Name
Affiliation
Papers
HEE BENG KUAN TAN
Nanyang Technological University, Singapore
92
Collaborators
Citations 
PageRank 
57
489
45.05
Referers 
Referees 
References 
975
1339
1029
Search Limit
1001000
Title
Citations
PageRank
Year
Achieving High Code Coverage in Android UI Testing via Automated Widget Exercising.00.342016
LibSift: Automated Detection of Third-Party Libraries in Android Applications.10.352016
BinGo: cross-architecture cross-OS binary search.300.792016
Auditing buffer overflow vulnerabilities using hybrid static–dynamic analysis20.442016
Buffer Overflow Vulnerability Prediction from x86 Executables Using Static Analysis and Machine Learning10.382015
Light-Weight Rule-Based Test Case Generation for Detecting Buffer Overflow Vulnerabilities00.342015
Detecting clones in Android applications through analyzing user interfaces50.412015
Web Application Vulnerability Prediction using Hybrid Program Analysis and Machine Learning130.742015
Mining Patterns of Unsatisfiable Constraints to Detect Infeasible Paths00.342015
Mining key and referential constraints enforcement patterns00.342014
Faceted Bug Report Search with Topic Model10.352014
Empirical Comparison of Intermediate Representations for Android Applications.00.342014
Automatic Removal of Buffer Overflow Vulnerabilities in C/C++ Programs.00.342014
Detecting infeasible branches based on code patterns20.392014
ABOR: An Automatic Framework for Buffer Overflow Removal in C/C++Programs00.342014
Detecting Anomaly in the Usage of Database Attribute.00.342014
Auditing Buffer Overflow Vulnerabilities Using Hybrid Static-Dynamic Analysis20.402014
Towards a Hybrid Framework for Detecting Input Manipulation Vulnerabilities.00.342013
Mining Attribute Lifecycle to Predict Faults and Incompleteness in Database Applications.00.342013
Automated Insertion of Exception Handling for Key and Referential Constraints20.392013
Defeating SQL Injection20.372013
Aiding Maintenance of Database Applications Through Extracting Attribute Dependency Graph30.402013
Has this bug been reported?00.342013
Predicting SQL injection and cross site scripting vulnerabilities through mining input sanitization patterns70.462013
Supporting the adaptation of open-source database applications through extracting data lifecycles.00.342013
A scalable approach for malware detection through bounded feature space behavior modeling.90.532013
Mining SQL injection and cross site scripting vulnerabilities using hybrid program analysis351.262013
Binary Code Analysis00.342013
Detection of Infeasible Paths: Approaches and Challenges.30.412012
Automated verification and testing of user-interactive undo features in database applications10.352012
Auditing the XSS defence features implemented in web application programs.100.772012
Mining input sanitization patterns for predicting SQL injection and cross site scripting vulnerabilities210.962012
Defending against Cross-Site Scripting Attacks110.682012
Automated removal of cross site scripting vulnerabilities in web applications151.032012
Semi-Automated Verification of Defense against SQL Injection in Web Applications00.342012
Scalable malware clustering through coarse-grained behavior modeling50.452012
A Survey of Infeasible Path Detection.00.342012
Detection of Buffer Overflow Vulnerabilities in C/C++ with Pattern Based Limited Symbolic Evaluation00.342012
Predicting common web application vulnerabilities from input validation and sanitization code patterns240.962012
Extraction of Attribute Dependency Graph from Database Applications20.372011
Checking enforcement of integrity constraints in database applications based on code patterns70.482011
Design verification for database applications through analysing their support to data lifecycle.00.342011
Automated Extraction of Data Lifecycle Support from Database Applications.50.442011
Defending against Buffer-Overflow Vulnerabilities30.512011
Semi-Automated Verification and Removal of Open Redirect Vulnerabilities in Web Applications00.342010
Measuring design complexity of semantic web ontologies461.252010
Auditing the Defense Against Cross Site Scripting in Web Applications10.372010
Covering code behavior on input validation in functional testing130.662009
The Distribution of Program Sizes and Its Implications: An Eclipse Case Study20.402009
Conceptual data model-based software size estimation for information systems160.902009
  • 1
  • 2