Ivan Fratric πŸ’™πŸ’› Profile
Ivan Fratric πŸ’™πŸ’›

@ifsecure

Followers
19K
Following
1K
Media
30
Statuses
1K

Security researcher at Google Project Zero. Author: Jackalope, TinyInst, WinAFL, Domato. PhD. Tweets are my own. Backup @[email protected]

Joined August 2011
Don't wanna be here? Send us removal request.
@ifsecure
Ivan Fratric πŸ’™πŸ’›
3 years
The slides for my Black Hat talk "XMPP Stanza Smuggling or How I Hacked Zoom" are now available at
4
67
280
@ifsecure
Ivan Fratric πŸ’™πŸ’›
3 days
Great news for browser security (and not just because it cites my XSLT research :)). A lot of younger folks don't even know this feature exists, yet is/was the default attack surface in all major web browsers with a history of exploitation.
Tweet card summary image
developer.chrome.com
Prepare for Chrome deprecating and removing XSLT from the browser.
3
27
122
@ifsecure
Ivan Fratric πŸ’™πŸ’›
6 days
New Project Zero blog post, Defeating KASLR by Doing Nothing at All
@__sethJenkins
Seth Jenkins
6 days
We really should be talking about this more....KASLR is just not working properly on Android right now, and it hasn't for a long time. https://t.co/AE0vBXEcob
0
6
95
@FIIKSA
FII Institute
7 days
FII9: A Lesson for Optimism. Watch the defining moments from the 3-day conference in Riyadh, where global leaders and industry pioneers came together to unlock the next frontier of growth for humanity with the Key To Prosperity. Watch full sessions and exclusive insights now on
12
39
203
@__sethJenkins
Seth Jenkins
6 days
We really should be talking about this more....KASLR is just not working properly on Android right now, and it hasn't for a long time. https://t.co/AE0vBXEcob
6
57
189
@5aelo
Samuel Groß
11 days
We derestricted https://t.co/DvAkrs21i4 today which might just be my favorite bug of the last few years: bad interaction between WebAudio changing the CPU's handling of floats and V8 not expecting that. See https://t.co/ovkSmnegNP for a PoC exploit. Also affected other browsers
4
49
244
@ifsecure
Ivan Fratric πŸ’™πŸ’›
11 days
And no, sorry, still no trajectories :/
0
0
0
@vast_ai
vast.ai
1 month
Stop waiting for GPU access. Start training.
0
11
48
@ifsecure
Ivan Fratric πŸ’™πŸ’›
11 days
Also not a bad primer for what can go wrong when implementing a JavaScript engine.
1
0
1
@ifsecure
Ivan Fratric πŸ’™πŸ’›
11 days
Although the target might not be as impactful as some others we ran against, these bugs in QuickJS are some of my favorite Big Sleep finds, because they demonstrate the ability of LLMs to reason about and detect classic JavaScript engine vulnerabilities.
3
9
59
@ifsecure
Ivan Fratric πŸ’™πŸ’›
19 days
β€œI have [...] extreme fear because once things hit this level, you never know what’s going to happen”. Well I guess now he knows how his victims feel.
@lorenzofb
Lorenzo Franceschi-Bicchierai
19 days
SCOOP: A man who worked on developing hacking tools for defense contractor L3Harris Trenchant was notified by Apple that his iPhone was targeted with spyware. It's unclear who targeted him, but he believes he was the scapegoat of a leak investigation. https://t.co/dWAhfdE6Tw
1
5
56
@ifsecure
Ivan Fratric πŸ’™πŸ’›
20 days
A fun fact about this bug is that we only had an (entirely internally imposed) ~ 8 hour deadline to find it. Looking forward to sharing more info about it.
@natashenka
Natalie Silvanovich
24 days
Serious bugs often occur in third-party components integrated by other software. @ifsecure and I found this vulnerability in the Dolby Unified Decoder. It affects Android, iOS and Windows among other platforms, sometimes 0-click. https://t.co/LchMIdKP0P
1
4
69
@simonhg
Simon HG
2 months
The meaning of life
5
30
531
@natashenka
Natalie Silvanovich
24 days
Serious bugs often occur in third-party components integrated by other software. @ifsecure and I found this vulnerability in the Dolby Unified Decoder. It affects Android, iOS and Windows among other platforms, sometimes 0-click. https://t.co/LchMIdKP0P
7
67
272
@halbecaf
Oliver Chang
