Google has officially integrated the memory-safe Rust programming language into the cellular baseband firmware of its Pixel 10 smartphones.
According to a detailed technical breakdown published on the Google Online Security Blog on April 10, 2026, the engineering team has replaced the modem’s legacy Domain Name System (DNS) parser with a highly secure, Rust-based implementation.
This proactive strategy is designed to permanently eradicate an entire class of memory-safety vulnerabilities within one of the smartphone’s most sensitive and heavily targeted hardware components.
Over recent years, the cellular modem has become an increasingly high-value target for sophisticated threat actors and security researchers alike.
As Google highlighted in its official disclosure, the Pixel modem operates using tens of megabytes of highly complex, predominantly memory-unsafe legacy firmware code.
Because this low-level component interacts continuously with external cellular networks, it exposes a massive remote attack surface.
The stakes for baseband security are exceptionally high. Previously, researchers at Google’s Project Zero successfully demonstrated Remote Code Execution (RCE) attacks on Pixel modems directly over the internet.
These vulnerabilities are incredibly dangerous because they can be exploited via malicious radio signals or SMS messages without requiring any user interaction.
By transitioning high-risk firmware to Rust, Google is actively neutralizing the threat of memory-safety exploits, such as buffer overflows, that attackers consistently weaponize to achieve unauthorized device access.
Securing DNS Parsing with Rust
While DNS is traditionally associated with standard web browsing, the evolution of modern cellular communications means that even basic telephony operations, like call forwarding, now rely heavily on digital data networks and DNS services.
Because the DNS protocol is inherently complex and requires continuous parsing of untrusted network data, it serves as a critical gateway for vulnerabilities.
When implemented in memory-unsafe languages like C or C++, this parsing process is prone to severe security flaws, as evidenced by recent vulnerabilities such as CVE-2024-27227.
To harden this attack surface, Google’s Pixel team evaluated multiple open-source Rust libraries and ultimately selected the hickory-proto crate.
Key technical mitigation strategies and integration details from Google’s engineering report include:
- Bare-Metal Adaptation: Developers actively modified the hickory-proto library to operate in a no_std (no standard library) environment, a strict requirement for bare-metal embedded systems.
- Memory Management Integration: Using the Foreign Function Interface (FFI), the engineering team connected Rust’s global memory allocator directly to the modem’s existing, highly specialized C-based memory allocation APIs.
- Unified Crash Handling: Google effectively streamlined debugging by exposing the Pigweed crash facade to the Rust panic handler, unifying crash reporting across C/C++ and Rust.
Balancing Code Size and Enhanced Security
Deploying modern memory-safe code in embedded environments often presents logistical trade-offs.
The Google security team noted a distinct increase in firmware size, with the new Rust implementation occupying approximately 371KB. This footprint includes the hickory-proto library, the associated Rust shim, and reusable core components.
Because the Pixel 10 modem is not strictly memory-constrained, Google intentionally prioritized code quality, robust security, and long-term community support over aggressive size optimization.
The team successfully linked the compiled Rust code into the legacy C/C++ build system, overcoming technical hurdles to ensure flawless execution.
The rollout of the Pixel 10 establishes a pivotal industry milestone, marking the first time Google has embedded memory-safe language directly into a smartphone’s baseband modem.
While replacing a single DNS parser is just the beginning, Google’s engineering breakthrough lays a critical foundation for migrating other vulnerable modem services to Rust.
As threat actors continue to probe low-level hardware architectures, this proactive shift ensures that the cellular baseband’s defensive posture will systematically strengthen against future zero-day exploits and remote attacks.
Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.

