Javascript must be enabled to use this form.

UTDallas Research Explorer
 View Profile
    Faculty Profile — Is this you? Login to edit.Last Modified Time: 09:40:46 AM Wed, 3 Dec 2014 
Image of  Kevin W Hamlen
 Contact InformationHelpHelp  
Kevin W Hamlen
Associate Professor-Computer Science
Office MailstopMail Box: EC31, Room No.: ECSS 3.704 
Email Address    Primary Phone Number 972-883-4724    Fax Number (972) 883-2349    URL Faculty Homepage    Media Contact
 Professional Preparation
 Ph.D.Computer ScienceCornell University2006
 MSComputer ScienceCornell University2002
 BSComputer ScienceCarnegie Mellon University1998
 BSMathematical SciencesCarnegie Mellon University1998
Collapse Section Expand Section Research and Expertise
Thesis Research

Security Policy Enforcement by Program-Rewriting

PhD Dissertation
Computer Science Department, Cornell University
Fall 2000 - August 2006
Advisors: Dr. Greg Morrisett, Dr. Fred Schneider, Dr. Shimon Edelman

Proof-Carrying Code for x86 Architectures

Senior Honors Thesis
School of Computer Science, Carnegie Mellon University
Fall 1997 - Spring 1998
Advisor: Dr. Peter Lee
Collapse Section Expand Section Publications
 2 3 4 Next>> 8>>  
  YearPublication  Type
Yangchun Fu, Zhiqiang Lin, and Kevin W. Hamlen. Subverting System Authentication with Context-Aware, Reactive Virtual Machine Introspection. In Proceedings of the 29th Annual Computer Security Applications Conference (ACSAC), pp. 229-238. New Orleans, Louisiana. December 2013.
Safwan Mahmud Khan, Kevin W. Hamlen, and Murat Kantarcioglu. Silver Lining: Enforcing Secure Information Flow at the Cloud Edge. In Proceedings of the 2nd IEEE Conference on Cloud Engineering (IC2E). Boston, Massachusetts. March 2014, forthcoming.
Richard Wartell, Yan Zhou, Kevin W. Hamlen, and Murat Kantacioglu. Shingled Graph Disassembly: Finding the Undecidable Path. In Proceedings of the 18th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD). Tainan, Taiwan. May 2014, forthcoming.
Kevin W. Hamlen and Bhavani M. Thuraisingham. Data Security Services, Solutions and Standards for Outsourcing. Computer Standards & Interfaces, 35(1):1-5. January 2013.
Peer reviewed
Pallabi Parveen, Nathan McDaniel, Zackary Weger, Jonathan Evans, Bhavani Thuraisingham, Kevin Hamlen, and Latifur Khan. Evolving Insider Threat Detection Stream Mining Perspective. International Journal on Artificial Intelligence Tools (IJAIT), 22(5). August 2013.
Peer reviewed
Collapse Section Expand Section Appointments
DurationRankDepartment / SchoolCollege / OfficeUniversity / Company
2012-presentAssociate ProfessorDepartment of Computer Science The University of Texas at Dallas
2006-2012Assistant ProfessorDepartment of Computer Science The University of Texas at Dallas
2002-2002Research Intern  Microsoft Research, Cambridge
2001-2001Technical Consultant  Microsoft Research, Redmond
1998-2006Research and Teaching AssistantDepartment of Computer Science Cornell University
 News Articles
‘Frankenstein’ Programmers Test a Cybersecurity Monster
UT Dallas News Center

To catch a thief, you have to think like one.  UT Dallas computer scientists are trying to stay one step ahead of cyberattackers by creating their own monster.  Their monster, called "Frankenstein", can cloak itself by creating malicious software entirely from the standard programs already found on victim computers.
The work is the invention of computer science doctoral student Vishwath Mohan and his supervisor Dr. Kevin Hamlen.  Just as Mary Shelley's Victor Frankenstein stitched together the body parts of ordinary individuals to create a monster, Mohan and Hamlen's Frankenstein can automatically create viruses by stitching together pieces of benign programs.

"Shelley's story is an example of a horror that can result from science, and similarly, we intend our creation as a warning that we need better detections for these types of intrusions," said Dr. Hamlen, associate professor of computer science at UT Dallas.  Hamlen said Frankenstein could be used to aid government counter terrorism efforts by providing cover for infiltration of terrorist computer networks.  The UT Dallas research is the first published example describing this type of stealth technology.

Hamlen is part of the Cyber Security Research and Education Center in the Erik Jonsson School of Engineering and Computer Science. The research was supported by the National Science Foundation and Air Force Office of Scientific Research.

       Teaching HelpHelp  
 Additional Information
Honors and Awards
  • NYU-Poly CSAW Best Applied Security Paper of the Year award, 2nd place, 2014.
  • Metroplex Technology Business Council Tech Titan Technology Inventor, Finalist (final four), 2013.
  • Outstanding Teaching Award, Erik Jonsson School of Engineering and Computer Science, The University of Texas at Dallas, 2013.
  • Best Student Paper Award, Annual Computer Security Applications Conference (ACSAC), 2012.
  • NYU-Poly AT&T Best Applied Security Paper of the Year award, 2nd place, 2012.
  • Faculty Research Award, Erik Jonsson School of Engineering and Computer Science, The University of Texas at Dallas, 2012.
  • Best Paper Award, IEEE International Conference on Tools with Artificial Intelligence (ICTAI), Special Session on Stream Data Mining, 2011.
  • CAREER Award, National Science Foundation, 2011.
  • Air Force Young Investigator Program Program (Career) Award, 2008.
  • Allen Newell Award for Excellence in Undergraduate Research, CMU, 1998.
  • Phi Kappa Phi Honor Society, Carnegie Mellon University, 1998.
  • Phi Beta Kappa Honor Society, Carnegie Mellon University, 1998.

Professional Memberships
  • Institute of Electrical and Electronics Engineers (IEEE), 2010–present
  • Association of Computing Machinery (ACM), 2008–present

Please verify the information in this request and mention any changes or suggestions in the comments section. Email notifications and confirmations regarding this will be sent to you at fromEmail and the profile owner. If you would like to receive it at a different email address, please change the email address listed on your profile.
© 2015-2016 The University of Texas at Dallas About Explorer | Accessibility | Contact Explorer Team