The Professional Preparation section lists academic qualifications such as degrees and diplomas. Each record stores the degree, major, institution and year. The records can also be hidden from public view by checking the hide checkbox. Please click here for available slides.
The Research and Expertise section describes the areas in which you have expertise or are involved in research. Research Explorer's search engine indexes data in this field for keyword searches. Please click here for available slides.
PhD Dissertation Computer Science Department, Cornell University Fall 2000 - August 2006 Advisors: Dr. Greg Morrisett, Dr. Fred Schneider, Dr. Shimon Edelman
Proof-Carrying Code for x86 Architectures
Senior Honors Thesis School of Computer Science, Carnegie Mellon University Fall 1997 - Spring 1998 Advisor: Dr. Peter Lee
The Publications section lists any and all publications worked on. Research Explorer's search engine indexes data in this field for keyword searches. The category field is a user defined field where any number of categories can be created by the user to categorize publications. For example, publications can be categorized by the Journal that they appear in. Please click here for available slides.
Yangchun Fu, Zhiqiang Lin, and Kevin W. Hamlen. Subverting System Authentication with Context-Aware, Reactive Virtual Machine Introspection. In Proceedings of the 29th Annual Computer Security Applications Conference (ACSAC), pp. 229-238. New Orleans, Louisiana. December 2013.
Richard Wartell, Yan Zhou, Kevin W. Hamlen, and Murat Kantacioglu. Shingled Graph Disassembly: Finding the Undecidable Path. In Proceedings of the 18th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD). Tainan, Taiwan. May 2014, forthcoming.
Safwan Mahmud Khan, Kevin W. Hamlen, and Murat Kantarcioglu. Silver Lining: Enforcing Secure Information Flow at the Cloud Edge. In Proceedings of the 2nd IEEE Conference on Cloud Engineering (IC2E). Boston, Massachusetts. March 2014, forthcoming.
Kevin W. Hamlen and Bhavani M. Thuraisingham. Data Security Services, Solutions and Standards for Outsourcing. Computer Standards & Interfaces, 35(1):1-5. January 2013.
Pallabi Parveen, Nathan McDaniel, Zackary Weger, Jonathan Evans, Bhavani Thuraisingham, Kevin Hamlen, and Latifur Khan. Evolving Insider Threat Detection Stream Mining Perspective. International Journal on Artificial Intelligence Tools (IJAIT), 22(5). August 2013.
The Appointments section lists work experience including previous appointments. Research Explorer's search engine indexes data in this field for keyword searches. Please click here for available slides.
To catch a thief, you have to think like one. UT Dallas computer scientists are trying to stay one step ahead of cyberattackers by creating their own monster. Their monster, called "Frankenstein", can cloak itself by creating malicious software entirely from the standard programs already found on victim computers.
The work is the invention of computer science doctoral student Vishwath Mohan and his supervisor Dr. Kevin Hamlen. Just as Mary Shelley's Victor Frankenstein stitched together the body parts of ordinary individuals to create a monster, Mohan and Hamlen's Frankenstein can automatically create viruses by stitching together pieces of benign programs.
"Shelley's story is an example of a horror that can result from science, and similarly, we intend our creation as a warning that we need better detections for these types of intrusions," said Dr. Hamlen, associate professor of computer science at UT Dallas. Hamlen said Frankenstein could be used to aid government counter terrorism efforts by providing cover for infiltration of terrorist computer networks. The UT Dallas research is the first published example describing this type of stealth technology.
Hamlen is part of the Cyber Security Research and Education Center in the Erik Jonsson School of Engineering and Computer Science. The research was supported by the National Science Foundation and Air Force Office of Scientific Research.
The Additional Information section describes any other topics you wish to display on your profile that is not in another section. Research Explorer's search engine indexes data in this field for keyword searches. Please click here for available slides.
Institute of Electrical and Electronics Engineers (IEEE), 2010–present
Association of Computing Machinery (ACM), 2008–present
Please verify the information in this request and mention any changes or suggestions in the comments section. Email notifications and confirmations regarding this will be sent to you at fromEmail and the profile owner. If you would like to receive it at a different email address, please change the email address listed on your profile.