5aelo Profile Banner
Samuel Groß Profile
Samuel Groß

@5aelo

Followers
24K
Following
2K
Statuses
756

V8 Security technical lead. Previously Project Zero. Personal account. Also @[email protected] and https://t.co/aVitnPjBie

Zürich, Switzerland
Joined May 2013
Don't wanna be here? Send us removal request.
@5aelo
Samuel Groß
5 years
I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage:
20
507
1K
@5aelo
Samuel Groß
7 days
RT @cffsmith: I’m very excited to announce that we at V8 Security have finally published our first version of Fuzzilli that understands Was…
0
99
0
@5aelo
Samuel Groß
3 months
@filpizlo Oh thanks! Means a lot coming from you!
0
0
1
@5aelo
Samuel Groß
8 months
@ret2src @offensive_con Thanks! Awesome to hear that it’s been helpful! :)
0
0
1
@5aelo
Samuel Groß
8 months
@alisaesage Presumably, yeah… although I think lockdown mode also disables Wasm, in which case you’d get the Wasm/Both entries from the JS/Wasm column as well I guess
0
0
2
@5aelo
Samuel Groß
8 months
@mistymntncop 😅 yeah these are cases where the bug triggers without JITs, but only causes some data structures to be left in an inconsistent state that are (currently) only used by optimizing compilers (and where we don't see another way to exploit it).
1
0
9
@5aelo
Samuel Groß
8 months
@0x10n The JS/Wasm column is probably better suited to answer what would happen if Wasm was disabled. Though I realize some entries should probably say "Both" there, so changed that now!
1
1
3
@5aelo
Samuel Groß
8 months
@0x_shaq Oh that’s really cool!
0
0
1
@5aelo
Samuel Groß
8 months
@thegrugq @daveaitel Since they are anyway all dead by now, I think this is fine 😁
1
0
7
@5aelo
Samuel Groß
8 months
This for example shows that the V8 Sandbox is pretty promising in terms of "bug coverage". Of course that also assumes that it'll become a strong security boundary (it's still pretty soft at the moment), see
@5aelo
Samuel Groß
8 months
And the recording is now also public: thanks @offensive_con!
0
2
10
@5aelo
Samuel Groß
8 months
@xvonfers It needs --enable-experimental-regexp-engine but still worth fixing :)
0
0
1
@5aelo
Samuel Groß
9 months
@xvonfers This is the bypass I demoed @offensive_con earlier this month. It's a pretty good one :)
0
0
21
@5aelo
Samuel Groß
9 months
@xvonfers Great work!
1
0
1
@5aelo
Samuel Groß
9 months
@alisaesage @mistymntncop I don't think so. The bug class back then was "different-bytecode-after-reparsing" because there's an invariant that reparsing of JS code must result in the exact same bytecode as the initial parsing. But this bug is different (here a DCHECK already fails during initial parsing)
0
1
6
@5aelo
Samuel Groß
9 months
@xvonfers There is also a WIP design document here: :)
0
5
30