Oliver Chang

197 posts

Oliver Chang

Oliver Chang

@halbecaf

https://t.co/bmyDmTlFKv Senior Staff Eng @ Google DeepMind. Former: founder of https://t.co/K575lba4tt, lead/co-founder for OSS-Fuzz.

Sydney, Australia Присоединился Haziran 2016
148 Подписки1.9K Подписчики
Oliver Chang ретвитнул
Samuel Groß
Samuel Groß@5aelo·
We derestricted a number of vulnerabilities found by Big Sleep in JavaScriptCore today: issuetracker.google.com/issues?q=compo… All of them were fixed in the iOS 26.1 (and equivalent) update last month. Definitely some cool bugs in there!
English
2
34
175
17.8K
Oliver Chang
Oliver Chang@halbecaf·
Really excited to finally announce CodeMender! As part of this we've already submitted and upstreamed several patches to OSS projects via OSS-Fuzz. Check out our post at: deepmind.google/discover/blog/… There will be more technical details and exciting announcements to come!
English
0
11
47
6K
Oliver Chang ретвитнул
Google DeepMind
Google DeepMind@GoogleDeepMind·
Software vulnerabilities can be notoriously time-consuming for developers to find and fix. Today, we’re sharing details about CodeMender: our new AI agent that uses Gemini Deep Think to automatically patch critical software vulnerabilities. 🧵
English
75
328
1.9K
367.4K
Oliver Chang ретвитнул
DonggeLiu
DonggeLiu@dongge_liu·
🚀Inviting GSoC2025 contributors to supercharge OSS-Fuzz-Gen! Opportunities include:​ 1. Modularize OSS-Fuzz ​features 2. Enhance Experiment Execution & Report UI​ 3. Integrate Research Innovations​ Interested? Send your resume to donggeliu@google.com😃 #8-self-contained-oss-fuzz-module-for-researchers-" target="_blank" rel="nofollow noopener">gist.github.com/dynamicwebpaig…
English
1
4
15
1.8K
Oliver Chang
Oliver Chang@halbecaf·
OSV-Scanner has just released the first beta for V2, a major update that includes significant new features, including layer-aware container scanning, remediation for pom.xml, new HTML output and more. osv.dev/blog/posts/osv… Please try it out and give us feedback!
English
0
4
11
1.3K
Oliver Chang ретвитнул
Sebastian Lekies
Sebastian Lekies@slekies·
Today, we announced the official release of OSV-SCALIBR, Google's software composition analysis library. If you are working in vuln management / security scanning, SCALIBR is for you! SCALIBR is powering most of Google's vuln scanning. Please RT security.googleblog.com/2025/01/osv-sc…
English
3
75
210
14.8K
Oliver Chang ретвитнул
Jonathan Metzman
Jonathan Metzman@metzmanj·
The OSS-Fuzz team is hiring a PhD intern for this summer. Come join us and build the future of fuzzing. Link in next tweet in thread. RTs appreciated!
English
2
30
88
14.8K
Oliver Chang
Oliver Chang@halbecaf·
Happy new year! OSV had a lot of great progress in 2024, from new ecosystem adoption, API improvements, and scanner feature development! We just published a blog about these and our 2025 plans here: osv.dev/blog/posts/202… !
English
0
4
8
966
Oliver Chang
Oliver Chang@halbecaf·
@jduck @clintgibler @metzmanj This is a very fair point! This is exactly why we haven't turned this on by default for all OSS-Fuzz users. One of our next priorities is to automate as much of the triage to determine if it's a legit vuln / attack surface or not (e.g. using an LLM and/or past reported vulns).
English
1
0
3
222
Joshua J. Drake
Joshua J. Drake@jduck·
@clintgibler @halbecaf @metzmanj I'm concerned that you and your team are not thinking about if code you're testing has no attack surface. I'd be interested to understand what's a real vulnerability vs. just a crash find by fuzzing normally unreachable code/state.
English
1
0
1
365
Oliver Chang ретвитнул
Royal Hansen
Royal Hansen@royalhansen·
The OSS-Fuzz team at @Google is using AI-powered fuzzing to find vulns in open-source software and recently reported 26 new vulns to open-source project maintainers, including one in the OpenSSL library which is critical to most internet infrastructure. security.googleblog.com/2024/11/leveli…
English
0
25
77
5.1K
Oliver Chang
Oliver Chang@halbecaf·
New blog post about OSS-Fuzz AI-powered fuzzing is live! We talk about what went into making LLMs work well enough for this use case to find 26 new vulnerabilities (including a CVE in OpenSSL), as well as what else we have planned to make this better. security.googleblog.com/2024/11/leveli…
English
0
26
110
16K
Oliver Chang
Oliver Chang@halbecaf·
Red Hat joins OSV! openssf.org/blog/2024/11/0… Combined with Ubuntu, Chainguard, and SUSE adopting OSV this year, OSV.dev has really started to become a comprehensive vulnerability source for not only language packages, but also Linux distros!
English
0
2
7
1.1K
Oliver Chang
Oliver Chang@halbecaf·
CVE-2024-9143 (openssl-library.org/news/secadv/20…) was disclosed recently, which was found by OSS-Fuzz-Gen! This is a pretty proud example of our team showing the promise of leveraging LLMs enable more fuzzing coverage.
English
0
23
122
46.7K
Oliver Chang
Oliver Chang@halbecaf·
OSV support announced in the latest Ubuntu 24.10 release! This year has seen OSV adoption from many Linux distributions, and the OSV.dev database is starting to become a really comprehensive source of accurate vuln info across major open source ecosystems!
Ubuntu@ubuntu