1 month
Really excited to finally announce CodeMender! As part of this we've already submitted and upstreamed several patches to OSS projects via OSS-Fuzz. Check out our post at: https://t.co/qgnroQyIzN There will be more technical details and exciting announcements to come!
Tweet card summary image
deepmind.google
Using advanced AI to fix critical software vulnerabilities
0
11
45
@ryotkak
RyotaK
1 month
I reported an arbitrary code execution in Unity Runtime, which affects all versions starting from Unity 2017.1. As the vulnerability can be exploited without specific usage, I strongly encourage developers to patch. Technical details below: https://t.co/af3d28rXw3
Tweet card summary image
flatt.tech
Introduction Hello, I’m RyotaK (@ryotkak ), a security engineer at GMO Flatt Security Inc. In May 2025, I participated in the Meta Bug Bounty Researcher Conference 2025. During this event, I discov...
15
123
435
@ifsecure
Ivan Fratric πŸ’™πŸ’›
1 month
A new Project Zero blogpost by @tehjh in which he writes about an interesting and little-known bug class that affected web browses, Linux and, most recently, macOS. The bug class can also be used for leaking pointer tag information in some scenarios.
@natashenka
Natalie Silvanovich
1 month
Super cool potential ASLR leak via dictionary hashing by @tehjh!
3
22
128
@AJ_Dunkentell
Alonzo Dunkentell Jr.
19 hours
Junior Year stats: WR 48 receptions: 634 yards/ 10TDs/ 3 two point conversions. 6 rushes: 44 yards/ 1 TD 3/3 passes: 66 yards/ 1 TD 900(+) all purpose yards DB 20(+) TKLs/ 2 TFL 5 PBUs I'm thankful for all my coaches and teammates for this opportunity. @CoachBlackstock
Tweet card summary image
hudl.com
End Of 10 Game Season
0
3
7
@natashenka
Natalie Silvanovich
1 month
Super cool potential ASLR leak via dictionary hashing by @tehjh!
1
53
200
@ifsecure
Ivan Fratric πŸ’™πŸ’›
2 months
In isolation, https://t.co/1VJ5mFZvXA and https://t.co/Wny1SlskAC might not appear very critical. However, together they mean KASLR on Pixel is broken :(. Both of these issues have been declared "working as intended" by the respective vendors :(
@__sethJenkins
Seth Jenkins
2 months
Oh also this, which is technically WAI but has the unfortunate side effect (because of linear map non-randomization) that instead of bypassing KASLR, you can just use 0xffffff8000010000 as your kernel base instead.... https://t.co/JXMIquQ14s
1
20
89
@__sethJenkins
Seth Jenkins
2 months
I've derestricted 3 unfixed issues in the Google BigWave driver - these bugs are reachable from media decoding contexts on Pixel devices. E.g. https://t.co/KxgeHA6hdw
0
9
39
@__sethJenkins
Seth Jenkins
2 months
Oh also this, which is technically WAI but has the unfortunate side effect (because of linear map non-randomization) that instead of bypassing KASLR, you can just use 0xffffff8000010000 as your kernel base instead.... https://t.co/JXMIquQ14s
3
9
48
@TheChosenUte
The Chosen Ute
12 hours
Who did Texas Tech beat worse?
0
1
5
@ifsecure
Ivan Fratric πŸ’™πŸ’›
2 months
If you're keeping an eye on the Big Sleep issue tracker ( https://t.co/1hAhesgXRd) you might have noticed that the detailed reports for some bugs (e.g. https://t.co/xNRb1bxr20) are now public. Note however that all reports are lovingly crafted by a human and not AI-generated.
3
13
76
@radian
Ivan Krstić
2 months
πŸ”ΊiPhone models announced today include Memory Integrity Enforcement, the culmination of an unprecedented design and engineering effort that we believe represents the most significant upgrade to memory safety in the history of consumer operating systems.
Tweet card summary image
security.apple.com
Memory Integrity Enforcement (MIE) is the culmination of an unprecedented design and engineering effort spanning half a decade that combines the unique strengths of Apple silicon hardware with our...
57
506
3K
@ifsecure
Ivan Fratric πŸ’™πŸ’›
3 months
https://t.co/TeYPpUANyW now with even more bugs. Also great to see the first ones getting fixed, including in v8, ANGLE and imagemagick.
3
13
96