Vulnerability Reward Program: 2022 Year in Review

Posted by Sarah Jacobus, Vulnerability Rewards Team It has been another incredible year for the Vulnerability Reward Programs (VRPs) at Google! Working with security researchers throughout 2022, we have been able to identify and fix over 2,900 security issues and continue to make … | Continue reading


@security.googleblog.com | 1 year ago

Hardening Firmware Across the Android Ecosystem

Posted by Roger Piqueras Jover, Ivan Lozano, Sudhi Herle, and Stephan Somogyi, Android Team A modern Android powered smartphone is a complex hardware device: Android OS runs on a multi-core CPU - also called an Application Processor (AP). And the AP is one of many such processors … | Continue reading


@security.googleblog.com | 1 year ago

The US Government says companies should take more responsibility for cyberattacks. We agree.

Posted by Kent Walker, President, Global Affairs & Chief Legal Officer, Google & Alphabet and Royal Hansen, Vice President of Engineering for Privacy, Safety, and Security Should companies be responsible for cyberattacks? The U.S. government thinks so – and frankly, we agree. Jen … | Continue reading


@security.googleblog.com | 1 year ago

Taking the next step: OSS-Fuzz in 2023

Posted by Oliver Chang, OSS-Fuzz team Since launching in 2016, Google's free OSS-Fuzz code testing service has helped get over 8800 vulnerabilities and 28,000 bugs fixed across 850 projects. Today, we’re happy to announce an expansion of our OSS-Fuzz Rewards Program, plus new fea … | Continue reading


@security.googleblog.com | 1 year ago

Sustaining Digital Certificate Security - TrustCor Certificate Distrust

Posted by Chrome Root Program, Chrome Security Team Note: This post is a follow-up to discussions carried out on the Mozilla “Dev Security Policy” Web PKI public discussion forum Google Group in December 2022. Google Chrome communicated its distrust of TrustCor in the public foru … | Continue reading


@security.googleblog.com | 1 year ago

Supporting the Use of Rust in the Chromium Project

Posted by Dana Jansens (she/her), Chrome Security Team We are pleased to announce that moving forward, the Chromium project is going to support the use of third-party Rust libraries from C++ in Chromium. To do so, we are now actively pursuing adding a production Rust toolchain to … | Continue reading


@security.googleblog.com | 1 year ago

Expanding the App Defense Alliance

Posted by Brooke Davis, Android Security and Privacy Team The App Defense Alliance launched in 2019 with a mission to protect Android users from bad apps through shared intelligence and coordinated detection between alliance partners. Earlier this year, the App Defense Alliance e … | Continue reading


@security.googleblog.com | 1 year ago

Announcing OSV-Scanner: Vulnerability Scanner for Open Source

Posted by Rex Pan, software engineer, Google Open Source Security TeamToday, we’re launching the OSV-Scanner, a free tool that gives open source developers easy access to vulnerability information relevant to their project. Last year, we undertook an effort to improve vulnerabili … | Continue reading


@security.googleblog.com | 1 year ago

Trust in transparency: Private Compute Core

Posted by Dave Kleidermacher, Dianne Hackborn, and Eugenio Marchiori We care deeply about privacy. We also know that trust is built by transparency. This blog, and the technical paper reference within, is an example of that commitment: we describe an important new Android privacy … | Continue reading


@security.googleblog.com | 1 year ago

Enhanced Protection - The strongest level of Safe Browsing protection Google Chrome has to offer

Posted by Benjamin Ackerman, Chrome Security and Jonathan Li, Safe Browsing As a follow-up to a previous blog post about How Hash-Based Safe Browsing Works in Google Chrome, we wanted to provide more details about Safe Browsing’s Enhanced Protection mode in Chrome. Specifically, … | Continue reading


@security.googleblog.com | 1 year ago

Memory Safe Languages in Android 13

Posted by Jeffrey Vander Stoep For more than a decade, memory safety vulnerabilities have consistently represented more than 65% of vulnerabilities across products, and across the industry. On Android, we’re now seeing something different - a significant drop in memory safety vul … | Continue reading


