default search action
Hee Beng Kuan Tan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2016
- [j41]Bindu Madhavi Padmanabhuni, Hee Beng Kuan Tan:
Auditing buffer overflow vulnerabilities using hybrid static-dynamic analysis. IET Softw. 10(2): 54-61 (2016) - [c56]Charlie Soh, Hee Beng Kuan Tan, Yauhen Leanidavich Arnatovich, Annamalai Narayanan, Lipo Wang:
LibSift: Automated Detection of Third-Party Libraries in Android Applications. APSEC 2016: 41-48 - [c55]Yauhen Leanidavich Arnatovich, Minh Ngoc Ngo, Hee Beng Kuan Tan, Charlie Soh:
Achieving High Code Coverage in Android UI Testing via Automated Widget Exercising. APSEC 2016: 193-200 - [c54]Mahinthan Chandramohan, Yinxing Xue, Zhengzi Xu, Yang Liu, Chia Yuan Cho, Hee Beng Kuan Tan:
BinGo: cross-architecture cross-OS binary search. SIGSOFT FSE 2016: 678-689 - 2015
- [j40]Lwin Khin Shar, Lionel C. Briand, Hee Beng Kuan Tan:
Web Application Vulnerability Prediction Using Hybrid Program Analysis and Machine Learning. IEEE Trans. Dependable Secur. Comput. 12(6): 688-707 (2015) - [c53]Bindu Madhavi Padmanabhuni, Hee Beng Kuan Tan:
Buffer Overflow Vulnerability Prediction from x86 Executables Using Static Analysis and Machine Learning. COMPSAC 2015: 450-459 - [c52]Bindu Madhavi Padmanabhuni, Hee Beng Kuan Tan:
Light-Weight Rule-Based Test Case Generation for Detecting Buffer Overflow Vulnerabilities. AST@ICSE 2015: 48-52 - [c51]Sun Ding, Hee Beng Kuan Tan, Lwin Khin Shar:
Mining Patterns of Unsatisfiable Constraints to Detect Infeasible Paths. AST@ICSE 2015: 65-69 - [c50]Charlie Soh, Hee Beng Kuan Tan, Yauhen Leanidavich Arnatovich, Lipo Wang:
Detecting clones in Android applications through analyzing user interfaces. ICPC 2015: 163-173 - 2014
- [c49]Kaiping Liu, Hee Beng Kuan Tan:
Faceted Bug Report Search with Topic Model. COMPSAC 2014: 123-128 - [c48]Bindu Madhavi Padmanabhuni, Hee Beng Kuan Tan:
Auditing Buffer Overflow Vulnerabilities Using Hybrid Static-Dynamic Analysis. COMPSAC 2014: 394-399 - [c47]Sun Ding, Hongyu Zhang, Hee Beng Kuan Tan:
Detecting infeasible branches based on code patterns. CSMR-WCRE 2014: 74-83 - [c46]Sun Ding, Hee Beng Kuan Tan, Hongyu Zhang:
Automatic Removal of Buffer Overflow Vulnerabilities in C/C++ Programs. ICEIS (2) 2014: 49-59 - [c45]Sun Ding, Hee Beng Kuan Tan, Hongyu Zhang:
ABOR: An Automatic Framework for Buffer Overflow Removal in C/C++Programs. ICEIS (Revised Selected Papers) 2014: 204-221 - [c44]Bindu Madhavi Padmanabhuni, Hee Beng Kuan Tan:
Predicting Buffer Overflow Vulnerabilities through Mining Light-Weight Static Code Attributes. ISSRE Workshops 2014: 317-322 - [c43]Kaiping Liu, Hee Beng Kuan Tan, Hongyu Zhang:
Mining key and referential constraints enforcement patterns. SAC 2014: 850-854 - [c42]Yauhen Arnatovich, Hee Beng Kuan Tan, Sun Ding, Kaiping Liu, Lwin Khin Shar:
Empirical Comparison of Intermediate Representations for Android Applications. SEKE 2014: 205-210 - [c41]Kaiping Liu, Hee Beng Kuan Tan, Yauhen Arnatovich:
Detecting Anomaly in the Usage of Database Attribute. SEKE 2014: 705-710 - 2013
- [j39]Lwin Khin Shar, Hee Beng Kuan Tan:
Defeating SQL Injection. Computer 46(3): 69-77 (2013) - [j38]Kaiping Liu, Hee Beng Kuan Tan, Xu Chen:
Binary Code Analysis. Computer 46(8): 60-68 (2013) - [j37]Kaiping Liu, Hee Beng Kuan Tan, Xu Chen:
Supporting the adaptation of open-source database applications through extracting data lifecycles. IET Softw. 7(4): 213-221 (2013) - [j36]Lwin Khin Shar, Hee Beng Kuan Tan:
Predicting SQL injection and cross site scripting vulnerabilities through mining input sanitization patterns. Inf. Softw. Technol. 55(10): 1767-1780 (2013) - [j35]Kaiping Liu, Hee Beng Kuan Tan, Xu Chen:
Automated Insertion of Exception Handling for Key and Referential Constraints. J. Database Manag. 24(1): 1-19 (2013) - [j34]Kaiping Liu, Hee Beng Kuan Tan, Xu Chen:
Aiding Maintenance of Database Applications Through Extracting Attribute Dependency Graph. J. Database Manag. 24(1): 20-35 (2013) - [c40]Kaiping Liu, Hee Beng Kuan Tan:
Mining Attribute Lifecycle to Predict Faults and Incompleteness in Database Applications. APSEC (1) 2013: 223-230 - [c39]Sun Ding, Hee Beng Kuan Tan, Lwin Khin Shar, Bindu Madhavi Padmanabhuni:
Towards a Hybrid Framework for Detecting Input Manipulation Vulnerabilities. APSEC (1) 2013: 363-370 - [c38]Lwin Khin Shar, Hee Beng Kuan Tan, Lionel C. Briand:
Mining SQL injection and cross site scripting vulnerabilities using hybrid program analysis. ICSE 2013: 642-651 - [c37]Mahinthan Chandramohan, Hee Beng Kuan Tan, Lionel C. Briand, Lwin Khin Shar, Bindu Madhavi Padmanabhuni:
A scalable approach for malware detection through bounded feature space behavior modeling. ASE 2013: 312-322 - [c36]Kaiping Liu, Hee Beng Kuan Tan, Hongyu Zhang:
Has this bug been reported? WCRE 2013: 82-91 - 2012
- [j33]Lwin Khin Shar, Hee Beng Kuan Tan:
Defending against Cross-Site Scripting Attacks. Computer 45(3): 55-62 (2012) - [j32]Mahinthan Chandramohan, Hee Beng Kuan Tan:
Detection of Mobile Malware in the Wild. Computer 45(9): 65-71 (2012) - [j31]Lwin Khin Shar, Hee Beng Kuan Tan:
Auditing the XSS defence features implemented in web application programs. IET Softw. 6(4): 377-390 (2012) - [j30]Lwin Khin Shar, Hee Beng Kuan Tan:
Automated removal of cross site scripting vulnerabilities in web applications. Inf. Softw. Technol. 54(5): 467-478 (2012) - [j29]Minh Ngoc Ngo, Hee Beng Kuan Tan:
Automated verification and testing of user-interactive undo features in database applications. Softw. Test. Verification Reliab. 22(4): 245-265 (2012) - [c35]Kaiping Liu, Hee Beng Kuan Tan, Lwin Khin Shar:
Semi-Automated Verification of Defense against SQL Injection in Web Applications. APSEC 2012: 91-96 - [c34]Kaiping Liu, Hee Beng Kuan Tan:
Automated Insertion of Exception Handling for Key and Referential Constraints. APSEC 2012: 848-856 - [c33]Sun Ding, Hee Beng Kuan Tan, Kaiping Liu, Mahinthan Chandramohan, Hongyu Zhang:
Detection of Buffer Overflow Vulnerabilities in C/C++ with Pattern Based Limited Symbolic Evaluation. COMPSAC Workshops 2012: 559-564 - [c32]Sun Ding, Hee Beng Kuan Tan, Kaiping Liu:
A Survey of Infeasible Path Detection. ENASE 2012: 43-52 - [c31]Sun Ding, Hee Beng Kuan Tan:
