Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-08-10GoogleXingyu Jin, Google Project Zero
@online{jin:20220810:quantum:cbe3e82, author = {Xingyu Jin and Google Project Zero}, title = {{The quantum state of Linux kernel garbage collection CVE-2021-0920 (Part I)}}, date = {2022-08-10}, organization = {Google}, url = {https://googleprojectzero.blogspot.com/2022/08/the-quantum-state-of-linux-kernel.html}, language = {English}, urldate = {2022-08-11} } The quantum state of Linux kernel garbage collection CVE-2021-0920 (Part I)
2022-06-23GoogleIan Beer, Google Project Zero
@online{beer:20220623:curious:9aadd47, author = {Ian Beer and Google Project Zero}, title = {{The curious tale of a fake Carrier.app}}, date = {2022-06-23}, organization = {Google}, url = {https://googleprojectzero.blogspot.com/2022/06/curious-case-carrier-app.html}, language = {English}, urldate = {2022-07-01} } The curious tale of a fake Carrier.app
2022-03-31GoogleSamuel Groß, Ian Beer, Google Project Zero
@online{gro:20220331:forcedentry:31ef814, author = {Samuel Groß and Ian Beer and Google Project Zero}, title = {{FORCEDENTRY: Sandbox Escape}}, date = {2022-03-31}, organization = {Google}, url = {https://googleprojectzero.blogspot.com/2022/03/forcedentry-sandbox-escape.html}, language = {English}, urldate = {2022-03-31} } FORCEDENTRY: Sandbox Escape
2022-02-10GoogleRyan Schoen
@online{schoen:20220210:walk:086e9db, author = {Ryan Schoen}, title = {{A walk through Project Zero metrics}}, date = {2022-02-10}, organization = {Google}, url = {https://googleprojectzero.blogspot.com/2022/02/a-walk-through-project-zero-metrics.html}, language = {English}, urldate = {2022-02-14} } A walk through Project Zero metrics
2021-03-25Google Project ZeroAnthony Weems, Michael Weber, Dallas Kaman
@online{weems:20210325:cve202126855:046af82, author = {Anthony Weems and Michael Weber and Dallas Kaman}, title = {{CVE-2021-26855: Microsoft Exchange Server-Side Request Forgery}}, date = {2021-03-25}, organization = {Google Project Zero}, url = {https://googleprojectzero.github.io/0days-in-the-wild/0day-RCAs/2021/CVE-2021-26855.html}, language = {English}, urldate = {2021-03-25} } CVE-2021-26855: Microsoft Exchange Server-Side Request Forgery
2021-02-03Google Project ZeroMaddie Stone
@online{stone:20210203:dj:50329e2, author = {Maddie Stone}, title = {{Déjà vu-lnerability A Year in Review of 0-days Exploited In-The-Wild in 2020}}, date = {2021-02-03}, organization = {Google Project Zero}, url = {https://googleprojectzero.blogspot.com/2021/02/deja-vu-lnerability.html}, language = {English}, urldate = {2021-02-04} } Déjà vu-lnerability A Year in Review of 0-days Exploited In-The-Wild in 2020
2021-01-28Google Project ZeroSamuel Groß
@online{gro:20210128:look:3255e9f, author = {Samuel Groß}, title = {{A Look at iMessage in iOS 14}}, date = {2021-01-28}, organization = {Google Project Zero}, url = {https://googleprojectzero.blogspot.com/2021/01/a-look-at-imessage-in-ios-14.html}, language = {English}, urldate = {2021-01-29} } A Look at iMessage in iOS 14
2020-12-15Google Project ZeroIan Beer, Samuel Groß
@online{beer:20201215:deep:b14a3bc, author = {Ian Beer and Samuel Groß}, title = {{A deep dive into an NSO zero-click iMessage exploit: Remote Code Execution}}, date = {2020-12-15}, organization = {Google Project Zero}, url = {https://googleprojectzero.blogspot.com/2021/12/a-deep-dive-into-nso-zero-click.html}, language = {English}, urldate = {2022-01-24} } A deep dive into an NSO zero-click iMessage exploit: Remote Code Execution
Chrysaor
2019-08-29GoogleIan Beer, Project Zero
@online{beer:20190829:implant:f25a696, author = {Ian Beer and Project Zero}, title = {{Implant Teardown}}, date = {2019-08-29}, organization = {Google}, url = {https://googleprojectzero.blogspot.com/2019/08/implant-teardown.html}, language = {English}, urldate = {2020-01-06} } Implant Teardown
PoisonCarp