mistymntncop·
@bjrjk @__nils_ Thank you @bjrjk ! I had a look at this bug and am very interested in exploitation. I will read now!!! :)
English
1
0
4
446
Jack Ren
Jack Ren@bjrjk·
@darkfloyd1014 @cffsmith It seems that the ticket system has been closed. People who want to join in cannot buy ticket now. 🤣
English
3
0
1
222
Mr. Anthony 安東尼
Mr. Anthony 安東尼@darkfloyd1014·
My great pleasure as @cffsmith have shared in VXCON and guided us a lot. Welcome to Hong Kong, probably we will have deep sharing. Please join us at vxcon.hk
VXCON@vxresearch

We feel really honourable to have Carl Smith from Google v8 to present in #VXCON Talk Title: Fuzzing for complex bugs across languages in JavaScript Engines   Abstract: The fuzzing of Wasm is not a new concept. Since Wasm is a binary format, it's relatively easy to employ a modern binary fuzzer like AFL++ to create modules and subsequently invoke them. However, this approach has limitations. Wasm modules can be utilized in more intricate contexts within web applications, typically collaborating with JavaScript code to accomplish more complex tasks. Linking and combining modules is possible, but it often requires the developer or fuzzer to possess in-depth knowledge of the modules involved. To address this challenge, we extended Fuzzilli's intermediate language to include instructions that describe Wasm modules. This allows us to comprehensively track and infer the module and its associated data. By doing so, we open up new possibilities for fuzzing. It becomes feasible to combine JavaScript and Wasm code within a single fuzz test case, enabling cross-language type tracking and inference. These test cases exhibit more intricate behavior and, when combined with Fuzzilli's templating capabilities, facilitate the generation of complex and compelling test cases. We will look at some advanced browser fuzzing and some of the exciting test cases and bugs this has found in V8. @cffsmith

English
2
0
5
790