Detection of Infeasible Paths: Approaches and Challenges. ENASE (Selected Papers) 2012: 64-78 - [c30]Lwin Khin Shar, Hee Beng Kuan Tan:
Mining input sanitization patterns for predicting SQL injection and cross site scripting vulnerabilities. ICSE 2012: 1293-1296 - [c29]Lwin Khin Shar, Hee Beng Kuan Tan:
Predicting common web application vulnerabilities from input validation and sanitization code patterns. ASE 2012: 310-313 - [c28]Mahinthan Chandramohan, Hee Beng Kuan Tan, Lwin Khin Shar:
Scalable malware clustering through coarse-grained behavior modeling. SIGSOFT FSE 2012: 27 - [c27]Kaiping Liu, Hee Beng Kuan Tan, Mahinthan Chandramohan:
Has this bug been reported? SIGSOFT FSE 2012: 28 - 2011
- [j28]Bindu Padmanabhuni, Hee Beng Kuan Tan:
Defending against Buffer-Overflow Vulnerabilities. Computer 44(11): 53-60 (2011) - [j27]Sun Ding, Hee Beng Kuan Tan:
Design verification for database applications through analysing their support to data lifecycle. Int. J. Data Min. Model. Manag. 3(4): 406-417 (2011) - [j26]Hongyu Zhang, Hee Beng Kuan Tan, Lu Zhang, Xi Lin, Xiaoyin Wang, Chun Zhang, Hong Mei:
Checking enforcement of integrity constraints in database applications based on code patterns. J. Syst. Softw. 84(12): 2253-2264 (2011) - [c26]Kaiping Liu, Hee Beng Kuan Tan, Xu Chen:
Extraction of Attribute Dependency Graph from Database Applications. APSEC 2011: 138-145 - [c25]Kaiping Liu, Hee Beng Kuan Tan, Xu Chen, Hongyu Zhang, Bindu Padmanabhuni:
Automated Extraction of Data Lifecycle Support from Database Applications. SEKE 2011: 432-437 - 2010
- [j25]Hongyu Zhang, Yuan-Fang Li, Hee Beng Kuan Tan:
Measuring design complexity of semantic web ontologies. J. Syst. Softw. 83(5): 803-814 (2010) - [c24]Lwin Khin Shar, Hee Beng Kuan Tan:
Auditing the Defense Against Cross Site Scripting in Web Applications. SECRYPT 2010: 505-511 - [c23]Lwin Khin Shar, Hee Beng Kuan Tan:
Semi-Automated Verification and Removal of Open Redirect Vulnerabilities in Web Applications. Software Engineering Research and Practice 2010: 522-528
2000 – 2009
- 2009
- [j24]Hui Liu, Hee Beng Kuan Tan:
Covering code behavior on input validation in functional testing. Inf. Softw. Technol. 51(2): 546-553 (2009) - [j23]Hee Beng Kuan Tan, Yuan Zhao, Hongyu Zhang:
Conceptual data model-based software size estimation for information systems. ACM Trans. Softw. Eng. Methodol. 19(2): 4:1-4:37 (2009) - [i1]Hongyu Zhang, Hee Beng Kuan Tan, Michele Marchesi:
The Distribution of Program Sizes and Its Implications: An Eclipse Case Study. CoRR abs/0905.2288 (2009) - 2008
- [j22]Minh Ngoc Ngo, Hee Beng Kuan Tan:
Applying static analysis for automated extraction of database interactions in web applications. Inf. Softw. Technol. 50(3): 160-175 (2008) - [j21]Hui Liu, Hee Beng Kuan Tan:
An approach for the maintenance of input validation. Inf. Softw. Technol. 50(5): 449-461 (2008) - [j20]Minh Ngoc Ngo, Hee Beng Kuan Tan:
Heuristics-based infeasible path detection for dynamic test data generation. Inf. Softw. Technol. 50(7-8): 641-655 (2008) - [j19]Hui Liu, Hee Beng Kuan Tan:
