Dec. 12, 2023, 5 p.m. | Edward Fernandez (noreply@blogger.com)

Google Online Security Blog security.googleblog.com



Android’s defense-in-depth strategy applies not only to the Android OS running on the Application Processor (AP) but also the firmware that runs on devices. We particularly prioritize hardening the cellular baseband given its unique combination of running in an elevated privilege and parsing untrusted inputs that are remotely delivered into the device.



This post covers how to use two high-value sanitizers which can prevent specific classes of vulnerabilities found within the baseband. …

android android security application baseband cellular defense devices firmware hardening inputs parsing prioritize privilege processor roger running strategy untrusted

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Security Compliance Strategist

@ Grab | Petaling Jaya, Malaysia

Cloud Security Architect, Lead

@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)