​
Login / Signup
Bill Chu
Publication Activity (10 Years)
Years Active: 1998-2023
Publications (10 Years): 20
Top Topics
Static Analysis
Programming Education
Countermeasures
Unit Testing
Top Venues
CoRR
ISI
ICCCN
SIGCSE
</>
Publications
</>
Moumita Das Purba
,
Arpita Ghosh
,
Benjamin J. Radford
,
Bill Chu
Software Vulnerability Detection using Large Language Models.
ISSREW
(2023)
Moumita Das Purba
,
Bill Chu
Extracting Actionable Cyber Threat Intelligence from Twitter Stream.
ISI
(2023)
Moumita Das Purba
,
Bill Chu
,
Ehab Al-Shaer
From Word Embedding to Cyber-Phrase Embedding: Comparison of Processing Cybersecurity Texts.
ISI
(2020)
Justin Smith
,
Brittany Johnson
,
Emerson R. Murphy-Hill
,
Bill Chu
,
Heather Richter Lipford
How Developers Diagnose Potential Security Vulnerabilities with a Static Analysis Tool.
IEEE Trans. Software Eng.
45 (9) (2019)
Ghaith Husari
,
Ehab Al-Shaer
,
Bill Chu
,
Ruhani Faiheem Rahman
Learning APT chains from cyber threat intelligence.
HotSoS
(2019)
Mahmoud Mohammadi
,
Bill Chu
,
Heather Richter Lipford
Automated Repair of Cross-Site Scripting Vulnerabilities through Unit Testing.
ISSRE Workshops
(2019)
Tyler W. Thomas
,
Madiha Tabassum
,
Bill Chu
,
Heather Lipford
Security During Application Development: an Application Security Expert Perspective.
CHI
(2018)
Ghaith Husari
,
Xi Niu
,
Bill Chu
,
Ehab Al-Shaer
Using Entropy and Mutual Information to Extract Threat Actions from Cyber Threat Intelligence.
ISI
(2018)
Mahmoud Mohammadi
,
Bill Chu
,
Heather Richter Lipford
Using Unit Testing to Detect Sanitization Flaws.
CoRR
(2018)
Madiha Tabassum
,
Stacey Watson
,
Bill Chu
,
Heather Richter Lipford
Evaluating Two Methods for Integrating Secure Programming Education.
SIGCSE
(2018)
Mahmoud Mohammadi
,
Bill Chu
,
Heather Richter Lipford
Detecting Cross-Site Scripting Vulnerabilities through Automated Unit Testing.
CoRR
(2018)
Mahmoud Mohammadi
,
Bill Chu
,
Heather Richter Lipford
,
Emerson R. Murphy-Hill
Automatic Web Security Unit Testing: XSS Vulnerability Detection.
CoRR
(2018)
Mir Mehedi A. Pritom
,
Chuqin Li
,
Bill Chu
,
Xi Niu
A Study on Log Analysis Approaches Using Sandia Dataset.
ICCCN
(2017)
Mahmoud Mohammadi
,
Bill Chu
,
Heather Richter Lipford
Detecting Cross-Site Scripting Vulnerabilities through Automated Unit Testing.
QRS
(2017)
Ghaith Husari
,
Ehab Al-Shaer
,
Mohiuddin Ahmed
,
Bill Chu
,
Xi Niu
TTPDrill: Automatic and Accurate Extraction of Threat Actions from Unstructured Text of CTI Sources.
ACSAC
(2017)
Md. Nazmus Sakib Miazi
,
Mir Mehedi A. Pritom
,
Mohamed Shehab
,
Bill Chu
,
Jinpeng Wei
The Design of Cyber Threat Hunting Games: A Case Study.
ICCCN
(2017)
Tyler Thomas
,
Heather Lipford
,
Bill Chu
,
Justin Smith
,
Emerson R. Murphy-Hill
What Questions Remain? An Examination of How Developers Understand an Interactive Static Analysis Tool.
WSIW@SOUPS
(2016)
Spike E. Dog
,
Alex Tweed
,
LeRoy Rouse
,
Bill Chu
,
Duan Qi
,
Yueqi Hu
,
Jing Yang
,
Ehab Al-Shaer
Strategic Cyber Threat Intelligence Sharing: A Case Study of IDS Logs.
