Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Project Zero

From Wikipedia, the free encyclopedia
Security analysis team employed by Google
For other uses, seeProject Zero (disambiguation).
icon
This article'slead sectionmay be too short to adequatelysummarize the key points. Please consider expanding the lead toprovide an accessible overview of all important aspects of the article.(August 2023)

Project Zero is a team of security analysts employed byGoogle tasked with findingzero-day vulnerabilities.[1] It was announced on 15 July 2014.[2]

History

[edit]

After finding a number of flaws in software used by many end-users while researching other problems, such as the critical "Heartbleed" vulnerability, Google decided to form a full-time team dedicated to finding such vulnerabilities, not only in Google software but any software used by its users. The new project was announced on 15 July 2014 on Google's security blog.[2] When it launched, one of the principal innovations that Project Zero provided was a strict 90-day disclosure deadline along with a publicly visible bugtracker where the vulnerability disclosure process is documented.[3]

While the idea for Project Zero can be traced back to 2010, its establishment fits into the larger trend of Google's counter-surveillance initiatives in the wake of the2013 global surveillance disclosures byEdward Snowden. The team was formerly headed by Chris Evans, previously head of Google'sChrome security team, who subsequently joinedTesla Motors.[4] Other notable members include security researchersBen Hawkes,Ian Beer andTavis Ormandy.[5] Hawkes eventually became the team's manager and then resigned on 4 May 2022.

The team's focus is not just on finding bugs and novel attacks, but also on researching and publicly documenting how such flaws could be exploited in practice. This is done to ensure that defenders have sufficient understanding of attacks; the team keeps an extensive research blog with articles that describe individual attacks in detail.[6]

Bug finding and reporting

[edit]

Bugs found by the Project Zero team are reported to the manufacturer and only made publicly visible once a patch has been released[2] or if 90 days have passed without a patch being released.[7] The 90-day-deadline is Google's way of implementingresponsible disclosure, giving software companies 90 days to fix a problem before informing the public so that users themselves can take necessary steps to avoid attacks.[7] There have been cases where the vendor does not produce any solution for the discovered flaws within 90 days, before the public disclosure by the team, increasing the risk to already-vulnerable users.[8]

Notable members

[edit]

Past members

[edit]

Notable discoveries

[edit]
  • One of the first Project Zero reports that attracted attention involved a flaw that allowed hackers to take control of software running theSafari browser.[18] For its efforts, the team, specifically Beer, was cited in Apple's brief note of thanks.
  • On 30 September 2014, Google detected a security flaw withinWindows 8.1's system call "NtApphelpCacheControl", which allows a normal user to gain administrative access.[19]Microsoft was notified of the problem immediately but did not fix the problem within 90 days, which meant information about the bug was made publicly available on 29 December 2014.[7] Releasing the bug to the public elicited a response from Microsoft that they are working on the problem.[7]
  • On 9 March 2015, Google Project Zero's blog posted a guest post that disclosed how a previously known hardware flaw in commonly deployed DRAM calledRow Hammer could be exploited to escalate privileges for local users.[20] This post spawned a large quantity of follow-up research both in the academic and hardware community.
  • On 19 February 2017, Google discovered a flaw withinCloudflare's reverse proxies,[21] which caused their edge servers to run past the end of a buffer and return memory that contained private information such as HTTP cookies, authentication tokens, HTTP POST bodies, and other sensitive data. Some of this data was cached by search engines.[22] A member of the Project Zero team referred to this flaw asCloudbleed.[21]
  • On 27 March 2017, Tavis Ormandy of Project Zero discovered a vulnerability in the popular password managerLastPass.[23] On 31 March 2017, LastPass announced they had fixed the problem.[24]
  • Project Zero was involved in discovering theMeltdown andSpectre vulnerabilities affecting many modernCPUs, which were discovered in mid-2017 and disclosed in early January 2018.[25] The issue was discovered by Jann Horn independently from the other researchers who reported the security flaw and was scheduled to be published on 9 January 2018 before moving the date up because of growing speculation.[9]
  • On 1 February 2019, Project Zero reported toApple that they had detected a set of five separate and complete iPhone exploit chains affectingiOS 10 through all versions ofiOS 12 not targeting specific users but having the ability to infect any user who visited an infected site. A series of hacked sites were being used in indiscriminatewatering hole attacks against their visitors which Project Zero estimated receive thousands of visitors per week. Project Zero felt the attacks indicated a group making a sustained effort to hack the users of iPhones in certain communities over a period of at least two years.[26] Apple fixed the exploits in the release of iOS 12.1.4 on 7 February 2019,[27] and said the fixes were already underway when reported by Project Zero.[28]
  • On 18 April 2019, Project Zero discovered a bug inAppleiMessage wherein a certain malformed message could causeSpringboard to "...crash and respawn repeatedly, causing the UI not to be displayed and the phone to stop responding to input."[29] This would completely crash theiPhone'sUI making it inoperable. This bug would persist even after ahard reset. The flaw also affected iMessage onMac with different results. Apple fixed the bug within the 90 day period before Project Zero released it.
  • In December 2021, the team published a technical breakdown of theFORCEDENTRY exploit based on its collaboration with Apple’sSecurity Engineering and Architecture (SEAR) group.[30]

See also

[edit]

