Follow
Lwin Khin SHAR
Lwin Khin SHAR
Associate Professor of Computer Science
Verified email at smu.edu.sg - Homepage
Title
Cited by
Cited by
Year
Defeating SQL injection
LK Shar, HBK Tan
Computer 46 (3), 69-77, 2012
1552012
Mining SQL injection and cross site scripting vulnerabilities using hybrid program analysis
LK Shar, HBK Tan, LC Briand
2013 35th International Conference on Software Engineering (ICSE), 642-651, 2013
1492013
Web application vulnerability prediction using hybrid program analysis and machine learning
LK Shar, LC Briand, HBK Tan
IEEE Transactions on dependable and secure computing 12 (6), 688-707, 2014
1482014
Automated removal of cross site scripting vulnerabilities in web applications
LK Shar, HBK Tan
Information and Software Technology 54 (5), 467-478, 2012
1302012
Predicting SQL injection and cross site scripting vulnerabilities through mining input sanitization patterns
LK Shar, HBK Tan
Information and Software Technology 55 (10), 1767-1780, 2013
1192013
Predicting common web application vulnerabilities from input validation and sanitization code patterns
LK Shar, HBK Tan
Proceedings of the 27th IEEE/ACM International Conference on Automated …, 2012
1102012
Defending against cross-site scripting attacks
LK Shar, HBK Tan
Computer 45 (3), 55-62, 2011
992011
Mining input sanitization patterns for predicting SQL injection and cross site scripting vulnerabilities
LK Shar, HBK Tan
2012 34th International Conference on Software Engineering (ICSE), 1293-1296, 2012
882012
Modeling security and privacy requirements: a use case-driven approach
PX Mai, A Goknil, LK Shar, F Pastore, LC Briand, S Shaame
Information and Software Technology 100, 165-182, 2018
742018
Auditing the XSS defence features implemented in web application programs
LK Shar, HBK Tan
IET software 6 (4), 377-390, 2012
532012
Out of sight, out of mind? How vulnerable dependencies affect open-source projects
GAA Prana, A Sharma, LK Shar, D Foo, AE Santosa, A Sharma, D Lo
Empirical Software Engineering 26, 1-34, 2021
522021
A scalable approach for malware detection through bounded feature space behavior modeling
M Chandramohan, HBK Tan, LC Briand, LK Shar, BM Padmanabhuni
2013 28th IEEE/ACM International Conference on Automated Software …, 2013
512013
Security slicing for auditing common injection vulnerabilities
J Thomé, LK Shar, D Bianculli, L Briand
Journal of Systems and Software 137, 766-783, 2018
392018
Search-driven string constraint solving for vulnerability detection
J Thomé, LK Shar, D Bianculli, L Briand
2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE …, 2017
392017
An integrated approach for effective injection vulnerability analysis of web applications through security slicing and hybrid constraint solving
J Thome, LK Shar, D Bianculli, L Briand
IEEE Transactions on Software Engineering 46 (2), 163-195, 2018
382018
Security analysis of permission re-delegation vulnerabilities in Android apps
BF Demissie, M Ceccato, LK Shar
Empirical Software Engineering 25 (6), 5084-5136, 2020
322020
Security slicing for auditing XML, XPath, and SQL injection vulnerabilities
J Thomé, LK Shar, L Briand
2015 IEEE 26th International Symposium on Software Reliability Engineering …, 2015
262015
Scalable malware clustering through coarse-grained behavior modeling
M Chandramohan, HBK Tan, LK Shar
Proceedings of the ACM SIGSOFT 20th International Symposium on the …, 2012
242012
Auditing the defense against cross site scripting in web applications
LK Shar, HBK Tan
2010 International Conference on Security and Cryptography (SECRYPT), 1-7, 2010
202010
Joanaudit: A tool for auditing common injection vulnerabilities
J Thomé, LK Shar, D Bianculli, LC Briand
Proceedings of the 2017 11th Joint Meeting on Foundations of Software …, 2017
162017
The system can't perform the operation now. Try again later.
Articles 1–20