Key Takeaways from the 2022 XDef‑OPPO Security Salon Chengdu – Advanced Threat Defense
The 2022 XDef‑OPPO Security Salon in Chengdu gathered industry experts to discuss system‑level 3D defense, DOS attacks on data storage, Bluetooth memory flaws, cross‑device information flow, and Android hybrid security, offering deep insights and practical solutions for modern endpoint protection.
On November 19, 2022, the 2022 XDef‑OPPO Security Salon (Chengdu) was jointly organized by Wuhan University Aerospace Laboratory and OPPO, and co‑hosted by OPPO Amber Lab and OPPO Industry‑Academic Research Department at the OCG Building C in Chengdu.
The event, themed “Mutual Advancement of Attack and Defense, Sword Drawn”, brought together technical elites and experts to review past achievements and explore future directions in security.
Key discussion topics included system‑level three‑dimensional defense, DOS attacks in data storage, memory vulnerabilities in Bluetooth protocols, cross‑device information flow construction and taint analysis, and security challenges in Android hybrid development.
Opening remarks were delivered by Prof. Peng Guojun, Vice Dean of Wuhan University National Cybersecurity Institute and co‑founder of the XDef summit, and Wang Anyu, General Manager of OPPO Terminal Security.
Prof. Fu Jianming presented “Three‑Dimensional Defense of Vulnerability Attacks”, examining defense strategies from the perspectives of resource integrity, diversity, and entrapment.
Zhang Yuan, associate professor at Fudan University, introduced “Straw Attack: The Final Straw that Crushed Android Systems”, detailing a DOS attack on Android services and the StrawFuzzer tool for large‑scale vulnerability detection.
Ai Lei, senior terminal security engineer at OPPO Amber Lab, analyzed new Bluetooth 5.2 flow‑control mode vulnerabilities and demonstrated memory‑out‑of‑bounds exploits in L2CAP, citing two high‑severity Google CVEs and one Qualcomm CVE.
Chen Ruidong from University of Electronic Science and Technology discussed security design for distributed operating systems across mobile devices, showcasing a static taint‑analysis framework for Android that uncovered dozens of new attacks and privacy issues.
Kong Xiao, senior security researcher at OPPO Amber Lab, detailed security risks and defense strategies in Android hybrid development, comparing native and emerging frameworks, attack models, and step‑by‑step exploit reproductions.
The roundtable, led by Amber Lab director Chen Yong with speakers and OPPO security GM Wang Anyu, examined emerging security trends, threats, and proactive countermeasures for terminal manufacturers.
Overall, the salon provided a platform for deep technical exchange on cutting‑edge endpoint security, inspiring participants with practical insights and future research directions.
Signed-in readers can open the original source through BestHub's protected redirect.
This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactand we will review it promptly.
OPPO Amber Lab
Centered on user data security and privacy, we conduct research and open our tech capabilities to developers, building an information‑security fortress for partners and users and safeguarding OPPO device security.
How this landed with the community
Was this worth your time?
0 Comments
Thoughtful readers leave field notes, pushback, and hard-won operational detail here.
