Alex Rebert Profile
Alex Rebert

@ayper

Followers
523
Following
431
Media
5
Statuses
118

Security @ Google. Previously co-founder of @ForAllSecure. Opinions here are my own. @[email protected]

Pittsburgh
Joined August 2008
Don't wanna be here? Send us removal request.
@argvee
Heather Adkins - Ꜻ - Spes consilium non est
1 month
Hardening the C++ Standard Library at massive scale. A look at increasing memory safety with libc++ hardening — a collaborative paper from engineers at Apple and Google. The results have been impressive: at Google the team discovered and fixed 1000+ bugs as hardening was enabled.
1
33
283
@ayper
Alex Rebert
10 months
We're joining forces with industry & academia to call for memory safety standardization: https://t.co/UOVODzi0RZ. It's a recognition that memory unsafety is no longer a niche technical problem but a societal one, impacting everything from national security to personal privacy.
Tweet card summary image
security.googleblog.com
Posted by Alex Rebert, Security Foundations, Ben Laurie, Research, Murali Vijayaraghavan, Research and Alex Richardson, Silicon For decades,...
2
16
63
@GoogleVRP
Google VRP (Google Bug Hunters)
11 months
🛡️Want to help make the open source world safer and earn up to $45k 💰? We've revamped our Patch Rewards Program, extending its scope and increasing rewards for security patches – with a particular focus on memory safety, including bonus multipliers! https://t.co/pUiYgTRdsA
Tweet card summary image
bughunters.google.com
This blog post takes you through everything you need to know about the Patch Rewards Program, including our newly introduced focus on memory safety (including reward multipliers!), recently increased...
0
30
147
@GoogleVRP
Google VRP (Google Bug Hunters)
1 year
Celebrating 15 years of password hacking 💻 🔑, Swiss Army knives (and sometimes even chainsaws or swords) included! 😲 Discover how Google's security teams turn employee farewells into security tests. https://t.co/Mapn7Nrs78
Tweet card summary image
bughunters.google.com
The Leaving Tradition in Google's security team, which could be described as a type of small-scale offensive security exercise, is a great (and fun) example of team culture. Curious? See this blog...
1
31
109
@kinu
Kinuko Yasuda
1 year
Bounds-checking in C++: so people ask if the .3% overhead is real. It's not just a benchmark result, we got this through our Google-Wide profiling, that gives us the live insights from DCs. This surprised us too as it was much cheaper than we thought https://t.co/zBUvoYzGi1
Tweet card summary image
research.google
@ayper
Alex Rebert
1 year
Excited to share our latest post on memory safety! We're tackling spatial safety in our massive C++ codebase by hardening libc++ *by default*. It adds bounds checks to things like std::vector, preventing a fair bit of out-of-bounds vulnerabilities:
1
14
26
@ayper
Alex Rebert
1 year
The best part? It's incredibly cost-effective, with an average performance overhead of just 0.30%.  So there's really no reason not to do it if you're running C++ code :)
1
2
26
@ayper
Alex Rebert
1 year
This improves spatial memory safety across Google's services, including performance-critical components of Search, Gmail, Drive, YouTube, and Maps.  We've already seen it disrupt a red team exercise, reduce segfaults by 30%, and improve code correctness.
2
5
43
@ayper
Alex Rebert
1 year
Excited to share our latest post on memory safety! We're tackling spatial safety in our massive C++ codebase by hardening libc++ *by default*. It adds bounds checks to things like std::vector, preventing a fair bit of out-of-bounds vulnerabilities:
Tweet card summary image
security.googleblog.com
Posted by Alex Rebert and Max Shavrick, Security Foundations, and Kinuko Yasuda, Core Developer Attackers regularly exploit spatial mem...
2
50
249
@we1x
Lukas Weichselbaum
1 year
The dedication and hard work has payed off: "for hundreds of complex web applications that are built on Google’s hardened and safe-by-design frameworks, we've averaged less than one XSS report per year in total" (see page 9 of the whitepaper).
@argvee
Heather Adkins - Ꜻ - Spes consilium non est
1 year
Secure by design takes dedication and years of hard work to get the balance right between velocity and safety. Read a bit about @Google’s commitment and journey in our new white paper. Humbled to work with the professionals that make this happen everyday.
3
6
28
@durumcrustulum
Deirdre Connolly¹
1 year
