Travelled to:
1 × Argentina
1 × Belgium
1 × Canada
1 × China
1 × Croatia
1 × Greece
1 × Italy
1 × Portugal
1 × South Korea
1 × Switzerland
1 × United Kingdom
2 × Germany
6 × USA
Collaborated with:
L.K.Shar H.Zhang K.Liu M.N.Ngo M.Chandramohan S.Ding N.L.Thein Y.Arnatovich L.C.Briand H.Liu W.Li ∅ D.Trinh Y.Zhao Y.Li C.Soh Y.L.Arnatovich L.Wang T.W.Ling S.Jarzabek Y.S.Ho B.M.Padmanabhuni X.Chen B.Padmanabhuni Y.Xue Z.Xu Y.L.0003 C.Y.Cho
Talks about:
input (6) program (5) pattern (5) detect (5) applic (5) vulner (4) model (4) cross (4) data (4) databas (3)
Person: Hee Beng Kuan Tan
DBLP: Tan:Hee_Beng_Kuan
Facilitated 0 volumes:
Contributed to:
Wrote 25 papers:
- ICPC-2015-SohTAW #android #detection #user interface
- Detecting clones in Android applications through analyzing user interfaces (CS, HBKT, YLA, LW), pp. 163–173.
- CSMR-WCRE-2014-DingZT #branch #detection
- Detecting infeasible branches based on code patterns (SD, HZ, HBKT), pp. 74–83.
- ICEIS-v2-2014-DingTZ #automation #c #c++ #source code
- Automatic Removal of Buffer Overflow Vulnerabilities in C/C++ Programs (SD, HBKT, HZ), pp. 49–59.
- SAC-2014-LiuTZ #constraints #mining
- Mining key and referential constraints enforcement patterns (KL, HBKT, HZ), pp. 850–854.
- SEKE-2014-ArnatovichTDLS #android #comparison #empirical
- Empirical Comparison of Intermediate Representations for Android Applications (YA, HBKT, SD, KL, LKS), pp. 205–210.
- SEKE-2014-LiuTA #database #detection
- Detecting Anomaly in the Usage of Database Attribute (KL, HBKT, YA), pp. 705–710.
- ASE-2013-ChandramohanTBSP #approach #behaviour #bound #detection #modelling #scalability
- A scalable approach for malware detection through bounded feature space behavior modeling (MC, HBKT, LCB, LKS, BMP), pp. 312–322.
- ICSE-2013-SharTB #hybrid #injection #mining #program analysis #sql #using
- Mining SQL injection and cross site scripting vulnerabilities using hybrid program analysis (LKS, HBKT, LCB), pp. 642–651.
- WCRE-2013-LiuTZ #debugging #question
- Has this bug been reported? (KL, HBKT, HZ), pp. 82–91.
- ASE-2012-SharT #predict #validation #web
- Predicting common web application vulnerabilities from input validation and sanitization code patterns (LKS, HBKT), pp. 310–313.
- FSE-2012-ChandramohanTS #behaviour #clustering #modelling #scalability
- Scalable malware clustering through coarse-grained behavior modeling (MC, HBKT, LKS), p. 27.
- FSE-2012-LiuTC #debugging #question
- Has this bug been reported? (KL, HBKT, MC), p. 28.
- ICSE-2012-SharT #injection #mining #predict #sql
- Mining input sanitization patterns for predicting SQL injection and cross site scripting vulnerabilities (LKS, HBKT), pp. 1293–1296.
- SEKE-2011-LiuTCZP #automation #database #lifecycle
- Automated Extraction of Data Lifecycle Support from Database Applications (KL, HBKT, XC, HZ, BP), pp. 432–437.
- ESEC-FSE-2007-NgoT #detection #scalability
- Detecting large number of infeasible paths through recognizing their patterns (MNN, HBKT), pp. 215–224.
- ICPC-2006-NgoTT #automation #database #interactive #web
- Automated Extraction of Database Interactions in Web Applications (MNN, HBKT, DT), pp. 117–126.
- ICSE-2006-TanZZ #concept #information management #modelling
- Estimating LOC for information systems from their conceptual data models (HBKT, YZ, HZ), pp. 321–330.
- ICSM-2006-LiuT #approach #comprehension #maintenance #validation
- An Approach to Aid the Understanding and Maintenance of Input Validation (HL, HBKT), pp. 370–379.
- ICSM-2006-NgoT #fault #maintenance
- A Method to Aid Recovery and Maintenance of the Input Error Correction Features (MNN, HBKT), pp. 360–369.
- ASE-2002-TanL #design #object-oriented #requirements
- Systematic Bridging the Gap between Requirements and OO Design (HBKT, WL), pp. 249–252.
- WCRE-2002-TanT #fault #program analysis #transaction #verification
- Verifying Provisions for Post-Transaction User Input Error Correction through Static Program Analysis (HBKT, NLT), p. 233–?.
- SEKE-2001-TanTL #design #fault #transaction
- Design for Post-Transaction Input Error Handling (HBKT, NLT, YL), pp. 212–219.
- ASE-1997-Tan #component #data-driven #interface #reuse #source code #usability
- Enhancing the Component Reusability in Data-Intensive Business Programs through Interface Separation (HBKT), pp. 313–314.
- SAC-1993-TanLJH #reuse #specification #usability
- The Data Derivation Model: A Program Specification Technique That Improves Reusability (HBKT, TWL, SJ, YSH), pp. 95–102.
- FSE-2016-ChandramohanXXL #architecture #named
- BinGo: cross-architecture cross-OS binary search (MC, YX, ZX, YL0, CYC, HBKT), pp. 678–689.