The 2nd ACM TURC-OPPO Security Summit Forum in 2023 was successfully held

The 2023 ACM China Turing Conference, a grand event in the field of computing science, was held in Wuhan from July 28 to 30. The conference invited experts, scholars and companies from all over the world, including many Turing Award winners and well-known academicians, to gather together to share the latest progress and future development in the computer field around the theme of "general intelligence, human-computer symbiosis". direction.

b52b47663a866ca514b5f0d5d20bbd65.jpeg

On the afternoon of July 30, the second ACM TURC-OPPO Security Summit Forum was successfully held. With the theme of "AI Empowers Security, Data Leads the Future", the forum aims to promote communication between academics and industry experts and scholars in the field of security, and explore issues of industry-university-research technology transformation and implementation. Professor Ling Zhen from Southeast University served as the host of this forum, Professor Xue Kaiping from University of Science and Technology of China, Professor Wang Haoyu from Huazhong University of Science and Technology, Associate Professor Jiang Yu from Tsinghua University, Wang Anyu, Director of OPPO ColorOS Security Technology, and Dr. to make a thematic report from the perspective of

With wearable devices, smart cars, smart terminals, smart robots and other smart devices with different capabilities, various network interaction protocols, and resource interaction and communication in different computing scenarios, ubiquitous interconnection and integration have been realized in the digital society, which has also led to The security threats of traditional computing scenarios and new ubiquitous service scenarios are intertwined, the boundaries of cross-fields become more blurred, and security and privacy risks become more complex. With the rapid development and wide application of AI technology, compared with the AI ​​model deployed on the server side, the environment on the device side is more complex and diverse, and the security threats it faces are also more diverse and fragmented. Security, system security, privacy protection, and even national security all pose enormous challenges.

c32cbbf1bf2527ca9cff5d5b5ebf1e38.jpeg

Wang Anyu, Director of Security Technology of OPPO ColorOS, said that the popularity of ChatGPT has once again put the security and privacy of AI in the spotlight. Security practitioners want to know whether ChatGPT can help their work, business managers want to know whether using ChatGPT can bring business advantages, and the public has concerns and concerns about security and privacy in the AI ​​era. In Wang Anyu's view, large language models such as ChatGPT are double-edged swords that can be used for network defense, such as AI text detection, code vulnerability detection, security knowledge query and visualization, threat intelligence collection, security analysis assistants and other powerful weapons. Counter the inherent risks of attack, privacy breaches, bias and fairness, misuse and abuse, and more. Finally, Wang Anyu interpreted the connotation of trusted AI and the white paper "Research on Trustworthy AI Security and Privacy Computing" released by OPPO in conjunction with multiple units, hoping to help all sectors of the society understand the connotation and current situation of trustworthy AI security and privacy technology more comprehensively, and jointly promote industrial development. .

2ca09b31b61f011daf1ce4464383e6fa.jpeg

Professor Xue Kaiping from the University of Science and Technology of China, titled "Blacktooth: Breaking through the Bluetooth Defense Mechanism Quietly", analyzed various Bluetooth protocol vulnerabilities, and shared a series of work on how Blacktooth broke through the vulnerabilities and the extensive impact on the industry ; This work also won the ACM CCS 2022 Best Paper Nomination Award.

75105c45b224b5acbc6c02619b00293b.jpeg

Associate Professor Jiang Yu from Tsinghua University gave a report titled "Database Software Fuzz Testing", focusing on the introduction of automated testing methods and frameworks, interpreting grammar-independent database fuzz testing, and demonstrating the effects of various database defect mining. In the future, the research group will build a large-scale fuzzing test cluster for the cross-level and all-type basic software and hardware supply chain, improve the efficiency of security vulnerability detection, repair, and protection, and build an independent unknown vulnerability library.

ec815db199e855c99c739f2129a69c33.jpeg

Professor Wang Haoyu from Huazhong University of Science and Technology focused on the security of mobile smart terminals in the era of large models, introduced in detail many new attack surfaces generated by LLM after its wide application, and carried out the analysis of APP security enhanced by large models from the perspectives of static analysis, dynamic analysis, and intent analysis . He hopes that large models can evolve to 3H (Honest, Harmless, Helpful) LLM in the future, and suggests that practitioners continue to pay attention to "supply chain security" in the large model ecosystem.

1e5069718910d7707529ecedfecb07f5.jpeg

Meng Dan, a senior privacy computing researcher at OPPO Research Institute, believes that active privacy technology provides a feasible solution to the privacy and security issues of new ubiquitous service scenarios. Dr. Meng Dan introduced the cutting-edge technologies and development trends in the field of active privacy from the perspective of private computing with cloud-device integration, as well as OPPO's preliminary exploration, practice and thinking in this direction. OPPO takes the initiative to build data legal and compliant use and circulation strategies, and implements user awareness, user control, risk analysis, and compliance audits to strengthen the entire life through end-to-cloud and cloud-to-cloud privacy enhancement technologies that can credibly carry policy requirements. Periodic user privacy and security protection capabilities.

11dfdd9944e3f7005f73d12bd936c522.jpeg

d17a863342937d135af073f04540e61f.jpeg

In the roundtable forum session hosted by Professor Lin Feng of Zhejiang University, the guests and audience conducted analysis and discussion on hot issues in the fields of terminal security, system security, application security, and AI security around "AI Empowers Security, Data Leads the Future". Discussions and exchanges also made suggestions for what relevant technical capabilities OPPO's products and services should have and reserve to deal with challenges and opportunities from their respective perspectives. It is hoped that OPPO will continue to develop security innovation functions and strengthen security with the mission of protecting smart terminal security and user data. ecological construction.

4ba7867657f2cbc6521c2649ed941926.jpeg

Finally, Liu Yunhuai, Vice Chairman of ACM China Council and Distinguished Professor of "Boya" of Peking University, made a concluding speech for the forum. It is hoped that ACM and OPPO will strengthen cooperation and technical communication in more directions in the future.

7cf4aff9d2d10c818cd9909903c4d835.jpeg

a972d9cf4ec385213b3db3b3b83ff7d2.png

The device-side security ecological construction in the era of large-scale models faces more AI security and privacy challenges and new opportunities. OPPO will adhere to the concept of "science and technology for the benefit of the world" and focus on the intelligence, heterogeneity, dynamics, and mobility of ubiquitous services. , openness, multi-modal perception interaction and other characteristics to carry out continuous technical research to meet the security requirements of communication between heterogeneous networks/devices and interactions between users and devices, and work together with colleagues in the academic community to break through the technical barriers of terminal security and privacy , build a reliable mutual integration ecology, and continue to provide users with safe and reliable products.

Past

Expect

push

recommend

Best Sound Quality Practices of RTC in Different Business Scenarios

An article to understand the bandwidth and synchronization of Vulkan in mobile rendering

Android VNDK/VSDK Snapshot compilation framework

501cd19536cef4397595bdeb9decb8c0.gif

Long press to follow Kernel Craftsman WeChat

Linux Kernel Black Technology | Technical Articles | Featured Tutorials

Guess you like

Origin blog.csdn.net/feelabclihu/article/details/132063096