Zobrazeno 1 - 10
of 36
pro vyhledávání: '"Lwin Khin Shar"'
Autor:
Vikas Kumar Malviya, Chee Wei Leow, Ashok Kasthuri, Yan Naing Tun, Lwin Khin Shar, Lingxiao Jiang
Publikováno v:
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering.
Publikováno v:
2022 IEEE/ACM 44th International Conference on Software Engineering: Companion Proceedings (ICSE-Companion).
Cybersecurity education is considered an important part of undergraduate computing curricula, but many institutions teach it only in dedicated courses or tracks. This optionality risks students graduating with limited exposure to secure coding practi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::dd7c06676ee42ab8f93c8bc75f95f862
http://arxiv.org/abs/2204.12416
http://arxiv.org/abs/2204.12416
Publikováno v:
Network and System Security ISBN: 9783031230196
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f249c47d331f7be223f72047ac9c1e2f
https://doi.org/10.1007/978-3-031-23020-2_16
https://doi.org/10.1007/978-3-031-23020-2_16
Empirical Evaluation of Minority Oversampling Techniques in the Context of Android Malware Detection
Publikováno v:
2021 28th Asia-Pacific Software Engineering Conference (APSEC).
Autor:
Lwin Khin Shar, Darius Foo, Gede Artha Azriadi Prana, Asankhaya Sharma, David Lo, Abhishek Sharma, Andrew E. Santosa
Publikováno v:
Empirical Software Engineering. 26
Software developers often use open-source libraries in their project to improve development speed. However, such libraries may contain security vulnerabilities, and this has resulted in several high-profile incidents in recent years. As usage of open
Autor:
Glenn Kiah Yong Yeo, David Lo, Ta Nguyen Binh Duong, Eugene Kim, Lwin Khin Shar, Wei Minn, Lingxiao Jiang
Publikováno v:
APSEC
As IoT ecosystem has been fast-growing recently, there have been various security concerns of this new computing paradigm. Malicious IoT apps gaining access to IoT devices and capabilities to execute sensitive operations (sinks), e.g., controlling do
Malicious users can attack Web applications by exploiting injection vulnerabilities in the source code. This work addresses the challenge of detecting injection vulnerabilities in the server-side code of Java Web applications in a scalable and effect
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::2ed85bd11c46ee3744b5ea75a97ee943
http://orbilu.uni.lu/handle/10993/32059
http://orbilu.uni.lu/handle/10993/32059
Publikováno v:
MOBILESoft@ICSE
Android platform has dominated the smart phone market for years now and, consequently, gained a lot of attention from attackers. Malicious apps (malware) pose a serious threat to the security and privacy of Android smart phone users. Available approa
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::4ff76e58b5699c84501bc5969617e6c2
http://hdl.handle.net/11562/1029926
http://hdl.handle.net/11562/1029926
The Android platform facilitates reuse of app functionalities by allowing an app to request an action from another app through inter-process communication mechanism. This feature is one of the reasons for the popularity of Android, but it also poses
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::3c8e6be9a6bcb10f71d2a6960c28ccbb
http://hdl.handle.net/11562/1029919
http://hdl.handle.net/11562/1029919