Project Zero Explained

Project Zero is a team of security analysts employed by Google tasked with finding zero-day vulnerabilities.[1] It was announced on 15 July 2014.[2]

History

After finding a number of flaws in software used by many end-users while researching other problems, such as the critical "Heartbleed" vulnerability, Google decided to form a full-time team dedicated to finding such vulnerabilities, not only in Google software but any software used by its users. The new project was announced on 15 July 2014 on Google's security blog.[2] When it launched, one of the principal innovations that Project Zero provided was a strict 90-day disclosure deadline along with a publicly visible bugtracker where the vulnerability disclosure process is documented.[3]

While the idea for Project Zero can be traced back to 2010, its establishment fits into the larger trend of Google's counter-surveillance initiatives in the wake of the 2013 global surveillance disclosures by Edward Snowden. The team was formerly headed by Chris Evans, previously head of Google's Chrome security team, who subsequently joined Tesla Motors.[4] Other notable members include security researchers Ben Hawkes, Ian Beer and Tavis Ormandy. Hawkes eventually became the team's manager and then resigned on 4 May 2022.

The team's focus is not just on finding bugs and novel attacks, but also on researching and publicly documenting how such flaws could be exploited in practice. This is done to ensure that defenders have sufficient understanding of attacks; the team keeps an extensive research blog with articles that describe individual attacks in detail.[5]

Bug finding and reporting

Bugs found by the Project Zero team are reported to the manufacturer and only made publicly visible once a patch has been released or if 90 days have passed without a patch being released. The 90-day-deadline is Google's way of implementing responsible disclosure, giving software companies 90 days to fix a problem before informing the public so that users themselves can take necessary steps to avoid attacks. There have been cases where the vendor does not produce any solution for the discovered flaws within 90 days, before the public disclosure by the team, increasing the risk to already-vulnerable users.[6]

Notable members

Past members

Notable discoveries

See also

Notes and References

  1. Meet 'Project Zero,' Google's Secret Team of Bug-Hunting Hackers. Greenberg. Andy. 2014-07-15. Wired. 2019-03-06. 1059-1028.
  2. Web site: Announcing Project Zero . Evans. Chris. 15 July 2014. Google Online Security Blog. 4 January 2015.
  3. Web site: Project Zero Bug Tracker. 2019-04-11.
  4. Web site: Chris Evans on Twitter. 2015-09-22.
  5. Web site: Project Zero Research Blog. 2019-04-11.
  6. Web site: Google discloses 'high severity' Mac security flaw ahead of patch. Fingas. John. March 4, 2019. Engadget. en. 2019-03-06.
  7. Web site: Google says it's too easy for hackers to find new security flaws. 3 February 2021.
  8. Web site: aPAColypse now: Exploiting Windows 10 in a Local Network with WPAD/PAC and JScript. 18 December 2017. 18 December 2017 .
  9. Web site: iOS zero-day let SolarWinds hackers compromise fully updated iPhones. 14 July 2021. 14 July 2021 .
  10. Web site: Over The Air: Exploiting Broadcom's Wi-Fi Stack (Part 1). 12 April 2019. 4 April 2017 .
  11. Web site: Searching statically-linked vulnerable library functions in executable code. 12 April 2019. 18 December 2018 .
  12. Web site: Meet 'Project Zero,' Google's Secret Team of Bug-Hunting Hackers. Greenberg. Andy. 15 July 2014. Wired.com. 4 January 2015.
  13. Web site: Lawfareblog Hard National Security Choices Matt Tait. 9 March 2017.
  14. Book: TIME Cybersecurity: Hacking, the Dark Web and You . 2018-01-19 . Time Inc. Books . 9781547842414 . en.
  15. Web site: Issue 118: Windows: Elevation of Privilege in ahcache.sys/NtApphelpCacheControl . 30 September 2014. 4 January 2015.
  16. Web site: Google posts Windows 8.1 vulnerability before Microsoft can patch it. Dent. Steven. 2 January 2015. Engadget. 4 January 2015.
  17. Web site: Exploiting the DRAM rowhammer bug to gain kernel privileges. 11 April 2019. 9 March 2015 .
  18. Web site: Issue 1139: cloudflare: Cloudflare Reverse Proxies are Dumping Uninitialized Memory . 19 February 2017. 24 February 2017.
  19. Web site: Incident report on memory leak caused by Cloudflare parser bug. 23 February 2017. Cloudflare. 24 February 2017.
  20. Web site: Another hole opens up in LastPass that could take weeks to fix. 2017-03-29. Naked Security. 2017-03-29.
  21. Web site: Siegrist. Joe. Security Update for the LastPass Extension. LastPass Blog. 2 May 2017. 31 March 2017. 7 April 2018. https://web.archive.org/web/20180407005605/https://blog.lastpass.com/2017/03/security-update-for-the-lastpass-extension.html/. dead.
  22. A Critical Intel Flaw Breaks Basic Security for Most Computers. Greenberg. Andy. 2018-01-03. WIRED. 2018-01-04. en-US.
  23. News: Google reveals CPU security flaw Meltdown and Spectre details. Davies. Chris. 2018-01-03. SlashGear. 2018-01-04. en-US.
  24. Web site: Tim . 2019-08-29 . Project Zero: A very deep dive into iOS Exploit chains found in the wild . 2019-08-30 . Project Zero.
  25. Web site: Cox . Joseph . 2019-08-30 . Google Says Malicious Websites Have Been Quietly Hacking iPhones for Years . 2019-08-30 . Vice . en.
  26. Web site: Goodin . Dan . 7 September 2019 . Apple takes flak for disputing iOS security bombshell dropped by Google . Ars Technica.
  27. Web site: Issue 1826: iMessage: malformed message bricks iPhone . bugs.chromium.org . 18 April 2019 . 9 September 2019 .
  28. Web site: Beer. Ian. Groß. Samuel. 2021-12-15. Project Zero: A deep dive into an NSO zero-click iMessage exploit: Remote Code Execution. 2021-12-16. Google Project Zero.