Google's Project Zero to hunt for zero-days

Posted by   Virus Bulletin on   Jul 16, 2014

Bugs to be reported to the vendor only, and to become public once patched.

Google has created a new team, called Project Zero, whose task is to find vulnerabilities in any kind of widely used software and to report them to the respective vendor.

Few subjects in security are as controversial as the disclosure of zero-day vulnerabilities. Some argue that vulnerabilities should always be reported to the affected vendor, and that a 'bug bounty' is a nice, but not mandatory extra. Others say that without a bug bounty rewarding the researchers for their work, they shouldn't report it - and even if there is a reward, the bug should only be reported if the bounty is deemed reasonable.

Indeed, bug bounties aren't the only way researchers can monetize the vulnerabilities they find: there are various entities that will gladly pay for such vulnerabilities, some of which aren't always seen to have the best interests of the average Internet user at heart. This has led to calls to regulate the sale of zero-days, and in response, strongly voiced opinions that such regulation would be a bad idea, and would violate the researchers' right to free speech.

None of the vulnerabilities found by Google will be reported to third-parties, though: only the affected vendor will be notified, and will be given time to patch. Once the bug has been made public (which, Google says, will typically happen "once a patch is available"), it will be added to a public database. This allows anyone to monitor the time it takes vendors to fix vulnerabilities.

Unless you have an interest in the use or sale of vulnerabilities, it is hard not to see this as a good development. Google researchers have already discovered a number of high-profile vulnerabilities, with Heartbleed being the most prominent among them. The fact that they have now set up a team dedicated to finding vulnerabilities is in the interest of Internet users in general, and likely potential victims of targeted attacks in particular.

Posted on 16 July 2014 by Martijn Grooten

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

Nominations opened for sixth Péter Szőr Award

Virus Bulletin is seeking nominations for the sixth annual Péter Szőr Award.

Haroon Meer and Adrian Sanabria to deliver VB2019 closing keynote

New additions to the VB2019 conference programme include a closing keynote address from Thinkst duo Haroon Meer and Adrian Sanabria and a talk on attacks against payment systems.

Free VB2019 tickets for students

Virus Bulletin is excited to announce that, thanks to generous sponsorship from Google Android, we are able to offer 20 free tickets to students who want to attend VB2019.

VB2018 paper: Lazarus Group: a mahjong game played with different sets of tiles

The Lazarus Group, generally linked to the North Korean government, is one of the most notorious threat groups seen in recent years. At VB2018 ESET researchers Peter Kálnai and Michal Poslušný presented a paper looking at the group's various…

Book your VB2019 ticket now for a chance to win a ticket for BSides London

Virus Bulletin is proud to sponsor this year's BSides London conference, which will take place next week, and we have a number of tickets to give away.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.