Samuel Groß's Avatar

Samuel Groß

@saelo.bsky.social

Working on Project Zero, Big Sleep, and V8 Security. Personal account.

1,034 Followers  |  52 Following  |  28 Posts  |  Joined: 12.07.2023  |  1.4226

Latest posts by saelo.bsky.social on Bluesky


A 0-click exploit chain for the Pixel 9 Part 1: Decoding Dolby - Project Zero Over the past few years, several AI-powered features have been added to mobile phones that allow users to better search and understand their messages. One ef...

Today, Project Zero released a 0-click exploit chain for the Pixel 9. While it targets the Pixel, the 0-click bug and exploit techniques we used apply to most other Android devices.

projectzero.google/2026/01/pixe...

15.01.2026 18:56 — 👍 59    🔁 36    💬 1    📌 2
Preview
V8 Sandbox - Bytecode Verification V8 Sandbox - Bytecode Verification Author: saelo@ First Published: November 2025 Last Updated: November 2025 Status: Draft Visibility: PUBLIC Tracking Bug: crbug.com/461681036 This document is part ...

More details: docs.google.com/document/d/1...

Implementation: source.chromium.org/chromium/chr...

09.12.2025 10:00 — 👍 3    🔁 0    💬 0    📌 1

V8 now has a JS bytecode verifier!

IMO a good example for the benefits of the V8 Sandbox architecture:
- Hard: verify that bytecode is correct (no memory corruption)
- Easier: verify that it is secure (no out-of-sandbox memory corruption)

The sandbox basically separates correctness from security.

09.12.2025 10:00 — 👍 19    🔁 4    💬 1    📌 0
Google Issue Tracker

We derestricted a number of vulnerabilities found by Big Sleep in JavaScriptCore today: issuetracker.google.com/issues?q=com...

All of them were fixed in the iOS 26.1 (and equivalent) update last month. Definitely some cool bugs in there!

03.12.2025 17:28 — 👍 5    🔁 3    💬 0    📌 0

I've uploaded the slides of my recent talk "JS Engine Security in 2025": saelo.github.io/presentation.... I think there'll also be a recording available at some point (otherwise I can make one as not everything's in the slides).

Fantastic conference as usual, big thanks to the PoC Crew!

24.11.2025 09:58 — 👍 21    🔁 10    💬 0    📌 0
About the security content of iOS 26.1 and iPadOS 26.1 - Apple Support This document describes the security content of iOS 26.1 and iPadOS 26.1.

Some more cool JS Engine bugs found by Big Sleep were fixed in yesterday's Apple security updates: support.apple.com/en-us/125632
Technical details will be available soon at issuetracker.google.com/issues?q=com...

04.11.2025 17:10 — 👍 7    🔁 3    💬 1    📌 0

We derestricted crbug.com/382005099 today which might just be my favorite bug of the last few years: bad interaction between WebAudio changing the CPU's handling of floats and V8 not expecting that. See crbug.com/382005099#co... for a PoC exploit. Also affected other browsers

29.10.2025 14:27 — 👍 17    🔁 6    💬 0    📌 0
Preview
Blog - Memory Integrity Enforcement: A complete vision for memory safety in Apple devices - Apple Security Research Memory Integrity Enforcement (MIE) is the culmination of an unprecedented design and engineering effort spanning half a decade that combines the unique strengths of Apple silicon hardware with our adv...

I have often stated that well-implemented memory tagging will be a game changer for memory corruptions. And it seems that with the next iPhone it's finally here: security.apple.com/blog/memory-...

10.09.2025 08:06 — 👍 55    🔁 16    💬 4    📌 4

It's been a great pleasure being part of the core V8 team and I'll still be active in the V8 Security space in a (mostly) consulting role to help ensure the V8 Sandbox keeps progressing and becomes a strong security boundary! :)

12.08.2025 11:37 — 👍 5    🔁 0    💬 0    📌 0
Google Issue Tracker

Some personal news: I'm thrilled to be moving back to Project Zero! Specifically I'll be joining the Big Sleep project to find vulnerabilities in JavaScript engines. We've already found and reported our first vulnerability in V8 last week: issuetracker.google.com/issues/43621...

