logo

Over the Air, Under the Radar: Attacking and Securing the Pixel Modem

Conference:  Defcon 31

2023-08-01

Authors:   Farzan Karimi Android Offensive Security Manager at Google, Eugene Rodionov Security Researcher at Google on the Android Red Team, Xiling Gong Security Researcher at Google on the Android Red Team, Xuan Xing Tech Lead at Google on the Android Red Team


Abstract

To ensure Google Pixel devices are always at their most secure, the Android Red Team continuously attacks the riskiest areas of the phone. This allows us to proactively get ahead of bugs and protect the phone, before it’s even shipped to users. The modem — or baseband — is considered a fundamental component of smartphones, and is at high risk because it is a privileged system component that accepts data from an untrusted remote source (cell towers). A vulnerability in the modem exposes end-users to scalable attacks carried out remotely, which may lead to many kinds of compromise on a phone. Modem security is currently a hot topic of research, attracting growing interest from security researchers, both in the industry and in academia. This wasn’t the case up until recently for a couple of reasons: most modem code is closed source, and testing it requires expensive hardware equipment. With some of these barriers being removed in recent years, due the invention of software-defined radio (SDR) devices and public toolkits, the entry level into baseband security analysis has become more affordable. In this session the Android Red Team will be describing some findings from its offensive evaluation of modems used in Pixel devices.

Materials: