Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Tongbo Luo
@inproceedings{DBLP:conf/ndss/Liang0LH0X21, author = {Junjie Liang and Wenbo Guo and Tongbo Luo and Vasant G. Honavar and Gang Wang and Xinyu Xing}, title = {{FARE:} Enabling Fine-grained Attack Categorization under Low-quality Labeled Data}, booktitle = {28th Annual Network and Distributed System Security Symposium, {NDSS} 2021, virtually, February 21-25, 2021}, publisher = {The Internet Society}, year = {2021}, url = {https://www.ndss-symposium.org/ndss-paper/fare-enabling-fine-grained-attack-categorization-under-low-quality-labeled-data/}, timestamp = {Tue, 19 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/Liang0LH0X21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Li0LL20, author = {Xiaopeng Li and Qiang Zeng and Lannan Luo and Tongbo Luo}, editor = {Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna}, title = {T2Pair: Secure and Usable Pairing for Heterogeneous IoT Devices}, booktitle = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020}, pages = {309--323}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372297.3417286}, doi = {10.1145/3372297.3417286}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Li0LL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/JinLTD14, author = {Xing Jin and Tongbo Luo and Derek G. Tsui and Wenliang Du}, title = {Code Injection Attacks on HTML5-based Mobile Apps}, journal = {CoRR}, volume = {abs/1410.7756}, year = {2014}, url = {http://arxiv.org/abs/1410.7756}, eprinttype = {arXiv}, eprint = {1410.7756}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/JinLTD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/LuoJD13, author = {Tongbo Luo and Xing Jin and Wenliang Du}, editor = {Elisa Bertino and Ravi S. Sandhu and Lujo Bauer and Jaehong Park}, title = {Mediums: visual integrity preserving framework}, booktitle = {Third {ACM} Conference on Data and Application Security and Privacy, CODASPY'13, San Antonio, TX, USA, February 18-20, 2013}, pages = {309--316}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2435349.2435394}, doi = {10.1145/2435349.2435394}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/LuoJD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/JinWLD13, author = {Xing Jin and Lusha Wang and Tongbo Luo and Wenliang Du}, editor = {Yvo Desmedt}, title = {Fine-Grained Access Control for HTML5-Based Mobile Applications in Android}, booktitle = {Information Security, 16th International Conference, {ISC} 2013, Dallas, Texas, USA, November 13-15, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7807}, pages = {309--318}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-27659-5\_22}, doi = {10.1007/978-3-319-27659-5\_22}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/JinWLD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/LuoJAD12, author = {Tongbo Luo and Xing Jin and Ajai Ananthanarayanan and Wenliang Du}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Ali Miri and Nadia Tawbi}, title = {Touchjacking Attacks on Web in Android, iOS, and Windows Phone}, booktitle = {Foundations and Practice of Security - 5th International Symposium, {FPS} 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7743}, pages = {227--243}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-37119-6\_15}, doi = {10.1007/978-3-642-37119-6\_15}, timestamp = {Sun, 02 Oct 2022 16:01:32 +0200}, biburl = {https://dblp.org/rec/conf/fps/LuoJAD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/TanDLS12, author = {Xi Tan and Wenliang Du and Tongbo Luo and Karthick Duraisamy Soundararaj}, editor = {Vijay Atluri and Jaideep Vaidya and Axel Kern and Murat Kantarcioglu}, title = {{SCUTA:} a server-side access control system for web applications}, booktitle = {17th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '12, Newark, NJ, {USA} - June 20 - 22, 2012}, pages = {71--82}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2295136.2295152}, doi = {10.1145/2295136.2295152}, timestamp = {Tue, 06 Nov 2018 16:57:58 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/TanDLS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LuoHDWY11, author = {Tongbo Luo and Hao Hao and Wenliang Du and Yifei Wang and Heng Yin}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {Attacks on WebView in the Android system}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {343--352}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076781}, doi = {10.1145/2076732.2076781}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LuoHDWY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/DuTLJZ11, author = {Wenliang Du and Xi Tan and Tongbo Luo and Karthick Jayaraman and Zutao Zhu}, editor = {Yingjiu Li}, title = {Re-designing the Web's Access Control System - (Extended Abstract)}, booktitle = {Data and Applications Security and Privacy {XXV} - 25th Annual {IFIP} {WG} 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6818}, pages = {4--11}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22348-8\_2}, doi = {10.1007/978-3-642-22348-8\_2}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/DuTLJZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/DuJTLC11, author = {Wenliang Du and Karthick Jayaraman and Xi Tan and Tongbo Luo and Steve J. Chapin}, editor = {Sean Peisert and Richard Ford and Carrie Gates and Cormac Herley}, title = {Position paper: why are there so many vulnerabilities in web applications?}, booktitle = {2011 New Security Paradigms Workshop, {NSPW} '11, Marin County, CA, USA, September 12-15, 2011}, pages = {83--94}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2073276.2073285}, doi = {10.1145/2073276.2073285}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/DuJTLC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/LuoD11, author = {Tongbo Luo and Wenliang Du}, editor = {Jonathan M. McCune and Boris Balacheff and Adrian Perrig and Ahmad{-}Reza Sadeghi and M. Angela Sasse and Yolanta Beres}, title = {Contego: Capability-Based Access Control for Web Browsers - (Short Paper)}, booktitle = {Trust and Trustworthy Computing - 4th International Conference, {TRUST} 2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6740}, pages = {231--238}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21599-5\_17}, doi = {10.1007/978-3-642-21599-5\_17}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/trust/LuoD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WangLGDZ10, author = {Guan Wang and Tongbo Luo and Michael T. Goodrich and Wenliang Du and Zutao Zhu}, editor = {Dengguo Feng and David A. Basin and Peng Liu}, title = {Bureaucratic protocols for secure two-party sorting, selection, and permuting}, booktitle = {Proceedings of the 5th {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2010, Beijing, China, April 13-16, 2010}, pages = {226--237}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1755688.1755716}, doi = {10.1145/1755688.1755716}, timestamp = {Fri, 03 Jun 2022 12:02:10 +0200}, biburl = {https://dblp.org/rec/conf/ccs/WangLGDZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.