Jeff Vander Stoep Profile
Jeff Vander Stoep

@jeffvanderstoep

Followers
3K
Following
2K
Media
7
Statuses
1K

Android security @google [email protected]

Joined January 2016
Don't wanna be here? Send us removal request.
@jeffvanderstoep
Jeff Vander Stoep
3 days
Finally, more importantly, and back to the original motivation, the rewrite appears to demonstrate exactly what it was intended to do, which is to allow Binder to be developed and evolved, with much higher confidence, to meet Android's needs. 8/8
0
0
4
@jeffvanderstoep
Jeff Vander Stoep
3 days
But it's not just impressive when compared to the 2019 refactor (not even a rewrite) in C, it's impressive when compared to C-Binder's steady state of 3-4 vulns per year. A complete rewrite, despite the risks, seems less risky than the existing mature C driver. 7/
1
0
1
@jeffvanderstoep
Jeff Vander Stoep
3 days
The last refactor of the C driver in 2019 resulted in a wave of 9 vulnerabilities. A single vuln (that never actually shipped to any devices) for a complete rewrite into Rust is pretty impressive by comparison. 6/
1
0
2
@jeffvanderstoep
Jeff Vander Stoep
3 days
Binder needs a rethink to get out of this state. The good news is that Rust does make evolving Binder easier and safer. And Rust-Binder has even already prevented multiple vulnerabilities in C-Binder e.g by validating its locking https://t.co/7JYlKSp9be 5/
1
0
2
@jeffvanderstoep
Jeff Vander Stoep
3 days
Binder is petrifying through a combination of complexity, technical debt, and security risk. Seemingly minor changes are risky. You can see this in the CVE count over the past few years. With little variance, Binder has about 3-4 high severity vulns per year, every year. 4/
1
0
2
@jeffvanderstoep
Jeff Vander Stoep
3 days
So what gives? The motivation goes on to explain that Android needs more than just working code from Binder, it needs code that can continue to evolve to meet the evolving needs of the Android project. And that's where C-Binder is not holding up well. 3/
1
0
1
@jeffvanderstoep
Jeff Vander Stoep
3 days
The motivation begins by agreeing that rewrites aren't great. The Android team has also provided data that "Code matures and gets safer with time, exponentially, making the returns on investments like rewrites diminish over time as code gets older." 2/ https://t.co/cBc3gMLzO6
Tweet card summary image
security.googleblog.com
Posted by Jeff Vander Stoep - Android team, and Alex Rebert - Security Foundations Memory safety vulnerabilities remain a pervasive threa...
1
0
1
@jeffvanderstoep
Jeff Vander Stoep
3 days
Let's discuss this hot take! > "re-writing working code is a religious obligation" Fortunately, we don't have to guess at the author's motivation (religious or otherwise), it's provided it in the cover letter: 1/ https://t.co/a2FaLw3ic6
@LundukeJournal
The Lunduke Journal
4 days
Rust programmers re-wrote a portion of the Linux kernel (Android's Binder) in Rust. (Because, it would seem, re-writing working code in Rust is a religious obligation for many.) That code was published with the Linux kernel update a few weeks back. Yesterday, it was revealed
1
2
3
@SCWpod
Security Cryptography Whatever
1 year
NEW EPISODE! You may not be rewriting the world in Rust, but if you walk like the Android team, you'll drive down your memory-unsafety vulnerabilities more than 2X below the industry average over time! 🎉 https://t.co/KyH1NtVbC3 https://t.co/adWaPJBvKH
1
8
30
@jeffvanderstoep
Jeff Vander Stoep
1 year
Agreed. We’re already prioritizing differently based on this data. It was a fun conversation, and we believe that it applies to a lot more than just memory safety.
0
1
5
@jeffvanderstoep
Jeff Vander Stoep
1 year
Thomas also said “And that observation about the half life of vulnerabilities, if that’s true, says something pretty profound about what the work looks like to shift to a memory safe future.”
1
1
4
@jeffvanderstoep
Jeff Vander Stoep
1 year
I agree with this. It feels like we discovered a game-changer not just in memory safety, but in security more generally - that doing something very practical results in major security improvements for non-obvious reasons. Focusing on new code is disproportionately effective.
1
1
3
@jeffvanderstoep
Jeff Vander Stoep
1 year
Something that Thomas said in the podcast really stood out to me. He said “the blog post undersells it. …. This is a lot more interesting than it looks like on the tin.”
1
1
4
@OliviaGalluccii
Olivia Gallucci ✨
1 year
I published an introductory post on how to use return-oriented programming (ROP) to bypass security mechanisms, like ASLR, W^X, and stack canaries 👾 https://t.co/AszjOeimKp #OffensiveSecurity #InfoSec #ROP
2
22
127
@clintgibler
Clint Gibler
1 year
🦀 Eliminating Memory Safety Vulnerabilities at the Source Rust caused memory safety vulnerabilities % in Android to drop from 76% to 24% over 6 years. 💡Key insight: new code is disproportionately responsible for bugs By @jeffvanderstoep, @ayper https://t.co/eIpfwDXm7U
0
5
11
@ayper
Alex Rebert
1 year
The drop in Android's memory safety vulnerabilities is astonishing. It's counterintuitive, but prioritizing memory-safe languages in new code quickly reduces memory-safety risks. Once we turn off the tap of new vulnerabilities, they start decreasing exponentially.
@jeffvanderstoep
Jeff Vander Stoep
1 year
I’m super excited about this blogpost. The approach is so counterintuitive, and yet the results are so much better than anything else that we’ve tried for memory safety. We finally understand why. https://t.co/cBc3gMLzO6
2
3
35
@royalhansen
Royal Hansen
1 year
Google's implementing #SafeCoding to build more secure software, and the results are impressive. @Android saw a massive drop in memory safety bugs by switching to languages like #Rust. Read more in our latest blog:
0
19
71
@jeffvanderstoep
Jeff Vander Stoep
1 year
I’m super excited about this blogpost. The approach is so counterintuitive, and yet the results are so much better than anything else that we’ve tried for memory safety. We finally understand why. https://t.co/cBc3gMLzO6
Tweet card summary image
security.googleblog.com
Posted by Jeff Vander Stoep - Android team, and Alex Rebert - Security Foundations Memory safety vulnerabilities remain a pervasive threa...
6
76
276
@AndreaR9Md
Andrea R MD, @andrear9md.bsky.social
1 year
Popping in to say that a presidential candidate advocating to stop all childhood vaccines should be national news and disqualifying. The media failure literally takes my breath away. Childhood vaccines isn't a both sides issue you fucking idiots, it's like a public health thing.
1K
10K
39K