
Google has announced that its protected Kernel-based Virtual Machine (pKVM) for Android has achieved SESIP Level 5 certification, the highest security assurance level for IoT and mobile platforms1. This milestone validates pKVM’s resistance to advanced threats, including DMA attacks and firmware exploits, as tested by DEKRA2. The certification aligns with Common Criteria (ISO 15408) and underscores Android’s commitment to hardware-enforced isolation for sensitive workloads like AI, DRM, and biometrics.
TL;DR: Key Takeaways
- SESIP Level 5: Highest assurance for IoT/mobile, validated by DEKRA.
- Technical Enhancements: Hardware-enforced memory isolation (stage 2 page tables), DICE-based secure boot, and Microdroid for minimal guest VMs.
- Use Cases: Local AI (Gemini Nano), DRM (Widevine L1), and isolated biometrics.
- Threat Mitigation: Wipes VM data on unlocked bootloaders; attestation reflects compromised state.
Technical Deep Dive: pKVM’s Security Model
pKVM, part of Android’s Virtualization Framework (AVF), enforces memory and DMA isolation through hardware-backed stage 2 page tables, preventing cross-VM access without explicit sharing2. The hypervisor leverages DICE (Device Identifier Composition Engine) for attestation and sealing secrets, ensuring only verified components execute. Microdroid, a minimal OS for guest VMs, requires vbmeta.img
and APEX verification before boot2.
New 2025 updates include Virtual A/B updates for rollback-protected OTAs and dynamic partitions for OEM storage flexibility2. The hypervisor’s design prioritizes confidentiality and integrity, though availability remains a trade-off—malicious hosts can deny VM resources.
Relevance to Security Practitioners
For red teams, pKVM’s hardware-enforced isolation complicates traditional VM escape techniques. Blue teams should monitor attestation logs for tampered devices, as unlocked bootloaders invalidate SESIP assurances2. System administrators must ensure OEMs implement pKVM correctly, given supply chain risks.
ICCC 2025 highlighted EUCC’s requirement for continuous vulnerability monitoring, applicable to SESIP-certified products like pKVM3. AI-driven compliance tools, discussed at the conference, could streamline future Android security evaluations.
Conclusion
pKVM’s SESIP Level 5 certification marks a significant step in mobile security, particularly for high-risk use cases. Ongoing challenges include hypervisor verification and OEM trust. Future developments may integrate EUCC’s continuous monitoring mandates.
References
- “Android’s pKVM hypervisor earns SESIP Level 5 security certification,” BleepingComputer, Aug. 12, 2025.
- “pKVM Security Documentation,” Android AOSP, Jun. 18, 2025.
- “ICCC 2025 Agenda,” Common Criteria Portal, 2025.
- “EUCC Act,” ENISA, 2025.
- “PET-AI Framework,” Malaysia Gov, 2025.
- “Common Criteria Users’ Forum,” 2025.