Travelled to:
1 × Canada
1 × Germany
1 × Switzerland
3 × USA
Collaborated with:
H.B.K.Tan L.C.Briand M.Chandramohan J.Thomé D.Bianculli Y.Arnatovich S.Ding K.Liu B.M.Padmanabhuni
Talks about:
vulner (4) inject (3) behavior (2) scalabl (2) predict (2) pattern (2) script (2) malwar (2) common (2) applic (2)
Person: Lwin Khin Shar
DBLP: Shar:Lwin_Khin
Contributed to:
Wrote 7 papers:
- SEKE-2014-ArnatovichTDLS #android #comparison #empirical
- Empirical Comparison of Intermediate Representations for Android Applications (YA, HBKT, SD, KL, LKS), pp. 205–210.
- ASE-2013-ChandramohanTBSP #approach #behaviour #bound #detection #modelling #scalability
- A scalable approach for malware detection through bounded feature space behavior modeling (MC, HBKT, LCB, LKS, BMP), pp. 312–322.
- ICSE-2013-SharTB #hybrid #injection #mining #program analysis #sql #using
- Mining SQL injection and cross site scripting vulnerabilities using hybrid program analysis (LKS, HBKT, LCB), pp. 642–651.
- ASE-2012-SharT #predict #validation #web
- Predicting common web application vulnerabilities from input validation and sanitization code patterns (LKS, HBKT), pp. 310–313.
- FSE-2012-ChandramohanTS #behaviour #clustering #modelling #scalability
- Scalable malware clustering through coarse-grained behavior modeling (MC, HBKT, LKS), p. 27.
- ICSE-2012-SharT #injection #mining #predict #sql
- Mining input sanitization patterns for predicting SQL injection and cross site scripting vulnerabilities (LKS, HBKT), pp. 1293–1296.
- ESEC-FSE-2017-ThomeSBB #injection #named
- JoanAudit: a tool for auditing common injection vulnerabilities (JT, LKS, DB, LCB), pp. 1004–1008.