Natalie Silvanovich

Natalie Silvanovich

@natashenka.bsky.social

Google Project Zero

678 Followers 184 Following 62 Posts Joined Dec 2024
4 days ago
Post image

Mountain View Reverse Engineering (mtvre) meetup on Wed! 7:00 pm at Wagon Wheel BBQ. Talks:
- @tubetime.bsky.social on "HP 16717 PCB Reverse Engineering" (40 min)
- @natashenka.bsky.social on "0-click Android exploits" (25 min)

5 3 1 0
1 week ago
On the Effectiveness of Mutational Grammar Fuzzing Mutational grammar fuzzing is a fuzzing technique in which the fuzzer uses a predefined grammar t...

Ivan Fratric shares some tips and tricks for grammar fuzzing

projectzero.google/2026/03/muta...

7 4 0 0
1 week ago
Post image
1 0 0 0
2 weeks ago
A Deep Dive into the GetProcessHandleFromHwnd API - Project Zero In my previous blog post I mentioned the GetProcessHandleFromHwnd API. This was an API I didn’t know existed until I found a publicly disclosed UAC bypass us...

In the final part of his blog series, @tiraniddo.dev tells the story of how a bug was introduced into a Windows API.

Code re-writes can improve security, but it’s important not to forget the security properties the code needs to enforce in the process.

projectzero.google/2026/02/gphf...

5 4 0 0
1 month ago
Bypassing Administrator Protection by Abusing UI Access - Project Zero In my last blog post I introduced the new Windows feature, Administrator Protection and how it aimed to create a secure boundary for UAC where one didn’t exi...

Part 2 of @tiraniddo.dev’s Windows Administrator Protection journey is here!

projectzero.google/2026/02/wind...

5 5 1 0
1 month ago
Preview
What Really Killed Flash Player: A Six-Year Campaign of Deliberate Platform Work This is what it actually took. From the person who architected and drove Chrome’s Flash deprecation from proposal to the final removal in…

The remarkable true story of how Flash was deprecated

medium.com/@aglaforge/w...

5 3 1 0
1 month ago
Breaking the Sound Barrier, Part II: Exploiting CVE-2024-54529 - Project Zero In the first part of this series, I detailed my journey into macOS security research, which led to the discovery of a type confusion vulnerability (CVE-2024-...

Our intrepid 20%-er Dillon Franke exploited a vulnerability in CoreAudio. See his process for gaining privilege escalation on a Mac:

projectzero.google/2026/01/soun...

7 1 0 0
1 month ago
Bypassing Windows Administrator Protection - Project Zero A headline feature introduced in the latest release of Windows 11, 25H2 is Administrator Protection. The goal of this feature is to replace User Account Cont...

No security feature is perfect. @tiraniddo.dev reviewed Windows’ new Administrator Protection and found several bypasses.

projectzero.google/2026/26/wind...

4 5 0 0
1 month ago
Post image Post image

Some extra 0-click fun! Seth Jenkins and I trying to figure out why our exploit isn’t working, when it has, in fact, already started taking and exfiltrating photos

8 0 0 0
1 month ago
A 0-click exploit chain for the Pixel 9 Part 1: Decoding Dolby - Project Zero Over the past few years, several AI-powered features have been added to mobile phones that allow users to better search and understand their messages. One ef...

Make sure to check out the full series here: projectzero.google/2026/01/pixe...

3 0 0 0
1 month ago

Supply-chain issues also played a role: both vulnerabilities were patched very slowly, due to a variety of factors including bug prioritization, licensing and communication between vendors.

2 0 1 0
1 month ago

Attack surface reduction is also important— the UDC is largely used by commercial media like TV shows, most devices don’t even have an encoder.

Does it really need to be 0-click?

3 0 1 0
1 month ago

IMO, the biggest takeaway from this research is the huge promise shown by memory mitigations, both hardware and software, in protecting users against 0-days.

6 0 1 0
1 month ago

We hope this flag makes it out of Clang experimental, and more vendors start using it!

clang.llvm.org/docs/BoundsS...

3 0 1 0
1 month ago

Remarkably, iOS also integrates the UDC in a 1-click context, but this bug is not exploitable, because the codec is compiled with -fbounds-safety, which inserted bounds checking instructions, making the bug unreachable.

5 0 1 0
1 month ago

This exploit, including bug finding, took roughly 16 person-weeks of effort by Ivan Fratric, Seth Jenkins and me. This is a surprisingly low cost considering the impact.

2 0 1 0
1 month ago

The second bug, CVE-2025-36934, is a driver UaF which only affects the Pixel 9, but Project Zero has found many other bugs with similar impact affecting other devices over the past couple years.

1 0 1 0
1 month ago

The first bug in the chain is CVE-2025-54957, a memory corruption bug in the Dolby Unified Decoder, an audio codec integrated by most Android devices’ OEMs. It is 0-click because incoming SMS and RCS audio messages are automatically transcribed by the system.

3 1 1 0
1 month ago
A 0-click exploit chain for the Pixel 9 Part 1: Decoding Dolby - Project Zero Over the past few years, several AI-powered features have been added to mobile phones that allow users to better search and understand their messages. One ef...

Today, Project Zero released a 0-click exploit chain for the Pixel 9. While it targets the Pixel, the 0-click bug and exploit techniques we used apply to most other Android devices.

projectzero.google/2026/01/pixe...

58 35 1 2
2 months ago

But wait, I haven’t read all the “Best Books of 2024” yet

5 1 0 0
2 months ago

Thank you, we love the design 😍

4 0 0 0
2 months ago
Google Project Zero Make zeroday hard

We launched a redesigned Project Zero website today at projectzero.google !

To mark the occasion, we released some older posts that never quite made it out of drafts.

Enjoy!

18 4 0 1
3 months ago
Preview
A look at an Android ITW DNG exploit Posted by Benoît Sevens, Google Threat Intelligence Group Introduction Between July 2024 and February 2025, 6 suspicious image files were ...

An analysis of a recent 0-click exploit targeting Samsung devices: googleprojectzero.blogspot.com/2025/12/a-lo...

7 4 1 1
3 months ago

Crime show: “We know the victim died at night because we found beef in his stomach.”

Me, shoving a left-over burger in my face at 7am: 🫢

4 0 2 0
3 months ago
Stuffed dragon on phone

Your phone’s more likely to hit the ASLR state you need if you put a lucky dragon on it

3 0 0 0
3 months ago

I love how my city sends me text message alerts when there’s the chance to see a sinkhole

0 0 0 0
4 months ago
Preview
Defeating KASLR by Doing Nothing at All Posted by Seth Jenkins, Project Zero Introduction I've recently been researching Pixel kernel exploitation and as part of this research I ...

New Blog Post: Seth Jenkins broke kASLR by doing … nothing 😩

googleprojectzero.blogspot.com/2025/11/defe...

10 5 0 0
4 months ago

Integrators should update today!

2 0 0 0
4 months ago
Project Zero

Serious bugs often occur in third-party components integrated by other software. Ivan Fratric and I found this vulnerability in the Dolby Unified Decoder. It affects Android, iOS and Windows among other platforms, sometimes 0-click.

project-zero.issues.chromium.org/issues/42807...

10 1 1 0
5 months ago
Pointer leaks through pointer-keyed data structures Posted by Jann Horn, Google Project Zero Introduction Some time in 2024, during a Project Zero team discussion, we were talking about how...

Super cool potential ASLR leak involving dictionary hashes! googleprojectzero.blogspot.com/2025/09/poin...

10 6 0 0