The Professional Preparation section lists academic qualifications such as degrees and diplomas. Each record stores the degree, major, institution and year. The records can also be hidden from public view by checking the hide checkbox. Please click here for available slides.
The Research and Expertise section describes the areas in which you have expertise or are involved in research. Research Explorer's search engine indexes data in this field for keyword searches. Please click here for available slides.
PhD Dissertation Computer Science Department, Cornell University Fall 2000 - August 2006 See http://www.utdallas.edu/~hamlen/research.html for project overview and references. Advisors: Dr. Greg Morrisett, Dr. Fred Schneider, Dr. Shimon Edelman
Proof-Carrying Code for x86 Architectures
Senior Honors Thesis School of Computer Science, Carnegie Mellon University Fall 1997 - Spring 1998 See http://www.cs.berkeley.edu/~necula/pcc.html for project overview and references. Advisor: Dr. Peter Lee, Associate Professor of Computer Science at CMU Also advised by Dr. George Necula, now Assistant Professor at Berkeley.
The Publications section lists any and all publications worked on. Research Explorer's search engine indexes data in this field for keyword searches. The category field is a user defined field where any number of categories can be created by the user to categorize publications. For example, publications can be categorized by the Journal that they appear in. Please click here for available slides.
Yangchun Fu, Zhiqiang Lin, and Kevin W. Hamlen. Subverting System Authentication with Context-Aware, Reactive Virtual Machine Introspection. In Proceedings of the 29th Annual Computer Security Applications Conference (ACSAC), pp. 229-238. New Orleans, Louisiana. December 2013.
Richard Wartell, Yan Zhou, Kevin W. Hamlen, and Murat Kantacioglu. Shingled Graph Disassembly: Finding the Undecidable Path. In Proceedings of the 18th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD). Tainan, Taiwan. May 2014, forthcoming.
Safwan Mahmud Khan, Kevin W. Hamlen, and Murat Kantarcioglu. Silver Lining: Enforcing Secure Information Flow at the Cloud Edge. In Proceedings of the 2nd IEEE Conference on Cloud Engineering (IC2E). Boston, Massachusetts. March 2014, forthcoming.
Kevin W. Hamlen and Bhavani M. Thuraisingham. Data Security Services, Solutions and Standards for Outsourcing. Computer Standards & Interfaces, 35(1):1-5. January 2013.
Pallabi Parveen, Nathan McDaniel, Zackary Weger, Jonathan Evans, Bhavani Thuraisingham, Kevin Hamlen, and Latifur Khan. Evolving Insider Threat Detection Stream Mining Perspective. International Journal on Artificial Intelligence Tools (IJAIT), 22(5). August 2013.
The Appointments section lists work experience including previous appointments. Research Explorer's search engine indexes data in this field for keyword searches. Please click here for available slides.
UT Dallas computer scientists are trying to stay one step ahead of cyberattackers by creating their own monster. Their monster can cloak itself as it steals and reconfigures information in a computer program.Frankenstein is not a computer virus, which is a program that can multiply and take over other machines. But, it could be used in cyberwarfare to provide cover for a virus or another type of malware, or malicious software.
In order to avoid antivirus software, malware typically mutates every time it copies itself onto another machine. Antivirus software figures out the pattern of change and continues to scan for sequences of code that are known to be suspicious.Frankenstein evades this scanning mechanism. It takes code from programs already on a computer and repurposes it, stringing it together to accomplish the malware’s malicious task with new instructions.
Hamlen said Frankenstein could be used to aid government counter terrorism efforts by providing cover for infiltration of terrorist computer networks. Hamlen is part of the Cyber Security Research and Education Center in the Erik Jonsson School of Engineering and Computer Science. The research was supported by the National Science Foundation and Air Force Office of Scientific Research.
The Additional Information section describes any other topics you wish to display on your profile that is not in another section. Research Explorer's search engine indexes data in this field for keyword searches. Please click here for available slides.
Institute of Electrical and Electronics Engineers (IEEE), 2010–present
Association of Computing Machinery (ACM), 2008–present
Please verify the information in this request and mention any changes or suggestions in the comments section. Email notifications and confirmations regarding this will be sent to you at fromEmail and the profile owner. If you would like to receive it at a different email address, please change the email address listed on your profile.