AI, IoT, and Zero Trust: Key Takeaways from the 2021 ACM China Turing Conference

At the 2021 ACM China Turing Conference in Hefei, leading academics and industry experts presented cutting‑edge research on AI‑driven security, mobile OS vulnerability detection, IoT sensor risks, ARM confidential computing, and zero‑trust frameworks, highlighting how emerging technologies reshape secure mobile and industrial ecosystems.

OPPO Amber Lab
OPPO Amber Lab
OPPO Amber Lab
AI, IoT, and Zero Trust: Key Takeaways from the 2021 ACM China Turing Conference

The 2021 ACM China Turing Conference concluded on August 1 in Hefei. ACM, founded in 1946, is the world’s largest professional computing organization.

Conference Theme

The event’s theme was “Intelligent+ and Industrial Internet,” focusing on new trends in artificial intelligence development.

Key Sessions

Security Talk by Zhang Lei (Fudan University)

Assistant researcher at Fudan University and member of the Fudan Baize team, Zhang Lei highlighted intelligent system security research, targeting mobile operating system vulnerabilities. He proposed starting from the input space of sensitive system interfaces and using program analysis and machine learning to discover hundreds of code flaws in mainstream mobile OSes.

AI & IoT by Prof. Xu Wenyuan (Zhejiang University)

Professor Xu Wenyuan, director of the Department of Systems Science and Engineering at Zhejiang University and a National Outstanding Youth Fund recipient, emphasized the proliferation of AI‑enabled IoT devices. He analyzed IoT on‑band and off‑band vulnerability systems, simulated signal security risks, and proposed sensor+AI vulnerability solutions to minimize IoT risk.

Hardware‑Software Co‑Design by Dr. Zhang Chao (Tsinghua University)

Associate professor at Tsinghua University and coach of the Blue Lotus team, Dr. Zhang Chao described the hardware‑software co‑design process as a high‑risk security zone. He introduced a new hardware protection mechanism called ROLoad, covering indirect jumps, kernel data integrity, backdoor, and side‑channel defenses, offering fresh ideas for software‑induced vulnerabilities.

ARM Confidential Compute by Wang Junchao (ARM China)

Wang Junchao, security technology market director at ARM China, demonstrated the ARMv9 confidential compute architecture. The ARMv9 roadmap introduces a hardware‑based secure execution environment that protects code and data from unauthorized access or modification, accelerating the shift from general‑purpose to specialized computing in industry.

OPPO Perspectives

Multimodal Perception Fusion

Guo Yandong, Chief Scientist of OPPO Intelligent Perception, delivered a keynote on “Multimodal Perception Fusion for Mobile Intelligent Terminals.” He explained that mobile devices now embed numerous sensors and powerful compute, enabling audio‑video‑lip‑reading, depth‑RGB fusion, and LiDAR‑based localization. Designing secure cross‑modal, cross‑time, and cross‑device perception is crucial for enhancing user interaction.

Zero‑Trust Framework

Wang Anyu, OPPO Terminal Security Director, stressed the need for digital trust between intelligent agents. He introduced a “Zero Trust” concept and framework that enforces minimal‑privilege access control, ensuring secure, stable, and efficient access to enterprise resources in any network environment. OPPO collaborates with Microsoft and other leaders to build a privacy‑centric security ecosystem.

Future Challenges

Shen Jia, Dr. from OPPO Research Institute’s Standards Department, warned that in the upcoming 6G era, security challenges will intensify as everything becomes connected.

The OPPO security summit created a platform for forward‑looking discussions on digital security and zero‑trust, reaffirming OPPO’s commitment to building a truly safe internet ecosystem.

Original Source

Signed-in readers can open the original source through BestHub's protected redirect.

Sign in to view source
Republication Notice

This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactadmin@besthub.devand we will review it promptly.

AIInformation SecurityIoTARMzero trust
OPPO Amber Lab
Written by

OPPO Amber Lab

Centered on user data security and privacy, we conduct research and open our tech capabilities to developers, building an information‑security fortress for partners and users and safeguarding OPPO device security.

0 followers
Reader feedback

How this landed with the community

Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.