BibTeX records: Tongbo Luo

download as .bib file

@inproceedings{DBLP:conf/ndss/Liang0LH0X21,
  author       = {Junjie Liang and
                  Wenbo Guo and
                  Tongbo Luo and
                  Vasant G. Honavar and
                  Gang Wang and
                  Xinyu Xing},
  title        = {{FARE:} Enabling Fine-grained Attack Categorization under Low-quality
                  Labeled Data},
  booktitle    = {28th Annual Network and Distributed System Security Symposium, {NDSS}
                  2021, virtually, February 21-25, 2021},
  publisher    = {The Internet Society},
  year         = {2021},
  url          = {https://www.ndss-symposium.org/ndss-paper/fare-enabling-fine-grained-attack-categorization-under-low-quality-labeled-data/},
  timestamp    = {Tue, 19 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/Liang0LH0X21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Li0LL20,
  author       = {Xiaopeng Li and
                  Qiang Zeng and
                  Lannan Luo and
                  Tongbo Luo},
  editor       = {Jay Ligatti and
                  Xinming Ou and
                  Jonathan Katz and
                  Giovanni Vigna},
  title        = {T2Pair: Secure and Usable Pairing for Heterogeneous IoT Devices},
  booktitle    = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, USA, November 9-13, 2020},
  pages        = {309--323},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372297.3417286},
  doi          = {10.1145/3372297.3417286},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Li0LL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/JinLTD14,
  author       = {Xing Jin and
                  Tongbo Luo and
                  Derek G. Tsui and
                  Wenliang Du},
  title        = {Code Injection Attacks on HTML5-based Mobile Apps},
  journal      = {CoRR},
  volume       = {abs/1410.7756},
  year         = {2014},
  url          = {http://arxiv.org/abs/1410.7756},
  eprinttype    = {arXiv},
  eprint       = {1410.7756},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/JinLTD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/LuoJD13,
  author       = {Tongbo Luo and
                  Xing Jin and
                  Wenliang Du},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Lujo Bauer and
                  Jaehong Park},
  title        = {Mediums: visual integrity preserving framework},
  booktitle    = {Third {ACM} Conference on Data and Application Security and Privacy,
                  CODASPY'13, San Antonio, TX, USA, February 18-20, 2013},
  pages        = {309--316},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2435349.2435394},
  doi          = {10.1145/2435349.2435394},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/LuoJD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/JinWLD13,
  author       = {Xing Jin and
                  Lusha Wang and
                  Tongbo Luo and
                  Wenliang Du},
  editor       = {Yvo Desmedt},
  title        = {Fine-Grained Access Control for HTML5-Based Mobile Applications in
                  Android},
  booktitle    = {Information Security, 16th International Conference, {ISC} 2013, Dallas,
                  Texas, USA, November 13-15, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7807},
  pages        = {309--318},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-27659-5\_22},
  doi          = {10.1007/978-3-319-27659-5\_22},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/JinWLD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/LuoJAD12,
  author       = {Tongbo Luo and
                  Xing Jin and
                  Ajai Ananthanarayanan and
                  Wenliang Du},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Ali Miri and
                  Nadia Tawbi},
  title        = {Touchjacking Attacks on Web in Android, iOS, and Windows Phone},
  booktitle    = {Foundations and Practice of Security - 5th International Symposium,
                  {FPS} 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7743},
  pages        = {227--243},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37119-6\_15},
  doi          = {10.1007/978-3-642-37119-6\_15},
  timestamp    = {Sun, 02 Oct 2022 16:01:32 +0200},
  biburl       = {https://dblp.org/rec/conf/fps/LuoJAD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/TanDLS12,
  author       = {Xi Tan and
                  Wenliang Du and
                  Tongbo Luo and
                  Karthick Duraisamy Soundararaj},
  editor       = {Vijay Atluri and
                  Jaideep Vaidya and
                  Axel Kern and
                  Murat Kantarcioglu},
  title        = {{SCUTA:} a server-side access control system for web applications},
  booktitle    = {17th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  '12, Newark, NJ, {USA} - June 20 - 22, 2012},
  pages        = {71--82},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2295136.2295152},
  doi          = {10.1145/2295136.2295152},
  timestamp    = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/TanDLS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LuoHDWY11,
  author       = {Tongbo Luo and
                  Hao Hao and
                  Wenliang Du and
                  Yifei Wang and
                  Heng Yin},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {Attacks on WebView in the Android system},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {343--352},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076781},
  doi          = {10.1145/2076732.2076781},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LuoHDWY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/DuTLJZ11,
  author       = {Wenliang Du and
                  Xi Tan and
                  Tongbo Luo and
                  Karthick Jayaraman and
                  Zutao Zhu},
  editor       = {Yingjiu Li},
  title        = {Re-designing the Web's Access Control System - (Extended Abstract)},
  booktitle    = {Data and Applications Security and Privacy {XXV} - 25th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6818},
  pages        = {4--11},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22348-8\_2},
  doi          = {10.1007/978-3-642-22348-8\_2},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/DuTLJZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/DuJTLC11,
  author       = {Wenliang Du and
                  Karthick Jayaraman and
                  Xi Tan and
                  Tongbo Luo and
                  Steve J. Chapin},
  editor       = {Sean Peisert and
                  Richard Ford and
                  Carrie Gates and
                  Cormac Herley},
  title        = {Position paper: why are there so many vulnerabilities in web applications?},
  booktitle    = {2011 New Security Paradigms Workshop, {NSPW} '11, Marin County, CA,
                  USA, September 12-15, 2011},
  pages        = {83--94},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2073276.2073285},
  doi          = {10.1145/2073276.2073285},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/DuJTLC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/LuoD11,
  author       = {Tongbo Luo and
                  Wenliang Du},
  editor       = {Jonathan M. McCune and
                  Boris Balacheff and
                  Adrian Perrig and
                  Ahmad{-}Reza Sadeghi and
                  M. Angela Sasse and
                  Yolanta Beres},
  title        = {Contego: Capability-Based Access Control for Web Browsers - (Short
                  Paper)},
  booktitle    = {Trust and Trustworthy Computing - 4th International Conference, {TRUST}
                  2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6740},
  pages        = {231--238},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21599-5\_17},
  doi          = {10.1007/978-3-642-21599-5\_17},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/LuoD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WangLGDZ10,
  author       = {Guan Wang and
                  Tongbo Luo and
                  Michael T. Goodrich and
                  Wenliang Du and
                  Zutao Zhu},
  editor       = {Dengguo Feng and
                  David A. Basin and
                  Peng Liu},
  title        = {Bureaucratic protocols for secure two-party sorting, selection, and
                  permuting},
  booktitle    = {Proceedings of the 5th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2010, Beijing, China, April 13-16,
                  2010},
  pages        = {226--237},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1755688.1755716},
  doi          = {10.1145/1755688.1755716},
  timestamp    = {Fri, 03 Jun 2022 12:02:10 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/WangLGDZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics