Now showing items 1-4 of 4

    • Automated insertion of exception handling for key and referential constraints 

      Liu, Kaiping; Tan, Hee Beng Kuan (2012)
      Key and referential constraints are the two main integrity constraints in database applications. These constraints can be enforced by the Database Management System automatically. Any violation from these constraints is ...
    • Detection of buffer overflow vulnerabilities in C/C++ with pattern based limited symbolic evaluation 

      Ding, Sun; Tan, Hee Beng Kuan; Liu, Kaiping; Chandramohan, Mahinthan; Zhang, Hongyu (2012)
      Buffer overflow vulnerability is one of the major security threats for applications written in C/C++. Among the existing approaches for detecting buffer overflow vulnerability, though flow sensitive based approaches offer ...
    • Has this bug been reported? 

      Liu, Kaiping; Tan, Hee Beng Kuan; Chandramohan, Mahinthan (2012)
      Bug reporting is an uncoordinated process that is often the cause of redundant workload in triaging and fixing bugs due to many duplicated bug reports. Furthermore, quite often, same bugs are repeatedly reported as users ...
    • Semi-automated verification of defense against SQL injection in web applications 

      Liu, Kaiping; Tan, Hee Beng Kuan; Shar, Lwin Khin (2012)
      Recent reports reveal that majority of the attacks to Web applications are input manipulation attacks. Among these attacks, SQL injection attack malicious input is submitted to manipulate the database in a way that was ...