@security.googleblog.com | 1 year ago

Our Principles for IoT Security Labeling

Posted by Dave Kleidermacher, Eugene Liderman, and Android and Made by Google security teams We believe that security and transparency are paramount pillars for electronic products connected to the Internet. Over the past year, we’ve been excited to see more focused activity acro … | Continue reading


@security.googleblog.com | 1 year ago

GUAC, a great pairing with SLSA (and SBOM)

Posted by Brandon Lum, Mihai Maruseac, Isaac Hepworth, Google Open Source Security Team Supply chain security is at the fore of the indust... | Continue reading


@security.googleblog.com | 1 year ago

Announcing GUAC, a great pairing with SLSA (and SBOM)!

Posted by Brandon Lum, Mihai Maruseac, Isaac Hepworth, Google Open Source Security Team Supply chain security is at the fore of the industry’s collective consciousness. We’ve recently seen a significant rise in software supply chain attacks, a Log4j vulnerability of catastrophic … | Continue reading


@security.googleblog.com | 1 year ago

Security of Passkeys in the Google Password Manager

Posted by Arnar Birgisson, Software EngineerWe are excited to announce passkey support on Android and Chrome for developers to test today, with general availability following later this year. In this post we cover details on how passkeys stored in the Google Password Manager are … | Continue reading


@security.googleblog.com | 1 year ago

Google Pixel 7 and Pixel 7 Pro: The next evolution in mobile security

Dave Kleidermacher, Jesse Seed, Brandon Barbello, Sherif Hanna, Eugene Liderman, Android, Pixel, and Silicon Security Teams Every day, billions of people around the world trust Google products to enrich their lives and provide helpful features – across mobile devices, smart home … | Continue reading


@security.googleblog.com | 1 year ago

Use-after-freedom: MiraclePtr

Posted by Adrian Taylor, Bartek Nowierski and Kentaro Hara on behalf of the MiraclePtr team Memory safety bugs are the most numerous category of Chrome security issues and we’re continuing to investigate many solutions – both in C++ and in new programming languages. The most comm … | Continue reading


@security.googleblog.com | 1 year ago

Fuzzing beyond memory corruption: Finding broader classes of vulnerabilities automatically

Posted by Jonathan Metzman, Dongge Liu and Oliver Chang, Google Open Source Security Team Recently, OSS-Fuzz—our community fuzzing service that regularly checks 700 critical open source projects for bugs—detected a serious vulnerability (CVE-2022-3008): a bug in the TinyGLTF proj … | Continue reading


@security.googleblog.com | 1 year ago

Announcing Google’s Open Source Software Vulnerability Rewards Program

Posted by Francis Perron, Open Source Security Technical Program Manager, and Krzysztof Kotowicz, Information Security Engineer Today, we are launching Google’s Open Source Software Vulnerability Rewards Program (OSS VRP) to reward discoveries of vulnerabilities in Google’s open … | Continue reading


@security.googleblog.com | 1 year ago

Announcing the Open Sourcing of Paranoid's Library

Posted by Pedro Barbosa, Security Engineer, and Daniel Bleichenbacher, Software EngineerParanoid is a project to detect well-known weaknesses in large amounts of crypto artifacts, like public keys and digital signatures. On August 3rd 2022 we open sourced the library containing t … | Continue reading


@security.googleblog.com | 1 year ago

Making Linux Kernel Exploit Cooking Harder

Posted by Eduardo Vela, Exploit Critic Cover of the medieval cookbook. Title in large letters kernel Exploits. Adorned. Featuring a small pe... | Continue reading


@security.googleblog.com | 1 year ago

Making Linux Kernel Exploit Cooking Harder

Posted by Eduardo Vela, Exploit CriticCover of the medieval cookbook. Title in large letters kernel Exploits. Adorned. Featuring a small penguin. 15th century. Color. High quality picture. Private collection. Detailed.The Linux kernel is a key component for the security of the In … | Continue reading


