OPPO Amber Lab
Author

OPPO Amber Lab

Centered on user data security and privacy, we conduct research and open our tech capabilities to developers, building an information‑security fortress for partners and users and safeguarding OPPO device security.

63
Articles
0
Likes
51
Views
0
Comments
Recent Articles

Latest from OPPO Amber Lab

63 recent articles
OPPO Amber Lab
OPPO Amber Lab
Feb 23, 2024 · Information Security

Mastering Honggfuzz on Android: Setup, Execution, and Deep Code Insights

This article introduces the Google‑maintained honggfuzz fuzzing engine, explains how to integrate it into the Android AOSP build, run multi‑threaded fuzzing on devices, and dives into the core source modules, coverage sharing mechanisms, and the extensive mutation strategies that power its effectiveness.

Androidcoveragefuzz testing
0 likes · 16 min read
Mastering Honggfuzz on Android: Setup, Execution, and Deep Code Insights
OPPO Amber Lab
OPPO Amber Lab
Jan 26, 2024 · Information Security

BLUFFS Attack: How Bluetooth’s Legacy Security Enables Forward Future Exploits

This article analyzes the BLUFFS vulnerability disclosed at ACM CCS 2023, detailing how the legacy Bluetooth security mechanism (LSC) allows attackers to manipulate authentication and key‑generation parameters, leading to forward‑secrecy and future‑secrecy breaches, and evaluates the impact across devices supporting Bluetooth 4.2‑5.4.

BluetoothLSCProtocol
0 likes · 27 min read
BLUFFS Attack: How Bluetooth’s Legacy Security Enables Forward Future Exploits
OPPO Amber Lab
OPPO Amber Lab
Jan 19, 2024 · Information Security

Uncovering Android AIDL/HIDL Service Vulnerabilities: Methods and Real CVE Examples

This article explains how Android AIDL and HIDL services are generated, outlines systematic steps to enumerate services, filter Java implementations, and automate information gathering, then details common memory‑corruption bug patterns and demonstrates real CVE‑2023‑21008 and CVE‑2023‑20766 exploits, concluding with a risk assessment.

AIDLAndroidCVE
0 likes · 9 min read
Uncovering Android AIDL/HIDL Service Vulnerabilities: Methods and Real CVE Examples
OPPO Amber Lab
OPPO Amber Lab
Dec 29, 2023 · Information Security

Uncovering Android Malicious Anti‑Kill Vulnerabilities in Foreground Services

This article explains how Android malicious anti‑kill techniques exploit foreground services to keep processes alive, outlines the Low Memory Killer mechanism, details process priority values, presents real CVE examples, and offers mitigation strategies for developers and security researchers.

AndroidAnti‑KillForeground Service
0 likes · 9 min read
Uncovering Android Malicious Anti‑Kill Vulnerabilities in Foreground Services
OPPO Amber Lab
OPPO Amber Lab
Dec 29, 2023 · Information Security

Large Models Transform Mobile App Security – Key Takeaways from OPPO’s White Paper

The 2024 China Academy of ICT deep‑observation summit in Shanghai unveiled OPPO’s new white paper on trustworthy mobile application technology, highlighting how large language models enhance smart terminal security, outlining industry trends, and outlining future directions for secure, intelligent mobile ecosystems.

OPPOlarge language modelssoftware security
0 likes · 6 min read
Large Models Transform Mobile App Security – Key Takeaways from OPPO’s White Paper
OPPO Amber Lab
OPPO Amber Lab
Dec 27, 2023 · Information Security

How OPPO Secures Global Smart Devices with BSIMM‑Driven Compliance

At the 7th Cloud Security Alliance Greater China Conference, OPPO’s security chief outlined the challenges of global smart‑device compliance and shared a BSIMM‑based framework for building robust enterprise security systems that bridge legal, technical, and operational hurdles.

BSIMMInformation SecurityOPPO
0 likes · 4 min read
How OPPO Secures Global Smart Devices with BSIMM‑Driven Compliance
OPPO Amber Lab
OPPO Amber Lab
Dec 15, 2023 · Information Security

Uncovering Android Binder Service Vulnerabilities: Exploits, Causes, and Fixes

This article explains the fundamentals of Android Binder services, categorizes Origin, AIDL, HIDL, and Vendor types, describes methods for locating services, and details common vulnerability patterns such as uninitialized memory, out-of-bounds reads/writes, and type confusion, illustrated with real CVE cases and mitigation insights.

AndroidBinderExploit
0 likes · 9 min read
Uncovering Android Binder Service Vulnerabilities: Exploits, Causes, and Fixes
OPPO Amber Lab
OPPO Amber Lab
Nov 30, 2023 · Information Security

Uncovering Android Socket Service Vulnerabilities: Techniques and Case Study

This article details the methodology for discovering and analyzing Android local socket service vulnerabilities, outlines prerequisite skills, explains service classifications, demonstrates data‑handling function tracing, and presents a CVE‑2023‑35694 case study, highlighting common flaw types and mitigation insights.

AndroidCVEReverse engineering
0 likes · 8 min read
Uncovering Android Socket Service Vulnerabilities: Techniques and Case Study