Testing input validation in Web applications through automated model recovery. J. Syst. Softw. 81(2): 222-233 (2008) - 2007
- [j18]Minh Ngoc Ngo, Hee Beng Kuan Tan:
Empirical-based recovery and maintenance of input error-correction features. J. Softw. Maintenance Res. Pract. 19(6): 419-450 (2007) - [c22]Hongyu Zhang, Hee Beng Kuan Tan:
An Empirical Study of Class Sizes for Large Java Systems. APSEC 2007: 230-237 - [c21]Minh Ngoc Ngo, Hee Beng Kuan Tan:
Detecting large number of infeasible paths through recognizing their patterns. ESEC/SIGSOFT FSE 2007: 215-224 - 2006
- [j17]Hee Beng Kuan Tan, Yuan Zhao:
Sizing Data-Intensive Systems from ER Model. IEICE Trans. Inf. Syst. 89-D(4): 1321-1326 (2006) - [j16]Hee Beng Kuan Tan, Yong Yang, Lei Bian:
Improving the Use of Multiplicity in UML Association. J. Object Technol. 5(6): 127-132 (2006) - [j15]Hee Beng Kuan Tan, Yong Yang, Lei Bian:
Systematic Transformation of Functional Analysis Model into OO Design and Implementation. IEEE Trans. Software Eng. 32(2): 111-135 (2006) - [c20]Hui Liu, Hee Beng Kuan Tan:
Automated Verification and Test Case Generation for Input Validation. AST 2006: 29-35 - [c19]Hee Beng Kuan Tan, Yuan Zhao, Hongyu Zhang:
Estimating LOC for information systems from their conceptual data models. ICSE 2006: 321-330 - [c18]Minh Ngoc Ngo, Hee Beng Kuan Tan:
A Method to Aid Recovery and Maintenance of the Input Error Correction Features. ICSM 2006: 360-369 - [c17]Hui Liu, Hee Beng Kuan Tan:
An Approach to Aid the Understanding and Maintenance of Input Validation. ICSM 2006: 370-379 - [c16]Minh Ngoc Ngo, Hee Beng Kuan Tan, Doanh Trinh:
Automated Extraction of Database Interactions in Web Applications. ICPC 2006: 117-126 - 2004
- [j14]Hee Beng Kuan Tan, Yuan Zhao:
Automated elicitation of functional dependencies from source codes of database transactions. Inf. Softw. Technol. 46(2): 109-117 (2004) - [j13]Hee Beng Kuan Tan, Ni Lar Thein:
Recovery of PTUIE Handling from Source Codes through Recognizing Its Probable Properties. IEEE Trans. Knowl. Data Eng. 16(10): 1217-1231 (2004) - [c15]Hee Beng Kuan Tan, Yuan Zhao:
ER-Based Software Sizing for Data-Intensive Systems. ER 2004: 180-190 - [c14]Yong Yang, Hee Beng Kuan Tan:
Automated extracting code fragments that implement Security functionality from source programs. SNPD 2004: 252-258 - 2003
- [j12]Hee Beng Kuan Tan, Yuan Zhao:
Automated elicitation of inclusion dependencies from the source code for database transactions. J. Softw. Maintenance Res. Pract. 15(6): 379-392 (2003) - [j11]Hee Beng Kuan Tan, Lun Hao, Yong Yang:
On Formalization of the Whole-Part Relationship in the Unified Modeling Language. IEEE Trans. Software Eng. 29(11): 1054-1055 (2003) - [c13]Hee Beng Kuan Tan, Weihong Li:
Improving Requirements Analysis in OO Software Development. AMCIS 2003: 147 - [c12]Yuan Zhao, Hee Beng Kuan Tan, Wei Zhang:
Software Cost Estimation through Conceptual Requirement. QSIC 2003: 141- - 2002
- [j10]Hee Beng Kuan Tan, Tok Wang Ling, Cheng Hian Goh:
Exploring into Programs for the Recovery of Data Dependencies Designed. IEEE Trans. Knowl. Data Eng. 14(4): 825-835 (2002) - [c11]Hee Beng Kuan Tan, Weihong Li:
Systematic Bridging the Gap between Requirements and OO Design. ASE 2002: 249-252 - [c10]Hee Beng Kuan Tan, Ni Lar Thein:
Verifying Provisions for Post-Transaction User Input Error Correction through Static Program Analysis. WCRE 2002: 233- - 2001
- [j9]Hee Beng Kuan Tan, Ni Lar Thein:
Measuring post-transaction error handling in database applications. Inf. Softw. Technol. 43(4): 241-246 (2001) - [j8]Hee Beng Kuan Tan, Ni Lar Thein, Ye Li, Weihong Li:
A systematic approach for the design of post-transaction input error handling. Inf. Softw. Technol. 43(11): 641-649 (2001) - [j7]Hee Beng Kuan Tan, Juan Tiang Kow:
An approach for extracting code fragments that implement functionality from source programs. J. Softw. Maintenance Res. Pract. 13(1): 53-75 (2001) - [c9]Hee Beng Kuan Tan, Ni Lar Thein, Ye Li:
Design for Post-Transaction Input Error Handling. SEKE 2001: 212-219 - 2000
- [c8]Yu Li, Weihong Li, Hee Beng Kuan Tan:
A Reference Infrastructure for Electronic Commerce. APAQS 2000: 324-334
1990 – 1999
- 1999
- [j6]Hee Beng Kuan Tan, Tok Wang Ling:
Integrated design patterns for database applications. J. Syst. Softw. 47(2-3): 159-172 (1999) - [c7]Hee Beng Kuan Tan, Juan Tiang Kow:
Extracting Code Fragment that Implements Functionality. APSEC 1999: 351-354 - [c6]Hee Beng Kuan Tan, Hua Koon Tan:
Software Reuse through a Novel Representation that Supports Factorization. COMPSAC 1999: 344-349 - 1998
- [j5]Hee Beng Kuan Tan, Hua Koon Tan:
Reuse of components in data-intensive business programs through interface separation. Inf. Softw. Technol. 40(1): 15-25 (1998) - [j4]Hee Beng Kuan Tan, Tok Wang Ling:
Correct Program Slicing of Database Operations. IEEE Softw. 15(2): 105-112 (1998) - 1997
- [j3]Hee Beng Kuan Tan, Tok Wang Ling:
A method for the recovery of inclusion dependencies from data-intensive business programs. Inf. Softw. Technol. 39(1): 27-34 (1997) - [c5]Hee Beng Kuan Tan, Tok Wang Ling:
Recovery of Functional Dependencies from Data-Intensive Business Programs. HICSS (5) 1997: 81-88 - [c4]Hee Beng Kuan Tan:
Enhancing the Component Reusability in Data-Intensive Business Programs through Interface Separation. ASE 1997: 313-314 - 1996
- [j2]Hee Beng Kuan Tan, Tok Wang Ling:
Components reuse for data-intensive business programs through an object-oriented architecture. J. Syst. Softw. 34(1): 3-20 (1996) - [c3]Hee Beng Kuan Tan, Tok Wang Ling:
Slicing Functional Components from Data-Intensive Business Programs. COMPSAC 1996: 384-388 - 1995
- [j1]Hee Beng Kuan Tan, Tok Wang Ling:
Recovery of object-oriented design from existing data-intensive business programs. Inf. Softw. Technol. 37(2): 67-77 (1995) - 1993
- [c2]Hee Beng Kuan Tan, Tok Wang Ling, Yin Seong Ho:
Improving the Reusability of Program Specification Through Data Flow Modeling. ICCI 1993: 479-483 - [c1]Hee Beng Kuan Tan, Tok Wang Ling, Stan Jarzabek, Yin Seong Ho:
The Data Derivation Model: A Program Specification Technique That Improves Reusability. SAC 1993: 95-102
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:47 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint