Zobrazeno 1 - 10
of 125
pro vyhledávání: '"Hee Beng Kuan Tan"'
Autor:
Yong Yang, Hee Beng Kuan Tan
Publikováno v:
Journal of ICT, Vol 6 (2007)
This paper describes the design and implementation of prototype system, F200 for the enhanced dataflow diagram, called data flow net (DF net) (Tan, Yang, & Bian), 2006). The prototype system transforms the software systems designed in DF net to 00 de
Externí odkaz:
https://doaj.org/article/dcfa957090fc4d2398960de267cfc3c6
Publikováno v:
IET Software. 10:54-61
Buffer overflow (BOF) vulnerabilities when present in code can be exploited to violate security objectives such as availability, confidentiality and integrity. They make up substantial portion of input manipulation attacks due to their common presenc
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 12:688-707
Due to limited time and resources, web software engineers need support in identifying vulnerable code. A practical approach to predicting vulnerable code would enable them to prioritize security auditing efforts. In this paper, we propose using a set
Autor:
Hee Beng Kuan Tan, Lwin Khin Shar
Publikováno v:
Information and Software Technology. 55:1767-1780
Context: SQL injection (SQLI) and cross site scripting (XSS) are the two most common and serious web application vulnerabilities for the past decade. To mitigate these two security threats, many vulnerability detection approaches based on static and
Publikováno v:
IET Software. 7:213-221
The adaptation of open-source database applications is common in the industry. Most open-source database applications are incomplete. During adaptation, users usually have to implement additional data maintenance. Hence, the completeness of an applic
Autor:
Lwin Khin Shar, Hee Beng Kuan Tan
Publikováno v:
Computer. 46:69-77
The best strategy for combating SQL injection, which has emerged as the most widespread website security risk, calls for integrating defensive coding practices with both vulnerability detection and runtime attack prevention methods.
Publikováno v:
Journal of Database Management. 24:1-19
Key and referential constraints are two main integrity constraints in database applications. These constraints can be automatically enforced by the Database Management System with their exception—violation from these constraints—handled by progra
Publikováno v:
Journal of Database Management. 24:20-35
Database is a major component of many software systems. This paper proposes a novel graph called the attribute dependency graph to reveal the dependencies between attributes in a database application and also the programs involved. The authors propos
Publikováno v:
SIGSOFT FSE
Binary code search has received much attention recently due to its impactful applications, e.g., plagiarism detection, malware detection and software vulnerability auditing. However, developing an effective binary code search tool is challenging due
Publikováno v:
Computer. 45:65-71
New techniques for detecting the presence of mobile malware can help protect smartphones from potential security threats.