Today, we proudly unveil Ubuntu 24.10, codenamed "Oracular Oriole" 🔮 Packed with GNOME 47, the Linux 6.11 kernel, permissions prompting, an enhanced command line, OpenVEX and OSV support, and a special #Ubuntu20Years anniversary gift - there’s plenty for you to explore 🚀 Read more: ubuntu.com/blog/canonical… #Ubuntu #Linux #OracularOriole

English
0
3
6
1.7K
Oliver Chang ретвитнул
Ubuntu
Ubuntu@ubuntu·
Today, we proudly unveil Ubuntu 24.10, codenamed "Oracular Oriole" 🔮 Packed with GNOME 47, the Linux 6.11 kernel, permissions prompting, an enhanced command line, OpenVEX and OSV support, and a special #Ubuntu20Years anniversary gift - there’s plenty for you to explore 🚀 Read more: ubuntu.com/blog/canonical… #Ubuntu #Linux #OracularOriole
Ubuntu tweet media
English
27
215
1.1K
43.9K
Oliver Chang
Oliver Chang@halbecaf·
@microsvuln @dobinrutis I expect that we'll need to do a combination of: - Implementing these easier automated checks to prune out obvious false positives from incorrect/bad harnesses. - Have some kind of feedback mechanism from project maintainers (e.g. an annotation on public APIs) to help us out
English
0
0
1
201
Oliver Chang
Oliver Chang@halbecaf·
@microsvuln @dobinrutis Yep, there's a lot of low hanging fruit things we can do to determine these automatically (or use an LLM). However, there are also cases when, even as a human, it's hard to tell if something is a legitimate bug or not because of unclear API preconditions and threat models.
English
1
0
2
169
Oliver Chang
Oliver Chang@halbecaf·
One week later the bug count is now at 25 bugs total (#bugs-discovered" target="_blank" rel="nofollow noopener">github.com/google/oss-fuz…) There's still many improvements to be made to improve success rate of generated targets, but we now have the problem of too many crashes to triage. Automating this will a focus of our future research.
Oliver Chang@halbecaf

This week we've added another 8 trophies to OSS-Fuzz-Gen (for a total of 14)! These are vulnerabilities found by LLM-generated harnesses. The interesting bit here is many of these are in well-fuzzed projects with thousands of hours of fuzzing already. #bugs-discovered" target="_blank" rel="nofollow noopener">github.com/google/oss-fuz…

English
1
10
46
6.5K