The share of Android vulnerabilities led to through reminiscence questions of safety has dropped from 76% in 2019 to simply 24% in 2024, representing an enormous lower of over 68% in 5 years.
That is smartly beneath the 70% prior to now present in Chromium, making Android a very good instance of the way a big challenge can progressively and methodically transfer to a secure territory with out breaking backward compatibility.
Google says it completed this consequence through prioritizing new code to be written in memory-safe languages like Rust, minimizing the creation of latest flaws with time.
On the identical time, the outdated code used to be maintained with minimum adjustments inquisitive about necessary safety fixes reasonably than acting in depth rewrites that will additionally undermine interoperability.
“In keeping with what we now have discovered, it is turn into transparent that we don’t want to throw away or rewrite all our present memory-unsafe code,” reads Google’s file.
“As a substitute, Android is that specialize in making interoperability secure and handy as a number one capacity in our reminiscence security adventure.”

Supply: Google
This technique makes older code mature and turns into more secure through the years, decreasing the selection of memory-related vulnerabilities in it irrespective of what language it used to be written in.
Those two pillars within the Android development technique had a synergistic impact against the dramatic lower of reminiscence flaws on the planet’s most generally used cellular platform.
Google explains that, whilst it should appear dangerous to go away older code necessarily unchanged and although new code is predicted to be higher examined and reviewed, the other is occurring, in spite of how counter-intuitive it should appear.
It is because contemporary code adjustments introduce maximum flaws, so new code virtually all the time incorporates safety issues. On the identical time, insects in older code are ironed out except builders carry out in depth adjustments to it.

Supply: Google
Google says that the trade, together with itself, has long gone thru 4 primary phases in coping with reminiscence security flaws, summarized as follows:
- Reactive patching: First of all, the point of interest used to be on solving vulnerabilities when they have been found out. This manner ended in ongoing prices, with widespread updates wanted and customers ultimate prone within the intervening time.
- Proactive mitigations: Your next step used to be enforcing methods to make exploits tougher (e.g., stack canaries, control-flow integrity). On the other hand, those measures steadily got here with efficiency trade-offs and ended in a cat-and-mouse recreation with attackers.
- Proactive vulnerability discovery: This technology concerned the use of gear like fuzzing and sanitizers to seek out vulnerabilities proactively. Whilst useful, this system handiest addressed signs, requiring consistent consideration and energy.
- Top-assurance prevention (Secure Coding): The newest manner emphasizes combating vulnerabilities on the supply through the use of memory-safe languages like Rust. This “safe through design” manner supplies scalable and long-term assurance, breaking the cycle of reactive fixes and dear mitigations.
“Merchandise around the trade had been considerably reinforced through those approaches, and we stay dedicated to responding to, mitigating, and proactively trying to find vulnerabilities,” defined Google.
“Having mentioned that, it has turn into an increasing number of transparent that the ones approaches don’t seem to be handiest inadequate for achieving a suitable degree of chance within the memory-safety area, however incur ongoing and extending prices to builders, customers, companies, and merchandise.
“As highlighted through a large number of executive companies, together with CISA, of their secure-by-design file, “handiest through incorporating safe through design practices can we ruin the vicious cycle of repeatedly developing and making use of fixes.”
Ultimate June, the U.S. Cybersecurity and Infrastructure Safety Company (CISA) warned that 52% of probably the most extensively used open-source initiatives use memory-unsafe languages.
Even initiatives written in memory-safe languages steadily rely on parts written in memory-unsafe languages, so the safety chance is sophisticated to handle.
CISA really helpful that instrument builders write new code in memory-safe languages corresponding to Rust, Java, and GO and transition present initiatives, particularly essential parts, to these languages.