Hee Beng Kuan Tan

According to our database1, Hee Beng Kuan Tan authored at least 97 papers between 1993 and 2016.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Auditing buffer overflow vulnerabilities using hybrid static-dynamic analysis.
IET Softw., 2016

BinGo: cross-architecture cross-OS binary search.
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016

LibSift: Automated Detection of Third-Party Libraries in Android Applications.
Proceedings of the 23rd Asia-Pacific Software Engineering Conference, 2016

Achieving High Code Coverage in Android UI Testing via Automated Widget Exercising.
Proceedings of the 23rd Asia-Pacific Software Engineering Conference, 2016

2015
Web Application Vulnerability Prediction Using Hybrid Program Analysis and Machine Learning.
IEEE Trans. Dependable Secur. Comput., 2015

Detecting clones in Android applications through analyzing user interfaces.
Proceedings of the 2015 IEEE 23rd International Conference on Program Comprehension, 2015

Light-Weight Rule-Based Test Case Generation for Detecting Buffer Overflow Vulnerabilities.
Proceedings of the 10th IEEE/ACM International Workshop on Automation of Software Test, 2015

Mining Patterns of Unsatisfiable Constraints to Detect Infeasible Paths.
Proceedings of the 10th IEEE/ACM International Workshop on Automation of Software Test, 2015

Buffer Overflow Vulnerability Prediction from x86 Executables Using Static Analysis and Machine Learning.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

2014
Detecting Anomaly in the Usage of Database Attribute.
Proceedings of the 26th International Conference on Software Engineering and Knowledge Engineering, 2014

Empirical Comparison of Intermediate Representations for Android Applications.
Proceedings of the 26th International Conference on Software Engineering and Knowledge Engineering, 2014

Mining key and referential constraints enforcement patterns.
Proceedings of the Symposium on Applied Computing, 2014

Predicting Buffer Overflow Vulnerabilities through Mining Light-Weight Static Code Attributes.
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering Workshops, 2014

ABOR: An Automatic Framework for Buffer Overflow Removal in C/C++Programs.
Proceedings of the Enterprise Information Systems - 16th International Conference, 2014

Automatic Removal of Buffer Overflow Vulnerabilities in C/C++ Programs.
Proceedings of the ICEIS 2014, 2014

Detecting infeasible branches based on code patterns.
Proceedings of the 2014 Software Evolution Week, 2014

Faceted Bug Report Search with Topic Model.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014

2013
Aiding Maintenance of Database Applications Through Extracting Attribute Dependency Graph.
J. Database Manag., 2013

Automated Insertion of Exception Handling for Key and Referential Constraints.
J. Database Manag., 2013

Predicting SQL injection and cross site scripting vulnerabilities through mining input sanitization patterns.
Inf. Softw. Technol., 2013

Supporting the adaptation of open-source database applications through extracting data lifecycles.
IET Softw., 2013

Defeating SQL Injection.
Computer, 2013

Binary Code Analysis.
Computer, 2013

Has this bug been reported?
Proceedings of the 20th Working Conference on Reverse Engineering, 2013

A scalable approach for malware detection through bounded feature space behavior modeling.
Proceedings of the 2013 28th IEEE/ACM International Conference on Automated Software Engineering, 2013

Mining SQL injection and cross site scripting vulnerabilities using hybrid program analysis.
Proceedings of the 35th International Conference on Software Engineering, 2013

Mining Attribute Lifecycle to Predict Faults and Incompleteness in Database Applications.
Proceedings of the 20th Asia-Pacific Software Engineering Conference, 2013

Towards a Hybrid Framework for Detecting Input Manipulation Vulnerabilities.
Proceedings of the 20th Asia-Pacific Software Engineering Conference, 2013

2012
Automated verification and testing of user-interactive undo features in database applications.
Softw. Test. Verification Reliab., 2012

Automated removal of cross site scripting vulnerabilities in web applications.
Inf. Softw. Technol., 2012

Auditing the XSS defence features implemented in web application programs.
IET Softw., 2012