References

[edit]
  1. ^Greenberg, Andy (15 July 2014)."Meet 'Project Zero,' Google's Secret Team of Bug-Hunting Hackers".Wired.ISSN 1059-1028. Retrieved6 March 2019.
  2. ^abcEvans, Chris (15 July 2014)."Announcing Project Zero".Google Online Security Blog. Retrieved4 January 2015.
  3. ^"Project Zero Bug Tracker". Retrieved11 April 2019.
  4. ^"Chris Evans on Twitter". Retrieved22 September 2015.
  5. ^abcdefGreenberg, Andy (15 July 2014)."Meet 'Project Zero,' Google's Secret Team of Bug-Hunting Hackers".Wired.com. Retrieved4 January 2015.
  6. ^"Project Zero Research Blog". Retrieved11 April 2019.
  7. ^abcdDent, Steven (2 January 2015)."Google posts Windows 8.1 vulnerability before Microsoft can patch it".Engadget. Retrieved4 January 2015.
  8. ^Fingas, John (4 March 2019)."Google discloses 'high severity' Mac security flaw ahead of patch".Engadget. Retrieved6 March 2019.
  9. ^abDavies, Chris (3 January 2018)."Google reveals CPU security flaw Meltdown and Spectre details".SlashGear. Retrieved4 January 2018.
  10. ^"Google says it's too easy for hackers to find new security flaws". Retrieved3 February 2021.
  11. ^ab"aPAColypse now: Exploiting Windows 10 in a Local Network with WPAD/PAC and JScript". 18 December 2017. Retrieved18 December 2017.
  12. ^"Over The Air: Exploiting Broadcom's Wi-Fi Stack (Part 1)". 4 April 2017. Retrieved12 April 2019.
  13. ^"Searching statically-linked vulnerable library functions in executable code". 18 December 2018. Retrieved12 April 2019.
  14. ^"Lawfareblog Hard National Security Choices Matt Tait". Retrieved9 March 2017.
  15. ^"Project Zero: Designing sockfuzzer, a network syscall fuzzer for XNU".Project Zero. 22 April 2021. Retrieved13 November 2024.
  16. ^"Project Zero: An EPYC escape: Case-study of a KVM breakout".Project Zero. 29 June 2021. Retrieved13 November 2024.
  17. ^"iOS zero-day let SolarWinds hackers compromise fully updated iPhones". 14 July 2021. Retrieved14 July 2021.
  18. ^TIME Cybersecurity: Hacking, the Dark Web and You. Time Inc. Books. 19 January 2018.ISBN 9781547842414.
  19. ^"Issue 118: Windows: Elevation of Privilege in ahcache.sys/NtApphelpCacheControl". 30 September 2014. Archived fromthe original on 14 March 2016. Retrieved4 January 2015.
  20. ^"Exploiting the DRAM rowhammer bug to gain kernel privileges". 9 March 2015. Retrieved11 April 2019.
  21. ^ab"Issue 1139: cloudflare: Cloudflare Reverse Proxies are Dumping Uninitialized Memory". 19 February 2017. Retrieved24 February 2017.
  22. ^"Incident report on memory leak caused by Cloudflare parser bug". Cloudflare. 23 February 2017. Retrieved24 February 2017.
  23. ^"Another hole opens up in LastPass that could take weeks to fix".Naked Security. 29 March 2017. Archived fromthe original on 10 October 2018. Retrieved29 March 2017.
  24. ^Siegrist, Joe (31 March 2017)."Security Update for the LastPass Extension".LastPass Blog. Archived fromthe original on 7 April 2018. Retrieved2 May 2017.
  25. ^Greenberg, Andy (3 January 2018)."A Critical Intel Flaw Breaks Basic Security for Most Computers".WIRED. Retrieved4 January 2018.
  26. ^Tim (29 August 2019)."Project Zero: A very deep dive into iOS Exploit chains found in the wild".Project Zero. Retrieved30 August 2019.
  27. ^Cox, Joseph (30 August 2019)."Google Says Malicious Websites Have Been Quietly Hacking iPhones for Years".Vice. Retrieved30 August 2019.
  28. ^Goodin, Dan (7 September 2019)."Apple takes flak for disputing iOS security bombshell dropped by Google".Ars Technica.
  29. ^"Issue 1826: iMessage: malformed message bricks iPhone". bugs.chromium.org. 18 April 2019. Retrieved9 September 2019.
  30. ^Beer, Ian; Groß, Samuel (15 December 2021)."Project Zero: A deep dive into an NSO zero-click iMessage exploit: Remote Code Execution".Google Project Zero. Retrieved16 December 2021.

External links

[edit]
a subsidiary ofAlphabet
Company
Divisions
Subsidiaries
Active
Defunct
Programs
Events
Infrastructure
People
Current
Former
Criticism
General
Incidents
Other
Software
A–C
D–N
O–Z
Operating systems
Machine learning models
Neural networks
Computer programs
Formats and codecs
Programming languages
Search algorithms
Domain names
Typefaces
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
Y
Hardware
Pixel
Smartphones
Smartwatches
Tablets
Laptops
Other
Nexus
Smartphones
Tablets
Other
Other
Advertising
Antitrust
Intellectual
property
Privacy
Other
Related
Concepts
Products
Android
Street View coverage
YouTube
Other
Documentaries
Books
Popular culture
Other
Retrieved from "https://en.wikipedia.org/w/index.php?title=Project_Zero&oldid=1313811944"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2026 Movatter.jp