Project Zero: 10 Years of 'make 0-day hard'
This talk provides a retrospective on the evolution of zero-day vulnerability research and the impact of the Project Zero team over the last decade. It analyzes the shifting landscape of software quality, transparency, patching cadences, and the effectiveness of modern exploit mitigations. The speaker highlights the emergence of the 'security gap' in middleware and the rise of exploitation-as-a-service models. The presentation emphasizes the necessity of variant analysis and open collaboration between researchers and vendors to effectively raise the cost of exploitation.
How 10 Years of Project Zero Changed the Economics of Zero-Day Exploitation
TLDR: Project Zero’s decade-long mission to make zero-day exploitation prohibitively expensive has fundamentally shifted the vulnerability landscape. By forcing vendors to adopt faster patching cycles and transparent disclosure, they have pushed attackers toward more complex, multi-stage exploit chains. For researchers and bug bounty hunters, this means the era of "low-hanging fruit" is over, and success now requires deep expertise in variant analysis and exploit mitigation bypasses.
Ten years ago, the vulnerability landscape looked drastically different. A researcher could find a simple use-after-free or integer overflow in a browser plugin like Adobe Flash, and that bug would remain exploitable for months or even years. Today, the game has changed. The cost of entry for state-sponsored actors and sophisticated threat groups has skyrocketed, not because bugs have disappeared, but because the cost of developing a reliable, persistent exploit chain has become a massive financial and technical burden.
The Shift from Simple Bugs to Complex Chains
In the early days of Project Zero, the focus was on identifying and reporting high-impact vulnerabilities in widely used software. The CVE-2014-0577 vulnerability in Adobe Flash is a perfect example of the "simple" era. It was a straightforward host function vulnerability where a parameter expected to be a string was treated as a pointer when passed as an integer. It was trivial to find, trivial to exploit, and it gave an attacker immediate code execution.
Fast forward to 2023, and the research has evolved. A recent out-of-bounds access in the Chromium V8 engine, reported by Sergey Glazunov, illustrates the current reality. This wasn't a simple oversight; it was a complex JIT (Just-In-Time) compilation issue that required an eight-page technical document just to explain the root cause. This shift is intentional. By consistently reporting these bugs and forcing vendors to fix them, the research community has effectively "cleared the board" of the easy wins. Attackers are now forced to burn through multiple, high-complexity vulnerabilities just to achieve what a single bug could do a decade ago.
Why Variant Analysis is Your New Best Friend
For those of us working in offensive security, the most important takeaway from the last decade is the rise of variant analysis. When a vendor patches a vulnerability, they often fix the specific instance reported, but they frequently leave the underlying logic flaw intact. If you are hunting for bugs, stop looking for the same vulnerability in the same place. Instead, look at the patch.
If a vendor fixes a memory corruption bug in a specific function, ask yourself: "What other functions in this codebase use the same pattern?" Attackers are doing this constantly. They take a known, patched vulnerability and look for "variants"—different code paths that share the same structural weakness. This is why we see so many vulnerabilities in the same components over and over again. If you want to be effective in a modern bug bounty program, you need to become an expert at reading patches and identifying the logic patterns that lead to these recurring issues.
The Security Gap in Middleware
One of the most concerning trends identified in recent research is the widening "security gap" in middleware. We have reached a point where the primary software—the browser or the OS—is often hardened with robust mitigations like sandboxing and memory tagging. However, the underlying components, such as baseband drivers or third-party image processing libraries, are often neglected.
These components are frequently sold to OEMs and integrated into devices without the same level of scrutiny as the core product. Because they are not sold directly to the end-user, they often lack a clear, enforceable patching path. When a vulnerability is found in a baseband chip, the fix has to travel from the chip manufacturer to the OEM, and then to the carrier, before it ever reaches the user's device. This supply chain complexity is exactly where attackers are focusing their efforts. If you are performing a red team engagement or a deep-dive assessment, stop focusing solely on the application layer. The real vulnerabilities are increasingly buried in the opaque, third-party code that powers the hardware.
Moving Beyond the "One-and-Done" Mentality
Mitigations like ASLR and heap protections have been successful, but they are not silver bullets. They have forced attackers to chain multiple bugs together, but they have also created a false sense of security among some vendors. There is a dangerous "one-and-done" mentality where a vendor implements a mitigation and assumes the problem is solved.
As researchers, our role is to prove that these mitigations are just extra steps, not permanent solutions. We need to continue writing and analyzing exploits to test the limits of these defenses. If you find a way to bypass a mitigation, don't just report the bug—report the bypass. That information is what forces the industry to innovate. The goal is not to make software perfect, but to make the cost of exploitation so high that it becomes unsustainable for all but the most well-funded adversaries. Keep digging into the patches, keep testing the mitigations, and keep pushing for the transparency that makes our collective defense stronger.
Vulnerability Classes
Target Technologies
Attack Techniques
All Tags
Up Next From This Conference
Similar Talks

Inside the FBI's Secret Encrypted Phone Company 'Anom'

Hacking Apple's USB-C Port Controller