Defending against Cross-Site Scripting Attacks.
Computer, 2012

Detection of Mobile Malware in the Wild.
Computer, 2012

Has this bug been reported?
Proceedings of the 20th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-20), 2012

Scalable malware clustering through coarse-grained behavior modeling.
Proceedings of the 20th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-20), 2012

Predicting common web application vulnerabilities from input validation and sanitization code patterns.
Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, 2012

Mining input sanitization patterns for predicting SQL injection and cross site scripting vulnerabilities.
Proceedings of the 34th International Conference on Software Engineering, 2012

A Survey of Infeasible Path Detection.
Proceedings of the ENASE 2012, 2012

Detection of Infeasible Paths: Approaches and Challenges.
Proceedings of the Evaluation of Novel Approaches to Software Engineering, 2012

Detection of Buffer Overflow Vulnerabilities in C/C++ with Pattern Based Limited Symbolic Evaluation.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012

Semi-Automated Verification of Defense against SQL Injection in Web Applications.
Proceedings of the 19th Asia-Pacific Software Engineering Conference, 2012

Automated Insertion of Exception Handling for Key and Referential Constraints.
Proceedings of the 19th Asia-Pacific Software Engineering Conference, 2012

2011
Checking enforcement of integrity constraints in database applications based on code patterns.
J. Syst. Softw., 2011

Design verification for database applications through analysing their support to data lifecycle.
Int. J. Data Min. Model. Manag., 2011

Defending against Buffer-Overflow Vulnerabilities.
Computer, 2011

Automated Extraction of Data Lifecycle Support from Database Applications.
Proceedings of the 23rd International Conference on Software Engineering & Knowledge Engineering (SEKE'2011), 2011

Extraction of Attribute Dependency Graph from Database Applications.
Proceedings of the 18th Asia Pacific Software Engineering Conference, 2011

2010
Measuring design complexity of semantic web ontologies.
J. Syst. Softw., 2010

Semi-Automated Verification and Removal of Open Redirect Vulnerabilities in Web Applications.
Proceedings of the 2010 International Conference on Software Engineering Research & Practice, 2010

Auditing the Defense Against Cross Site Scripting in Web Applications.
Proceedings of the SECRYPT 2010, 2010

2009
Conceptual data model-based software size estimation for information systems.
ACM Trans. Softw. Eng. Methodol., 2009

Covering code behavior on input validation in functional testing.
Inf. Softw. Technol., 2009

The Distribution of Program Sizes and Its Implications: An Eclipse Case Study
CoRR, 2009

2008
Testing input validation in Web applications through automated model recovery.
J. Syst. Softw., 2008

Heuristics-based infeasible path detection for dynamic test data generation.
Inf. Softw. Technol., 2008

Applying static analysis for automated extraction of database interactions in web applications.
Inf. Softw. Technol., 2008

An approach for the maintenance of input validation.
Inf. Softw. Technol., 2008

2007
Empirical-based recovery and maintenance of input error-correction features.
J. Softw. Maintenance Res. Pract., 2007

Detecting large number of infeasible paths through recognizing their patterns.
Proceedings of the 6th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2007

An Empirical Study of Class Sizes for Large Java Systems.
Proceedings of the 14th Asia-Pacific Software Engineering Conference (APSEC 2007), 2007

2006
Systematic Transformation of Functional Analysis Model into OO Design and Implementation.
IEEE Trans. Software Eng., 2006

Improving the Use of Multiplicity in UML Association.
J. Object Technol., 2006

Sizing Data-Intensive Systems from ER Model.
IEICE Trans. Inf. Syst., 2006

Automated Extraction of Database Interactions in Web Applications.
Proceedings of the 14th International Conference on Program Comprehension (ICPC 2006), 2006

A Method to Aid Recovery and Maintenance of the Input Error Correction Features.
Proceedings of the 22nd IEEE International Conference on Software Maintenance (ICSM 2006), 2006

An Approach to Aid the Understanding and Maintenance of Input Validation.
Proceedings of the 22nd IEEE International Conference on Software Maintenance (ICSM 2006), 2006

