Pavol Luptak, Nethemba
A collection of JavaScript engine CVEs with PoCs https://github.com/tunz/js-vuln-db
(this may not be true if the system has a critical 0-day vulnerability in CPU and there is no compartmentalization on the CPU level)
The TEE processor is isolated from the rest of the system using memory and I/O protection mechanisms supported by the hardware
Sandboxed user accounts
Google states that even in the event of a full compromise elsewhere, the attacker cannot derive a user’s disk encryption key without compromising the security module first
Enhanced SELinux policies & kernel hardening using linux-hardened
Custom hardened apps (PDF viewer, Silence)
SQLite’s SECURE_DELETE feature is enabled, resulting in deleted content being overwritten with zeros
And much more