Percentage of codebase that's memory-safe 📈, memory-safety vulns 📉, EVEN IF YOU KEEP ADDING LINES OF C 🤯
@SCWpod
Security Cryptography Whatever
1 year
NEW EPISODE! You may not be rewriting the world in Rust, but if you walk like the Android team, you'll drive down your memory-unsafety vulnerabilities more than 2X below the industry average over time! 🎉 https://t.co/KyH1NtVbC3 https://t.co/adWaPJBvKH
1
3
9
@ayper
Alex Rebert
1 year
Excited to share Google's memory safety strategy! We're working to build safer software by migrating to memory-safe languages like Rust as well as hardening our existing C++: https://t.co/UdmcghPhbO. We'll be sharing more details in upcoming posts.
security.googleblog.com
Posted by Alex Rebert, Security Foundations, and Chandler Carruth, Jen Engel, Andy Qin, Core Developers Error-prone interactions between ...
3
72
236
@ayper
Alex Rebert
1 year
Google CVR is doing incredible vulnerability research.
@amlweems
Anthony Weems
1 year
Learn how Google CVR could have potentially exfiltrated Gemini 1.0 Pro before launch last year. We describe the vulnz, the fix, and tips for bughunters. Also, shout-out to @epereiralopez for teaming up to adapt this work to another cloud provider. https://t.co/65PY5o3mtV
0
0
5
@tylerni7
tylerni7
1 year
Released a blog about our @theori_io AIxCC experience! https://t.co/EpJrsyXsmO @tjbecker_ and I were hoping to have more info about other challenges, but they aren't released, so some of the information is a bit limited. Still, hope folks can enjoy reading it!
Tweet card summary image
medium.com
In August, Theori’s CTF team, as part of the Maple Mallard Magistrates, won Defcon CTF for the 3rd year in a row–the first team ever to do…
0
19
62
@ayper
Alex Rebert
1 year
The drop in Android's memory safety vulnerabilities is astonishing. It's counterintuitive, but prioritizing memory-safe languages in new code quickly reduces memory-safety risks. Once we turn off the tap of new vulnerabilities, they start decreasing exponentially.
@jeffvanderstoep
Jeff Vander Stoep
1 year
I’m super excited about this blogpost. The approach is so counterintuitive, and yet the results are so much better than anything else that we’ve tried for memory safety. We finally understand why. https://t.co/cBc3gMLzO6
2
3
35
@amlweems
Anthony Weems
1 year
Excited to share this blog post about server-side memory corruption that my team exploited in production. Shout-out to @scannell_simon, @epereiralopez, and @thatjiaozi - this was a very fun project. :-) https://t.co/63Ho3HvF4w
0
40
152
@royalhansen
Royal Hansen
2 years
"just as our efforts to eliminate XSS attacks through tooling showed, removing large classes of exploits both directly benefits consumers of software and allows us to move our focus to addressing further classes of security vulnerabilities." https://t.co/u3ZvvSO5Dd
Tweet card summary image
security.googleblog.com
Alex Rebert, Software Engineer, Christoph Kern, Principal Engineer, Security Foundations Google’s Project Zero reports that memory safety v...
1
3
21
@royalhansen
Royal Hansen
2 years
Today I spoke on the importance of Secure by Design on behalf of @Google alongside @CISAgov @FDD @VenableLLP & more. We also launched a paper on @Google's approach to Secure by Design & published on how it can be applied to address memory safety vulns:
Tweet card summary image
blog.google
Our new report — Secure by Design at Google — outlines our principles and approaches for strengthening security through design.
0
19
43
@GoogleVRP
Google VRP (Google Bug Hunters)
2 years
Ever struggle with C++ buffer issues? Spatial Safety is one of the main root causes for in-the-wild exploits! Read more about how we piloted the LLVM proposal for C++ Buffer Hardening here: https://t.co/IWdLxFjc4V
Tweet card summary image
bughunters.google.com
In this blog post, we're sharing how we evaluated LLVM's proposed approach at Google, outlining our initial conclusions from this process, sharing useful adoption tips, and pointing to the next steps...
0
33
137
@caseyjohnellis
cje
2 years
this is a big one… if you have opinions on this, make sure that they are heard 👀 Fact Sheet: Office of the National Cyber Director Requests Public Comment on Open-Source Software Security and Memory Safe Programming Languages | ONCD | The White House
1
16
37
@perribus
Perri Adams
2 years
I’m excited to announce the AI Cyber Challenge, a major, two-year @DARPA competition challenging the best and the brightest in cybersecurity and AI to secure the systems on which all American rely. https://t.co/mZR4ZNSiaM
5
82
260