Defeating SQL injection LK Shar, HBK Tan Computer 46 (3), 69-77, 2012 | 158 | 2012 |
Web application vulnerability prediction using hybrid program analysis and machine learning LK Shar, LC Briand, HBK Tan IEEE Transactions on dependable and secure computing 12 (6), 688-707, 2014 | 156 | 2014 |
Mining SQL injection and cross site scripting vulnerabilities using hybrid program analysis LK Shar, HBK Tan, LC Briand 2013 35th International Conference on Software Engineering (ICSE), 642-651, 2013 | 150 | 2013 |
Automated removal of cross site scripting vulnerabilities in web applications LK Shar, HBK Tan Information and Software Technology 54 (5), 467-478, 2012 | 130 | 2012 |
Predicting SQL injection and cross site scripting vulnerabilities through mining input sanitization patterns LK Shar, HBK Tan Information and Software Technology 55 (10), 1767-1780, 2013 | 120 | 2013 |
Predicting common web application vulnerabilities from input validation and sanitization code patterns LK Shar, HBK Tan Proceedings of the 27th IEEE/ACM International Conference on Automated …, 2012 | 115 | 2012 |
Defending against cross-site scripting attacks LK Shar, HBK Tan Computer 45 (3), 55-62, 2011 | 101 | 2011 |
Mining input sanitization patterns for predicting SQL injection and cross site scripting vulnerabilities LK Shar, HBK Tan 2012 34th International Conference on Software Engineering (ICSE), 1293-1296, 2012 | 89 | 2012 |
Modeling security and privacy requirements: a use case-driven approach PX Mai, A Goknil, LK Shar, F Pastore, LC Briand, S Shaame Information and Software Technology 100, 165-182, 2018 | 77 | 2018 |
Out of sight, out of mind? How vulnerable dependencies affect open-source projects GAA Prana, A Sharma, LK Shar, D Foo, AE Santosa, A Sharma, D Lo Empirical Software Engineering 26, 1-34, 2021 | 62 | 2021 |
Auditing the XSS defence features implemented in web application programs LK Shar, HBK Tan IET software 6 (4), 377-390, 2012 | 54 | 2012 |
A scalable approach for malware detection through bounded feature space behavior modeling M Chandramohan, HBK Tan, LC Briand, LK Shar, BM Padmanabhuni 2013 28th IEEE/ACM International Conference on Automated Software …, 2013 | 49 | 2013 |
Search-driven string constraint solving for vulnerability detection J Thomé, LK Shar, D Bianculli, L Briand 2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE …, 2017 | 43 | 2017 |
Security slicing for auditing common injection vulnerabilities J Thomé, LK Shar, D Bianculli, L Briand Journal of Systems and Software 137, 766-783, 2018 | 40 | 2018 |
An integrated approach for effective injection vulnerability analysis of web applications through security slicing and hybrid constraint solving J Thome, LK Shar, D Bianculli, L Briand IEEE Transactions on Software Engineering 46 (2), 163-195, 2018 | 39 | 2018 |
Security analysis of permission re-delegation vulnerabilities in Android apps BF Demissie, M Ceccato, LK Shar Empirical Software Engineering 25 (6), 5084-5136, 2020 | 36 | 2020 |
Security slicing for auditing XML, XPath, and SQL injection vulnerabilities J Thomé, LK Shar, L Briand 2015 IEEE 26th International Symposium on Software Reliability Engineering …, 2015 | 26 | 2015 |
Scalable malware clustering through coarse-grained behavior modeling M Chandramohan, HBK Tan, LK Shar Proceedings of the ACM SIGSOFT 20th International Symposium on the …, 2012 | 24 | 2012 |
Auditing the defense against cross site scripting in web applications LK Shar, HBK Tan 2010 International Conference on Security and Cryptography (SECRYPT), 1-7, 2010 | 20 | 2010 |
Joanaudit: A tool for auditing common injection vulnerabilities J Thomé, LK Shar, D Bianculli, LC Briand Proceedings of the 2017 11th Joint Meeting on Foundations of Software …, 2017 | 16 | 2017 |