Lwin Khin Shar

Orcid: 0000-0001-5130-0407

According to our database1, Lwin Khin Shar authored at least 48 papers between 2010 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Fuzzing drones for anomaly detection: A systematic literature review.
Comput. Secur., 2025

2024
Decentralized Multimedia Data Sharing in IoV: A Learning-Based Equilibrium of Supply and Demand.
IEEE Trans. Veh. Technol., March, 2024

LLM-Enhanced Static Analysis for Precise Identification of Vulnerable OSS Versions.
CoRR, 2024

The Price of Prompting: Profiling Energy Use in Large Language Models Inference.
CoRR, 2024

Security Modelling for Cyber-Physical Systems: A Systematic Literature Review.
CoRR, 2024

DronLomaly: Runtime Log-based Anomaly Detector for DJI Drones.
Proceedings of the 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion Proceedings, 2024

2023
Experimental comparison of features, analyses, and classifiers for Android malware detection.
Empir. Softw. Eng., November, 2023

AutoConf: Automated Configuration of Unsupervised Learning Systems Using Metamorphic Testing and Bayesian Optimization.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

Fine-Grained In-Context Permission Classification for Android Apps Using Control-Flow Graph Embedding.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

An Industrial Practice for Securing Android Apps in the Banking Domain.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

2022
Benchmark suite for "An Integrated Approach for Effective Injection Vulnerability Analysis of Web Applications through Security Slicing and Hybrid Constraint Solving".
Dataset, May, 2022

Automated reverse engineering of role-based access control policies of web applications.
J. Syst. Softw., 2022

AP-Coach: formative feedback generation for learning introductory programming concepts.
Proceedings of the IEEE International Conference on Teaching, 2022

Differentiated Security Architecture for Secure and Efficient Infotainment Data Communication in IoV Networks.
Proceedings of the Network and System Security - 16th International Conference, 2022

Right to Know, Right to Refuse: Towards UI Perception-Based Automated Fine-Grained Permission Controls for Android Apps.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

XSS for the Masses: Integrating Security in a Web Programming Course using a Security Scanner.
Proceedings of the ITiCSE 2022: Innovation and Technology in Computer Science Education, Dublin, Ireland, July 8, 2022

UIPDroid: Unrooted Dynamic Monitor of Android App UIs for Fine-Grained Permission Control.
Proceedings of the 44th IEEE/ACM International Conference on Software Engineering: Companion Proceedings, 2022

DronLomaly: Runtime Detection of Anomalous Drone Behaviors via Log Analysis and Deep Learning.
Proceedings of the 29th Asia-Pacific Software Engineering Conference, 2022

2021
COVID-19 One Year on - Security and Privacy Review of Contact Tracing Mobile Apps.
IEEE Pervasive Comput., 2021

Out of sight, out of mind? How vulnerable dependencies affect open-source projects.
Empir. Softw. Eng., 2021

Empirical Evaluation of Minority Oversampling Techniques in the Context of Android Malware Detection.
Proceedings of the 28th Asia-Pacific Software Engineering Conference, 2021

2020
An Integrated Approach for Effective Injection Vulnerability Analysis of Web Applications Through Security Slicing and Hybrid Constraint Solving.
IEEE Trans. Software Eng., 2020

Security analysis of permission re-delegation vulnerabilities in Android apps.
Empir. Softw. Eng., 2020

Experimental comparison of features and classifiers for Android malware detection.
Proceedings of the MOBILESoft '20: IEEE/ACM 7th International Conference on Mobile Software Engineering and Systems, 2020

SmartFuzz: An Automated Smart Fuzzing Approach for Testing SmartThings Apps.
Proceedings of the 27th Asia-Pacific Software Engineering Conference, 2020

2018
Security slicing for auditing common injection vulnerabilities.
J. Syst. Softw., 2018

Modeling Security and Privacy Requirements: a Use Case-Driven Approach.
Inf. Softw. Technol., 2018

AnFlo: detecting anomalous sensitive information flows in Android apps.
Proceedings of the 5th International Conference on Mobile Software Engineering and Systems, MOBILESoft@ICSE 2018, Gothenburg, Sweden, May 27, 2018

2017
JoanAudit: a tool for auditing common injection vulnerabilities.
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017

Search-driven string constraint solving for vulnerability detection.
Proceedings of the 39th International Conference on Software Engineering, 2017

2015
Web Application Vulnerability Prediction Using Hybrid Program Analysis and Machine Learning.
IEEE Trans. Dependable Secur. Comput., 2015

Security slicing for auditing XML, XPath, and SQL injection vulnerabilities.
Proceedings of the 26th IEEE International Symposium on Software Reliability Engineering, 2015

Mining Patterns of Unsatisfiable Constraints to Detect Infeasible Paths.
Proceedings of the 10th IEEE/ACM International Workshop on Automation of Software Test, 2015

2014
Empirical Comparison of Intermediate Representations for Android Applications.
Proceedings of the 26th International Conference on Software Engineering and Knowledge Engineering, 2014

2013
Predicting SQL injection and cross site scripting vulnerabilities through mining input sanitization patterns.
Inf. Softw. Technol., 2013

Defeating SQL Injection.
Computer, 2013

A scalable approach for malware detection through bounded feature space behavior modeling.
Proceedings of the 2013 28th IEEE/ACM International Conference on Automated Software Engineering, 2013

Mining SQL injection and cross site scripting vulnerabilities using hybrid program analysis.
Proceedings of the 35th International Conference on Software Engineering, 2013

Towards a Hybrid Framework for Detecting Input Manipulation Vulnerabilities.
Proceedings of the 20th Asia-Pacific Software Engineering Conference, 2013

2012
Automated removal of cross site scripting vulnerabilities in web applications.
Inf. Softw. Technol., 2012

Auditing the XSS defence features implemented in web application programs.
IET Softw., 2012

Defending against Cross-Site Scripting Attacks.
Computer, 2012

Scalable malware clustering through coarse-grained behavior modeling.
Proceedings of the 20th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-20), 2012

Predicting common web application vulnerabilities from input validation and sanitization code patterns.
Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, 2012

Mining input sanitization patterns for predicting SQL injection and cross site scripting vulnerabilities.
Proceedings of the 34th International Conference on Software Engineering, 2012

Semi-Automated Verification of Defense against SQL Injection in Web Applications.
Proceedings of the 19th Asia-Pacific Software Engineering Conference, 2012

2010
Semi-Automated Verification and Removal of Open Redirect Vulnerabilities in Web Applications.
Proceedings of the 2010 International Conference on Software Engineering Research & Practice, 2010

Auditing the Defense Against Cross Site Scripting in Web Applications.
Proceedings of the SECRYPT 2010, 2010


  Loading...