Follow
Lwin Khin SHAR
Lwin Khin SHAR
Associate Professor of Computer Science
Verified email at smu.edu.sg - Homepage
Title
Cited by
Cited by
Year
Defeating SQL injection
LK Shar, HBK Tan
Computer 46 (3), 69-77, 2012
1662012
Web application vulnerability prediction using hybrid program analysis and machine learning
LK Shar, LC Briand, HBK Tan
IEEE Transactions on dependable and secure computing 12 (6), 688-707, 2014
1622014
Mining SQL injection and cross site scripting vulnerabilities using hybrid program analysis
LK Shar, HBK Tan, LC Briand
2013 35th International Conference on Software Engineering (ICSE), 642-651, 2013
1542013
Automated removal of cross site scripting vulnerabilities in web applications
LK Shar, HBK Tan
Information and Software Technology 54 (5), 467-478, 2012
1302012
Predicting SQL injection and cross site scripting vulnerabilities through mining input sanitization patterns
LK Shar, HBK Tan
Information and Software Technology 55 (10), 1767-1780, 2013
1242013
Predicting common web application vulnerabilities from input validation and sanitization code patterns
LK Shar, HBK Tan
Proceedings of the 27th IEEE/ACM International Conference on Automated …, 2012
1212012
Defending against cross-site scripting attacks
LK Shar, HBK Tan
Computer 45 (3), 55-62, 2011
1022011
Mining input sanitization patterns for predicting SQL injection and cross site scripting vulnerabilities
LK Shar, HBK Tan
2012 34th International Conference on Software Engineering (ICSE), 1293-1296, 2012
902012
Modeling security and privacy requirements: a use case-driven approach
PX Mai, A Goknil, LK Shar, F Pastore, LC Briand, S Shaame
Information and Software Technology 100, 165-182, 2018
822018
Out of sight, out of mind? How vulnerable dependencies affect open-source projects
GAA Prana, A Sharma, LK Shar, D Foo, AE Santosa, A Sharma, D Lo
Empirical Software Engineering 26, 1-34, 2021
782021
Auditing the XSS defence features implemented in web application programs
LK Shar, HBK Tan
IET software 6 (4), 377-390, 2012
572012
A scalable approach for malware detection through bounded feature space behavior modeling
M Chandramohan, HBK Tan, LC Briand, LK Shar, BM Padmanabhuni
2013 28th IEEE/ACM International Conference on Automated Software …, 2013
512013
Search-driven string constraint solving for vulnerability detection
J Thomé, LK Shar, D Bianculli, L Briand
2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE …, 2017
452017
Security analysis of permission re-delegation vulnerabilities in Android apps
BF Demissie, M Ceccato, LK Shar
Empirical Software Engineering 25 (6), 5084-5136, 2020
412020
An integrated approach for effective injection vulnerability analysis of web applications through security slicing and hybrid constraint solving
J Thome, LK Shar, D Bianculli, L Briand
IEEE Transactions on Software Engineering 46 (2), 163-195, 2018
412018
Security slicing for auditing common injection vulnerabilities
J Thomé, LK Shar, D Bianculli, L Briand
Journal of Systems and Software 137, 766-783, 2018
402018
Security slicing for auditing XML, XPath, and SQL injection vulnerabilities
J Thomé, LK Shar, L Briand
2015 IEEE 26th International Symposium on Software Reliability Engineering …, 2015
262015
Scalable malware clustering through coarse-grained behavior modeling
M Chandramohan, HBK Tan, LK Shar
Proceedings of the ACM SIGSOFT 20th International Symposium on the …, 2012
262012
Auditing the defense against cross site scripting in web applications
LK Shar, HBK Tan
2010 International Conference on Security and Cryptography (SECRYPT), 1-7, 2010
202010
Joanaudit: A tool for auditing common injection vulnerabilities
J Thomé, LK Shar, D Bianculli, LC Briand
Proceedings of the 2017 11th Joint Meeting on Foundations of Software …, 2017
162017
The system can't perform the operation now. Try again later.
Articles 1–20