OPPO Amber Lab
Author

OPPO Amber Lab

Centered on user data security and privacy, we conduct research and open our tech capabilities to developers, building an information‑security fortress for partners and users and safeguarding OPPO device security.

63
Articles
0
Likes
51
Views
0
Comments
Recent Articles

Latest from OPPO Amber Lab

63 recent articles
OPPO Amber Lab
OPPO Amber Lab
Jun 29, 2022 · Information Security

Inside Android Bluetooth: Three Critical CVEs and Their Exploits

This article examines the complexity of the Bluetooth protocol stack, focusing on Android’s Host layer vulnerabilities, and provides detailed analyses of three critical CVEs—CVE‑2020‑27024 (SMP), CVE‑2021‑0918 (GATT), and CVE‑2021‑39805 (L2CAP)—including protocol overviews, code excerpts, and exploitation paths.

AndroidBluetoothCVE
0 likes · 13 min read
Inside Android Bluetooth: Three Critical CVEs and Their Exploits
OPPO Amber Lab
OPPO Amber Lab
Jun 2, 2022 · Information Security

DirtyPipe (CVE‑2022‑0847) Exploit: Gaining Root on Android

Researchers dissect the DirtyPipe (CVE‑2022‑0847) Linux kernel flaw affecting Android, explaining its uninitialized flag bug in splice, the patch changes, and detailed exploitation techniques that modify read‑only .so files to achieve arbitrary writes, bypass SELinux, and ultimately obtain root privileges.

AndroidCVE-2022-0847DirtyPipe
0 likes · 18 min read
DirtyPipe (CVE‑2022‑0847) Exploit: Gaining Root on Android
OPPO Amber Lab
OPPO Amber Lab
May 20, 2022 · Information Security

How Intent Redirection Lets Malicious Android Apps Gain System Privileges

This article analyzes a high‑risk Android Intent‑redirection vulnerability discovered in a smart‑terminal app, explains how attackers can gain system privileges to launch arbitrary activities, and outlines concrete mitigation steps for developers and security professionals.

AndroidIntent RedirectionMitigation
0 likes · 8 min read
How Intent Redirection Lets Malicious Android Apps Gain System Privileges
OPPO Amber Lab
OPPO Amber Lab
Dec 23, 2021 · Information Security

How Java Deserialization Vulnerabilities Enable Remote Code Execution

This article explains Java's reflection mechanism, details how deserialization flaws in libraries like Apache Commons Collections and Fastjson allow attackers to craft malicious objects that trigger arbitrary command execution, and provides practical proof‑of‑concept steps and mitigation recommendations.

DeserializationExploitFastJSON
0 likes · 7 min read
How Java Deserialization Vulnerabilities Enable Remote Code Execution
OPPO Amber Lab
OPPO Amber Lab
Nov 19, 2021 · Information Security

How Android 11’s New Features Opened Up Three Critical Security Holes

This article examines three Android 11 security vulnerabilities—CVE‑2021‑0485’s picture‑in‑picture resizing flaw, CVE‑2021‑0521’s unprotected package‑visibility API, and CVE‑2021‑0645’s storage‑access bypass—detailing their causes, code examples, and the patches Google released to mitigate them in practice.

AndroidAndroid 11CVE
0 likes · 7 min read
How Android 11’s New Features Opened Up Three Critical Security Holes
OPPO Amber Lab
OPPO Amber Lab
Nov 1, 2021 · Information Security

AI-Enabled Security Insights from the 2021 Pan-Terminal Workshop

The 2021 Pan‑Terminal Security Workshop, jointly organized by the China Computer Federation and OPPO at Xi'an Jiaotong University, gathered leading academics and industry experts to discuss AI‑driven security, kernel protection, and blockchain finance, offering livestream access and video recordings for the research community.

AI securityCybersecurityInformation Security
0 likes · 3 min read
AI-Enabled Security Insights from the 2021 Pan-Terminal Workshop
OPPO Amber Lab
OPPO Amber Lab
Sep 14, 2021 · Information Security

Master Fuzz Testing with AFL and Honggfuzz: Step‑by‑Step Guide

This guide walks you through the fundamentals of fuzz testing, demonstrating how to install, configure, and use popular tools like AFL and Honggfuzz on Ubuntu to detect buffer overflows, illegal memory accesses, and other security vulnerabilities in C programs, complete with code examples and result analysis.

AFLC programmingaddress sanitizer
0 likes · 16 min read
Master Fuzz Testing with AFL and Honggfuzz: Step‑by‑Step Guide
OPPO Amber Lab
OPPO Amber Lab
Aug 10, 2021 · Information Security

AI, IoT, and Zero Trust: Key Takeaways from the 2021 ACM China Turing Conference

At the 2021 ACM China Turing Conference in Hefei, leading academics and industry experts presented cutting‑edge research on AI‑driven security, mobile OS vulnerability detection, IoT sensor risks, ARM confidential computing, and zero‑trust frameworks, highlighting how emerging technologies reshape secure mobile and industrial ecosystems.

AIARMInformation Security
0 likes · 7 min read
AI, IoT, and Zero Trust: Key Takeaways from the 2021 ACM China Turing Conference