Javascript must be enabled to use this form.

UTDallas Research Explorer
 View Profile
    Faculty Profile — Is this you? Login to edit.Last Modified Time: 02:47:14 PM Tue, 2 Mar 2010 
Image of  Kevin W Hamlen
 Contact InformationHelpHelp  
Kevin W Hamlen
Associate Professor-Computer Science
Office MailstopMail Box: EC31, Room No.: ECSS 3.704 
Email Address    Primary Phone Number 972-883-4724    Fax Number (972) 883-2349    URL Faculty Homepage    Media Contact
 Professional Preparation
 Ph.D.Computer ScienceCornell University2006
 MSComputer ScienceCornell University2002
 BSComputer ScienceCarnegie Mellon University1998
 BSMathematical SciencesCarnegie Mellon University1998
Collapse Section Expand Section Research and Expertise
Thesis Research

Security Policy Enforcement by Program-Rewriting

PhD Dissertation
Computer Science Department, Cornell University
Fall 2000 - August 2006
See for project overview and references.
Advisors: Dr. Greg Morrisett, Dr. Fred Schneider, Dr. Shimon Edelman

Proof-Carrying Code for x86 Architectures

Senior Honors Thesis
School of Computer Science, Carnegie Mellon University
Fall 1997 - Spring 1998
See for project overview and references.
Advisor: Dr. Peter Lee, Associate Professor of Computer Science at CMU
Also advised by Dr. George Necula, now Assistant Professor at Berkeley.
Collapse Section Expand Section Publications
 2 3 4 Next>> 8>>  
  YearPublication  Type
Yangchun Fu, Zhiqiang Lin, and Kevin W. Hamlen. Subverting System Authentication with Context-Aware, Reactive Virtual Machine Introspection. In Proceedings of the 29th Annual Computer Security Applications Conference (ACSAC), pp. 229-238. New Orleans, Louisiana. December 2013.
Richard Wartell, Yan Zhou, Kevin W. Hamlen, and Murat Kantacioglu. Shingled Graph Disassembly: Finding the Undecidable Path. In Proceedings of the 18th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD). Tainan, Taiwan. May 2014, forthcoming.
Safwan Mahmud Khan, Kevin W. Hamlen, and Murat Kantarcioglu. Silver Lining: Enforcing Secure Information Flow at the Cloud Edge. In Proceedings of the 2nd IEEE Conference on Cloud Engineering (IC2E). Boston, Massachusetts. March 2014, forthcoming.
Kevin W. Hamlen and Bhavani M. Thuraisingham. Data Security Services, Solutions and Standards for Outsourcing. Computer Standards & Interfaces, 35(1):1-5. January 2013.
Peer reviewed
Pallabi Parveen, Nathan McDaniel, Zackary Weger, Jonathan Evans, Bhavani Thuraisingham, Kevin Hamlen, and Latifur Khan. Evolving Insider Threat Detection Stream Mining Perspective. International Journal on Artificial Intelligence Tools (IJAIT), 22(5). August 2013.
Peer reviewed
Collapse Section Expand Section Appointments
DurationRankDepartment / SchoolCollege / OfficeUniversity / Company
2012-presentAssociate ProfessorDepartment of Computer Science The University of Texas at Dallas
2006-2012Assistant ProfessorDepartment of Computer Science The University of Texas at Dallas
2005-2006Research AssistantDepartment of Computer Science Cornell University
2004-2004Teaching AssistantDepartment of Computer Science Cornell University
2002-2002Research Intern Microsoft ResearchCambridge
1999-2003Research AssistantDepartment of Computer Science Cornell University
1999-2000Teaching AssistantDepartment of Computer Science Cornell University
 News Articles
‘Frankenstein’ Programmers Test a Cybersecurity Monster
UT Dallas News Center

UT Dallas computer scientists are trying to stay one step ahead of cyberattackers by creating their own monster. Their monster can cloak itself as it steals and reconfigures information in a computer program.Frankenstein is not a computer virus, which is a program that can multiply and take over other machines. But, it could be used in cyberwarfare to provide cover for a virus or another type of malware, or malicious software.
In order to avoid antivirus software, malware typically mutates every time it copies itself onto another machine. Antivirus software figures out the pattern of change and continues to scan for sequences of code that are known to be suspicious.Frankenstein evades this scanning mechanism. It takes code from programs already on a computer and repurposes it, stringing it together to accomplish the malware’s malicious task with new instructions.
Hamlen said Frankenstein could be used to aid government counter terrorism efforts by providing cover for infiltration of terrorist computer networks. Hamlen is part of the Cyber Security Research and Education Center in the Erik Jonsson School of Engineering and Computer Science. The research was supported by the National Science Foundation and Air Force Office of Scientific Research.

       Teaching HelpHelp  
 Additional Information
Honors and Awards
  • Air Force Young Investigator (Career) Award, U. Texas at Dallas, 2008-2010.
  • Intel Foundation PhD Fellowship Award, Cornell University, 2004-2005.
  • Lockheed Martin PhD Fellowship Award, Cornell University, 1998-1999.
  • Allen Newell Award for Excellence in Undergraduate Research, CMU, 1998.
  • SCS College Honors, Carnegie Mellon University, 1998.
  • University Honors (QPA: 3.98), Carnegie Mellon University, 1998.
  • Andrew Carnegie Merit Scholarship, Carnegie Mellon University, 1994-1998
  • Dean's List, Carnegie Mellon University, 1994-1998.

Professional Memberships
  • Institute of Electrical and Electronics Engineers (IEEE), 2010–present
  • Association of Computing Machinery (ACM), 2008–present

Please verify the information in this request and mention any changes or suggestions in the comments section. Email notifications and confirmations regarding this will be sent to you at fromEmail and the profile owner. If you would like to receive it at a different email address, please change the email address listed on your profile.
© 2014-2015 The University of Texas at Dallas About Explorer | Accessibility | Contact Explorer Team