@security.googleblog.com | 1 year ago

How Hash-Based Safe Browsing Works in Google Chrome

By Rohit Bhatia, Mollie Bates, Google Chrome Security There are various threats a user faces when browsing the web. Users may be tricked into sharing sensitive information like their passwords with a misleading or fake website, also called phishing. They may also be led into inst … | Continue reading


@security.googleblog.com | 1 year ago

DNS-over-HTTP/3 in Android

Posted by Matthew Maurer and Mike Yu, Android team To help keep Android users’ DNS queries private, Android supports encrypted DNS. I... | Continue reading


@security.googleblog.com | 1 year ago

DNS-over-HTTP/3 in Android

Posted by Matthew Maurer and Mike Yu, Android team To help keep Android users’ DNS queries private, Android supports encrypted DNS. In addition to existing support for DNS-over-TLS, Android now supports DNS-over-HTTP/3 which has a number of improvements over DNS-over-TLS. Mos … | Continue reading


@security.googleblog.com | 1 year ago

Game on! The 2022 Google CTF is here.

Posted by Jan Keller, Technical Entertainment Manager, Bug Hunters Are you ready to put your hacking skills to the test? It’s Google CTF time!The competition kicks off on July 1 2022 6:00 PM UTC and runs through July 3 2022 6:00 PM UTC. Registration is now open at http://goo.gle/ … | Continue reading


@security.googleblog.com | 1 year ago

SBOM in Action: finding vulnerabilities with a Software Bill of Materials

Posted by Brandon Lum and Oliver Chang, Google Open Source Security TeamThe past year has seen an industry-wide effort to embrace Software Bills of Materials (SBOMs)—a list of all the components, libraries, and modules that are required to build a piece of software. In the wake o … | Continue reading


@security.googleblog.com | 1 year ago

Announcing the winners of the 2021 GCP VRP Prize

Posted by Harshvardhan Sharma, Information Security Engineer, Google 2021 was another record-breaking year for our Vulnerability Rewards Program (VRP). We paid a total of $8.7 million in rewards, our highest amount yet. 2021 saw some amazing work from the security research commun … | Continue reading


@security.googleblog.com | 1 year ago

Retrofitting Temporal Memory Safety on C++

Posted by Anton Bikineev, Michael Lippautz and Hannes Payer, Chrome security team Memory safety in Chrome is an ever-ongoing effort to prot... | Continue reading


@security.googleblog.com | 1 year ago

Retrofitting Temporal Memory Safety on C++

Posted by Anton Bikineev, Michael Lippautz and Hannes Payer, Chrome security teamMemory safety in Chrome is an ever-ongoing effort to protect our users. We are constantly experimenting with different technologies to stay ahead of malicious actors. In this spirit, this post is abo … | Continue reading


@security.googleblog.com | 1 year ago

Privileged pod escalations in Kubernetes and GKE

Posted by GKE and Anthos Platform Security Teams At the KubeCon EU 2022 conference in Valencia, security researchers from Palo Alto Networks presented research findings on “trampoline pods”—pods with an elevated set of privileges required to do their job, but that could conceivab … | Continue reading


@security.googleblog.com | 1 year ago

I/O 2022: Android 13 security and privacy (and more!)

Posted by Eugene Liderman and Sara N-Marandi, Android Security and Privacy TeamEvery year at I/O we share the latest on privacy and security features on Android. But we know some users like to go a level deeper in understanding how we’re making the latest release safer, and more … | Continue reading


@security.googleblog.com | 1 year ago

Taking on the Next Generation of Phishing Scams

Posted by Daniel Margolis, Software Engineer, Google Account Security Team Every year, security technologies improve: browsers get better, encryption becomes ubiquitous on the Web, authentication becomes stronger. But phishing persistently remains a threat (as shown by a recent p … | Continue reading