Estimating LOC for information systems from their conceptual data models.
Proceedings of the 28th International Conference on Software Engineering (ICSE 2006), 2006

Automated Verification and Test Case Generation for Input Validation.
Proceedings of the 2006 International Workshop on Automation of Software Test, 2006

2004
Recovery of PTUIE Handling from Source Codes through Recognizing Its Probable Properties.
IEEE Trans. Knowl. Data Eng., 2004

Automated elicitation of functional dependencies from source codes of database transactions.
Inf. Softw. Technol., 2004

Automated extracting code fragments that implement Security functionality from source programs.
Proceedings of the 4th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2004), 2004

ER-Based Software Sizing for Data-Intensive Systems.
Proceedings of the Conceptual Modeling, 2004

2003
On Formalization of the Whole-Part Relationship in the Unified Modeling Language.
IEEE Trans. Software Eng., 2003

Automated elicitation of inclusion dependencies from the source code for database transactions.
J. Softw. Maintenance Res. Pract., 2003

Software Cost Estimation through Conceptual Requirement.
Proceedings of the 3rd International Conference on Quality Software (QSIC 2003), 2003

Improving Requirements Analysis in OO Software Development.
Proceedings of the 9th Americas Conference on Information Systems, 2003

2002
Exploring into Programs for the Recovery of Data Dependencies Designed.
IEEE Trans. Knowl. Data Eng., 2002

Verifying Provisions for Post-Transaction User Input Error Correction through Static Program Analysis.
Proceedings of the 9th Working Conference on Reverse Engineering (WCRE 2002), 28 October, 2002

Systematic Bridging the Gap between Requirements and OO Design.
Proceedings of the 17th IEEE International Conference on Automated Software Engineering (ASE 2002), 2002

2001
An approach for extracting code fragments that implement functionality from source programs.
J. Softw. Maintenance Res. Pract., 2001

A systematic approach for the design of post-transaction input error handling.
Inf. Softw. Technol., 2001

Measuring post-transaction error handling in database applications.
Inf. Softw. Technol., 2001

Design for Post-Transaction Input Error Handling.
Proceedings of the Thirteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2001), 2001

2000
A Reference Infrastructure for Electronic Commerce.
Proceedings of the 1st Asia-Pacific Conference on Quality Software (APAQS 2000), 2000

1999
Integrated design patterns for database applications.
J. Syst. Softw., 1999

Software Reuse through a Novel Representation that Supports Factorization.
Proceedings of the 23rd International Computer Software and Applications Conference (COMPSAC '99), 1999

Extracting Code Fragment that Implements Functionality.
Proceedings of the 6th Asia-Pacific Software Engineering Conference (APSEC '99), 1999

1998
Correct Program Slicing of Database Operations.
IEEE Softw., 1998

Reuse of components in data-intensive business programs through interface separation.
Inf. Softw. Technol., 1998

1997
A method for the recovery of inclusion dependencies from data-intensive business programs.
Inf. Softw. Technol., 1997

Enhancing the Component Reusability in Data-Intensive Business Programs through Interface Separation.
Proceedings of the 1997 International Conference on Automated Software Engineering, 1997

Recovery of Functional Dependencies from Data-Intensive Business Programs.
Proceedings of the 30th Annual Hawaii International Conference on System Sciences (HICSS-30), 1997

1996
Components reuse for data-intensive business programs through an object-oriented architecture.
J. Syst. Softw., 1996

Slicing Functional Components from Data-Intensive Business Programs.
Proceedings of the COMPSAC '96, 1996

1995
Recovery of object-oriented design from existing data-intensive business programs.
Inf. Softw. Technol., 1995

1993
The Data Derivation Model: A Program Specification Technique That Improves Reusability.
Proceedings of the 1993 ACM/SIGAPP Symposium on Applied Computing: States of the Art and Practice, 1993

Improving the Reusability of Program Specification Through Data Flow Modeling.
Proceedings of the Computing and Information, 1993


  Loading...