Ivan Fratric 💙💛

1.3K posts

Ivan Fratric 💙💛

Ivan Fratric 💙💛

@ifsecure

Tech lead and security researcher at Google Project Zero. Author: Jackalope, TinyInst, WinAFL, Domato. PhD. Tweets are my own. Backup @[email protected]

Katılım Ağustos 2011
209 Takip Edilen18.9K Takipçiler
Sabitlenmiş Tweet
Ivan Fratric 💙💛
Ivan Fratric 💙💛@ifsecure·
The slides for my Black Hat talk "XMPP Stanza Smuggling or How I Hacked Zoom" are now available at #xmpp-stanza-smuggling-or-how-i-hacked-zoom-26618" target="_blank" rel="nofollow noopener">blackhat.com/us-22/briefing…
English
4
67
279
0
Ivan Fratric 💙💛
CVE-2026-28920 (Apple, zlib, found by Brendon Tiszka of Google Project Zero) sure looks fun :)
English
1
14
91
9.6K
Ivan Fratric 💙💛 retweetledi
Seth Jenkins
Seth Jenkins@__sethJenkins·
Just derestricted a now-fixed kernel bug in Pixel 10. I think this ranks as the most easily exploited kernel bug of all time😬 Thanks to @tehjh for collab'ing on this driver and full credits for noticing this bug in the first 5 minutes of auditing😂 project-zero.issues.chromium.org/issues/4634382…
English
5
46
189
17.2K
Ivan Fratric 💙💛
Ivan Fratric 💙💛@ifsecure·
@cl4sm Yes, exactly, coverage is poor aproximation for state. I don't think better state approximation and mutational fuzzing are mutually exclusive, mutational fuzzer benefits from better state.
English
0
0
1
151
Wil Gibbs
Wil Gibbs@cl4sm·
@ifsecure Cool blog! The first problem feels like an issue with coverage being a poor approx. for program state. But approaches like IJON haven’t seen much success AFAIK in the real world. Do you think prob 1 gets fixed with better state approx or is the mutational fuzzer still needed?
English
1
0
1
417
Ivan Fratric 💙💛
Ivan Fratric 💙💛@ifsecure·
Jackalope and Tinyinst have been working on arm64 macs for a while, but now you should also be able to run against arm64e binaries (i.e. binaries that ship with the os) with some modification to the system. For details, see github.com/googleprojectz…
English
2
22
123
7.7K
Ivan Fratric 💙💛 retweetledi
Natalie Silvanovich
Natalie Silvanovich@natashenka·
In the final part of his blog series, @tiraniddo tells the story of how a bug was introduced into a Windows API. Code re-writes can improve security, but it’s important not to forget the security properties the code needs to enforce in the process. projectzero.google/2026/02/gphfh-…
English
0
54
192
21.1K
Ivan Fratric 💙💛 retweetledi
Natalie Silvanovich
Natalie Silvanovich@natashenka·
Today, Project Zero released a 0-click exploit chain for the Pixel 9. While it targets the Pixel, the 0-click bug and exploit techniques we used apply to most other Android devices. projectzero.google/2026/01/pixel-…
English
7
237
1K
116.4K
Ivan Fratric 💙💛
Ivan Fratric 💙💛@ifsecure·
Project Zero has a new blog at projectzero.google and boy, do we have some some great content in store. For now, you can read two never published drafts as well as a guest post from Benoît from Threat Intelligence Group with an indepth analysis of an Android 0click exploit.
English
4
17
164
15.3K
Ivan Fratric 💙💛 retweetledi
Natalie Silvanovich
Natalie Silvanovich@natashenka·
We launched a redesigned Project Zero website today at projectzero.google ! To mark the occasion, we released some older posts that never quite made it out of drafts. Enjoy!
English
7
61
365
46.2K
Ivan Fratric 💙💛 retweetledi
Google VRP (Google Bug Hunters)
📢📢📢 Our Patch Rewards Program rules were updated to explicitly encourage batched submissions, and place every Google-filed OSS vulnerability explicitly into scope (thanks for your feedback). Interested in getting rewarded for your awesome OSS security work? g.co/prp
English
0
29
136
21.5K