@security.googleblog.com | 1 year ago

We fought bad apps and developers in 2021

Posted by Steve Kafka and Khawaja Shams, Android Security and Privacy Team Providing a safe experience to billions of users continues to ... | Continue reading


@security.googleblog.com | 2 years ago

The Package Analysis Project: Scalable detection of malicious open source packages

Posted by Caleb Brown, Open Source Security Team Despite open source software’s essential role in all software built today, it’s far too easy for bad actors to circulate malicious packages that attack the systems and users running that software. Unlike mobile app stores that can … | Continue reading


@security.googleblog.com | 2 years ago

How we fought bad apps and developers in 2021

Posted by Steve Kafka and Khawaja Shams, Android Security and Privacy Team Providing a safe experience to billions of users continues to be one of the highest priorities for Google Play. Last year we introduced multiple privacy focused features, enhanced our protections against b … | Continue reading


@security.googleblog.com | 2 years ago

Improving software supply chain security with tamper-proof builds

Posted by Asra Aliand Laurent Simon, Google Open Source Security Team (GOSST) Many of the recent high-profile software attacks that have ala... | Continue reading


@security.googleblog.com | 2 years ago

What's up with in-the-wild exploits? Plus, what we're doing about it

Posted by Adrian Taylor, Chrome Security Team If you are a regular reader of our Chrome release blog , you may have noticed that phrases l... | Continue reading


@security.googleblog.com | 2 years ago

Vulnerability Reward Program: 2021 Year in Review

Posted by Sarah Jacobus, Vulnerability Rewards Team  Last year was another record setter for our Vulnerability Reward Programs (VRPs). Throu... | Continue reading


@security.googleblog.com | 2 years ago

Understanding the Impact of Apache Log4j Vulnerability

Posted by James Wetter and Nicky Ringland, Open Source Insights Team  More than 35,000 Java packages, amounting to over 8% of the Maven Cent... | Continue reading


@security.googleblog.com | 2 years ago

Finding RCEs as in Log4j with fuzz testing

Posted by Jonathan Metzman, Google Open Source Security Team The discovery of the Log4Shell vulnerability has set the internet on fire. Sim... | Continue reading


@security.googleblog.com | 2 years ago

Exploring Container Security: A Storage Vulnerability Deep Dive

Posted by Fabricio Voznika and Mauricio Poppe, Google Cloud  Kubernetes Security is constantly evolving - keeping pace with enhanced functio... | Continue reading


@security.googleblog.com | 2 years ago

Trick&Treat Paying Leets and Sweets for Linux Kernel Privescs and K8s Escapes

Posted by Eduardo Vela, Google Bug Hunters Team  Starting today and for the next 3 months (until January 31 2022), we will pay 31,337 USD to... | Continue reading


@security.googleblog.com | 2 years ago

Pixel 6: Setting a new standard for mobile security with RISC-V

Posted by Dave Kleidermacher, Jesse Seed, Brandon Barbello, and Stephan Somogyi, Android, Pixel & Tensor security teams With Pixel 6 and P... | Continue reading


@security.googleblog.com | 2 years ago

Protecting your device information with Private Set Membership

Posted by Kevin Yeo and Sarvar Patel, Private Computing Team  At Google, keeping you safe online is our top priority, so we continuously bui... | Continue reading


@security.googleblog.com | 2 years ago

Launching a collaborative minimum security baseline

Posted by Royal Hansen, Vice President, Security  According to an Opus and Ponemon Institute study , 59% of companies have experienced a dat... | Continue reading


@security.googleblog.com | 2 years ago

Google Protects Your Accounts – Even When You No Longer Use Them

Posted by Sam Heft-Luthy, Product Manager, Privacy & Data Protection Office  What happens to our digital accounts when we stop using them? I... | Continue reading


@security.googleblog.com | 2 years ago

The Secure Open Source Pilot Program

Posted by Meder Kydyraliev and Kim Lewandowski, Google Open Source Security Team Over the past year we have made a number of investments to ... | Continue reading


@security.googleblog.com | 2 years ago