ICCCN
(2016)
Jun Zhu
,
Bill Chu
,
Heather Richter Lipford
Detecting Privilege Escalation Attacks through Instrumenting Web Application Source Code.
SACMAT
(2016)
Mahmoud Mohammadi
,
Bill Chu
,
Heather Richter Lipford
,
Emerson R. Murphy-Hill
Automatic web security unit testing: XSS vulnerability detection.
AST@ICSE
(2016)
Michael Whitney
,
Heather Richter Lipford
,
Bill Chu
,
Jun Zhu
Embedding Secure Coding Instruction into the IDE: A Field Study in an Advanced CS Course.
SIGCSE
(2015)
Jun Zhu
,
Bill Chu
,
Heather Richter Lipford
,
Tyler Thomas
Mitigating Access Control Vulnerabilities through Interactive Static Analysis.
SACMAT
(2015)
Justin Smith
,
Brittany Johnson
,
Emerson R. Murphy-Hill
,
Bill Chu
,
Heather Richter Lipford
Questions developers ask while diagnosing potential security vulnerabilities with static analysis.
ESEC/SIGSOFT FSE
(2015)
Mahmoud Mohammadi
,
Bill Chu
,
Heather Richter Lipford
POSTER: Using Unit Testing to Detect Sanitization Flaws.
CCS
(2015)
Tyler Thomas
,
Bill Chu
,
Heather Richter Lipford
,
Justin Smith
,
Emerson R. Murphy-Hill
A study of interactive code annotation for access control vulnerabilities.
VL/HCC
(2015)
Heather Richter Lipford
,
Tyler Thomas
,
Bill Chu
,
Emerson R. Murphy-Hill
Interactive Code Annotation for Security Vulnerability Detection.
SIW@CCS
(2014)
Joe Portner
,
Joel Kerr
,
Bill Chu
Moving Target Defense Against Cross-Site Scripting Attacks (Position Paper).
FPS
(2014)
Emerson R. Murphy-Hill
,
Heather Richter Lipford
,
Bill Chu
,
Robert Biddle
SIW 2014: First Workshop on Security Information Workers.
CCS
(2014)
Jun Zhu
,
Heather Richter Lipford
,
Bill Chu
Interactive support for secure programming education.
SIGCSE
(2013)
Jing Xie
,
Bill Chu
,
Heather Richter Lipford
Idea: Interactive Support for Secure Software Development.
ESSoS
(2011)
Abdrah Abuzaid
,
Xiaohong Yuan
,
Huiming Yu
,
Bill Chu
The Design and Implementation of a Cryptographic Education Tool.
CSEDU (1)
(2011)
Jing Xie
,
Heather Richter Lipford
,
Bill Chu
Why do programmers make security errors?
VL/HCC
(2011)
Tom Terry Jr.
,
Huiming Yu
,
Kenneth Williams
,
Xiaohong Yuan
,
Bill Chu
A Visualization based Simulator for SYN Flood Attacks.
IMAGAPP/IVAPP
(2011)
Jing Xie
,
Bill Chu
,
Heather Richter Lipford
,
John T. Melton
ASIDE: IDE support for web application security.
ACSAC
(2011)
Huiming Yu
,
Bill Chu
,
Xiaohong Yuan
,
Janelle C. Mason
,
Monica Barnette
Using a Practice Oriented Approach to Teach Web Security Course.
FECS
(2009)
Napoleon Paxton
,
Gail-Joon Ahn
,
Bill Chu
Towards Practical Framework for Collecting and Analyzing Network-Centric Attacks.
IRI
(2007)
Huiming Yu
,
Xiaohong Yuan
,
Jinsheng Xu
,
Stephen Providence
,
Bill Chu
,
Dechang Gu
Bridge Information Assurance Education Gap between the Majority and Minority Universities through Collaboration.
ACIS-ICIS
(2007)
Gail-Joon Ahn
,
Longhua Zhang
,
Dongwan Shin
,
Bill Chu
Authorization management for role-based collaboration.
SMC
(2003)
Bill Chu
,
Junsheng Long
,
Michael Matthews
,
J. G. Barnes
,
J. Sims
,
Mark Hamilton
,
Russ Lambert
FAIME: An Object-Oriented Methodology for Application Plug-and-Play.
J. Object Oriented Program.
11 (5) (1998)