12.08.2025 11:37 — 👍 24    🔁 2    💬 1    📌 0
Preview
Add V8SandboxFuzzer · googleprojectzero/fuzzilli@675eccd This is a basic fuzzer for the V8 Sandbox. It uses the memory corruption API to implement a random-but-deterministic (given a seed) traversal through the V8 heap object graph and corrupts some obje...

We released our Fuzzilli-based V8 Sandbox fuzzer: github.com/googleprojec...
It explores the heap to find interesting objects and corrupts them in a deterministic way using V8's memory corruption API. Happy fuzzing!

01.08.2025 07:21 — 👍 24    🔁 6    💬 0    📌 0
Chromium

It's not (yet) meant for production use, but should offer a preliminary look at where things might be heading. See crbug.com/350324877 for more details.

Feedback welcome! :)

09.07.2025 09:04 — 👍 7    🔁 0    💬 0    📌 0

If you have a machine with PKEY support and somewhat recent Linux kernel you can now play around with hardware support for the V8 sandbox. When active, JS + Wasm code has no write permissions outside the sandbox address space. To enable, simply set `v8_enable_sandbox_hardware_support = true`.

09.07.2025 09:04 — 👍 18    🔁 4    💬 1    📌 2
Software Engineer III, V8 Security — Google Careers

V8 Security is hiring in Munich, Germany: www.google.com/about/career...

Great opportunity to work on some really hard and interesting problems in the security space!

02.07.2025 16:34 — 👍 12    🔁 5    💬 0    📌 0
Preview
V8 Exploit Tracker 2024 Issue First Exploited Description Exploit requires V8 Sandbox Bypass Exploit requires optimizing JITs (Turbofan & Maglev) Exploit requires any JITs (Liftoff, Sparkplug, Maglev & Turbofan) Varian...

And I've also updated our V8 Exploit Tracker sheet now: docs.google.com/document/d/1... (see the 2025 tab) :)

03.06.2025 07:42 — 👍 6    🔁 1    💬 0    📌 0
Preview
Stable Channel Update for Desktop The Stable channel has been updated to 137.0.7151.68/.69 for Windows, Mac and  137.0.7151.68 for Linux which will roll out over the coming...

chromereleases.googleblog.com/2025/06/stable-channel-update-for-desktop.html

Some cool things to note though:
- the bug was mitigated via finch kill switch a day after the report from TAG
- we also fixed the V8 Sandbox bypass within 7 days even though it's not yet considered a security boundary

03.06.2025 07:42 — 👍 8    🔁 0    💬 1    📌 0

I’m very excited to announce that we at V8 Security have finally published our first version of Fuzzilli that understands Wasm!
Go check it out at https://github.com/googleprojectzero/fuzzilli.
While we still have a way to go in improving it, we think it shows a promising approach!

04.02.2025 19:34 — 👍 31    🔁 16    💬 1    📌 1
Preview
Chrome Vulnerability Reward Program Rules | Google Bug Hunters ATTENTION As of 4 February 2024, Chromium has migrated to a new issue tracker, please report security bugs to the new issue tracker using this form . Please see the Chrome VRP News and FAQ page for mo...

Another big step towards becoming a security boundary: today we’re expanding the VRP for the V8 Sandbox

* No longer limited to d8

* Rewards for controlled writes increased to $20k

* Any memory corruption outside the sandbox is now in scope

bughunters.google.com/about/rules/...

Happy hacking!

13.11.2024 18:05 — 👍 28    🔁 10    💬 1    📌 0

This for example shows that the V8 Sandbox is pretty promising in terms of "bug coverage". Of course that also assumes that it'll become a strong security boundary (it's still pretty soft at the moment), see bsky.app/profile/sael...

