Bingo: Cross-architecture cross-os binary search M Chandramohan, Y Xue, Z Xu, Y Liu, CY Cho, HBK Tan Proceedings of the 2016 24th ACM SIGSOFT international symposium on …, 2016 | 210 | 2016 |
Defeating SQL injection LK Shar, HBK Tan Computer 46 (3), 69-77, 2012 | 155 | 2012 |
Mining SQL injection and cross site scripting vulnerabilities using hybrid program analysis LK Shar, HBK Tan, LC Briand 2013 35th International Conference on Software Engineering (ICSE), 642-651, 2013 | 149 | 2013 |
Web application vulnerability prediction using hybrid program analysis and machine learning LK Shar, LC Briand, HBK Tan IEEE Transactions on dependable and secure computing 12 (6), 688-707, 2014 | 148 | 2014 |
Measuring design complexity of semantic web ontologies H Zhang, YF Li, HBK Tan Journal of Systems and Software 83 (5), 803-814, 2010 | 144 | 2010 |
Automated removal of cross site scripting vulnerabilities in web applications LK Shar, HBK Tan Information and Software Technology 54 (5), 467-478, 2012 | 130 | 2012 |
Detection of mobile malware in the wild M Chandramohan, HBK Tan Computer 45 (9), 65-71, 2012 | 121 | 2012 |
Predicting SQL injection and cross site scripting vulnerabilities through mining input sanitization patterns LK Shar, HBK Tan Information and Software Technology 55 (10), 1767-1780, 2013 | 119 | 2013 |
Predicting common web application vulnerabilities from input validation and sanitization code patterns LK Shar, HBK Tan Proceedings of the 27th IEEE/ACM International Conference on Automated …, 2012 | 110 | 2012 |
Defending against cross-site scripting attacks LK Shar, HBK Tan Computer 45 (3), 55-62, 2011 | 99 | 2011 |
Mining input sanitization patterns for predicting SQL injection and cross site scripting vulnerabilities LK Shar, HBK Tan 2012 34th International Conference on Software Engineering (ICSE), 1293-1296, 2012 | 88 | 2012 |
Detecting large number of infeasible paths through recognizing their patterns MN Ngo, HBK Tan Proceedings of the the 6th Joint Meeting of the European Software …, 2007 | 86 | 2007 |
Covering code behavior on input validation in functional testing H Liu, HBK Tan Information and Software Technology 51 (2), 546-553, 2009 | 84 | 2009 |
Detecting clones in android applications through analyzing user interfaces C Soh, HBK Tan, YL Arnatovich, L Wang 2015 IEEE 23rd international conference on program comprehension, 163-173, 2015 | 74 | 2015 |
Conceptual data model-based software size estimation for information systems HBK Tan, Y Zhao, H Zhang ACM Transactions on Software Engineering and Methodology (TOSEM) 19 (2), 1-37, 2009 | 69 | 2009 |
Heuristics-based infeasible path detection for dynamic test data generation MN Ngo, HBK Tan Information and Software Technology 50 (7-8), 641-655, 2008 | 66 | 2008 |
Auditing the XSS defence features implemented in web application programs LK Shar, HBK Tan IET software 6 (4), 377-390, 2012 | 53 | 2012 |
Estimating LOC for information systems from their conceptual data models HBK Tan, Y Zhao, H Zhang Proceedings of the 28th international conference on Software engineering …, 2006 | 52 | 2006 |
A scalable approach for malware detection through bounded feature space behavior modeling M Chandramohan, HBK Tan, LC Briand, LK Shar, BM Padmanabhuni 2013 28th IEEE/ACM International Conference on Automated Software …, 2013 | 51 | 2013 |
Has this bug been reported? K Liu, HBK Tan, M Chandramohan Proceedings of the ACM SIGSOFT 20th International Symposium on the …, 2012 | 44 | 2012 |