07.06.2024 16:01 — 👍 3    🔁 0    💬 0    📌 0
Preview
Exploited V8 Bugs in 2024 Exploited V8 Bugs in 2024 Issue First Exploited Description Exploit requires V8 Sandbox Bypass Exploit requires JIT compilation Variant JavaScript or WebAssembly Introduced by Introduced in b/4149033...

Thanks to events like Pwn2Own or our V8CTF (~= exploit bounty program), we now have more data about the types of bugs exploited in V8. Based on that, we've gathered some basic statistics: docs.google.com/document/d/1...

07.06.2024 16:00 — 👍 3    🔁 0    💬 1    📌 0

And the recording is now also public: youtu.be/5otAw81AHQ0?... thanks @offensivecon.bsky.social!

05.06.2024 08:38 — 👍 0    🔁 0    💬 0    📌 1

Finally got around to publishing the slides of my talk @offensivecon.bsky.social from ~two weeks ago. Sorry for the delay!

The V8 Heap Sandbox: saelo.github.io/presentation...

Fantastic conference, as usual! :)

22.05.2024 19:01 — 👍 4    🔁 5    💬 0    📌 1

Thanks Justin!

04.04.2024 17:46 — 👍 1    🔁 0    💬 0    📌 0

Big day for the V8 Sandbox:
* Now included in the Chrome VRP: g.co/chrome/vrp/#...
* Motivation & goals discussed in a new technical blog post: v8.dev/blog/sandbox

If there is ever a Sandbox "beta" release, this is it!

04.04.2024 13:07 — 👍 6    🔁 3    💬 0    📌 0

New V8 Sandbox design document is out: docs.google.com/document/d/1...

This discusses how a hardware-based sandbox instead of the currently purely software-based one might look like in a somewhat distant future (if at all)

15.02.2024 10:00 — 👍 0    🔁 0    💬 0    📌 0
Benchmark results on Speedometer2 showing that the overall performance impact of the V8 sandbox is only around 1% total

Benchmark results on Speedometer2 showing that the overall performance impact of the V8 sandbox is only around 1% total

Some early performance numbers for the V8 Sandbox: looks like with most of the performance critical parts in place now, the overall performance cost of this future security boundary is only around 1% on popular benchmarks \o/

More results linked from chromium-review.googlesource.com/c/v8/v8/+/52...

19.01.2024 10:21 — 👍 2    🔁 1    💬 0    📌 0
Preview
V8 Sandbox - Glossary

I've been meaning to write this for some time now and finally got around to it: a "V8 Sandbox Glossary" document that briefly explains the most important terms/concepts used for the sandbox and links to the respective design documents: docs.google.com/document/d/1...

08.12.2023 12:35 — 👍 0    🔁 0    💬 0    📌 0
Preview
V8 Sandbox - Trusted Space V8 Sandbox - Trusted Space Author: saelo@ First Published: October 2023 Last Updated: October 2023 Status: Living Doc Visibility: PUBLIC This document is part of the V8 Sandbox Project and discusses...

Trusted space design doc: docs.google.com/document/d/1...

30.11.2023 17:14 — 👍 1    🔁 0    💬 0    📌 0
Gerrit Code Review

Another exciting step for the V8 sandbox: with crrev.com/c/5007733 BytecodeArrays are now the first objects to move into the new trusted heap space! Still a number of remaining issues around bytecode execution, but this fixes the long-standing issue that an attacker could directly corrupt bytecode

30.11.2023 17:13 — 👍 3    🔁 2    💬 1    📌 0
Preview
V8 Sandbox - High-Level Design Doc V8 Sandbox Aka. “Ubercage” Author: saelo@ First Published: July 2021 Last Updated: October 2023 Status: Living Doc Visibility: PUBLIC This document is part of the V8 Sandbox Project and covers th...

I've also updated the high-level design document (in particular the summary diagram) to better reflect the current design: docs.google.com/document/d/1...

20.10.2023 13:34 — 👍 1    🔁 0    💬 0    📌 0

@saelo is following 20 prominent accounts