Kevin W. Hamlen
Kevin W. Hamlen
Louis A. Beecherl, Jr. Distinguished Professor of Computer Science, The University of Texas at
Verified email at - Homepage
Cited by
Cited by
A hierarchical CPU scheduler for multimedia operating systems
P Goyal, X Guo, HM Vin
OSDI 96 (22), 107-121, 1996
Binary stirring: Self-randomizing instruction addresses of legacy x86 binary code
R Wartell, V Mohan, KW Hamlen, Z Lin
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
Security issues for cloud computing
K Hamlen, M Kantarcioglu, L Khan, B Thuraisingham
International Journal of Information Security and Privacy (IJISP) 4 (2), 36-48, 2010
Computability classes for enforcement mechanisms
KW Hamlen, G Morrisett, FB Schneider
ACM Transactions on Programming Languages and Systems (TOPLAS) 28 (1), 175-205, 2006
Opaque Control-Flow Integrity.
V Mohan, P Larsen, S Brunthaler, KW Hamlen, M Franz
NDSS 26, 27-30, 2015
Decentralized IoT data management using blockchain and trusted execution environment
G Ayoade, V Karande, L Khan, K Hamlen
2018 IEEE international conference on information reuse and integration (IRI …, 2018
Facing the reality of data stream classification: coping with scarcity of labeled data
MM Masud, C Woolam, J Gao, L Khan, J Han, KW Hamlen, NC Oza
Knowledge and information systems 33, 213-244, 2012
Flow-based identification of botnet traffic by mining multiple log files
MM Masud, T Al-Khateeb, L Khan, B Thuraisingham, KW Hamlen
2008 first international conference on distributed framework and …, 2008
From patches to honey-patches: Lightweight attacker misdirection, deception, and disinformation
F Araujo, KW Hamlen, S Biedermann, S Katzenbeisser
Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014
Superset Disassembly: Statically Rewriting x86 Binaries Without Heuristics.
E Bauman, Z Lin, KW Hamlen
NDSS, 2018
Differentiating code from data in x86 binaries
R Wartell, Y Zhou, KW Hamlen, M Kantarcioglu, B Thuraisingham
Joint European Conference on Machine Learning and Knowledge Discovery in …, 2011
Certified in-lined reference monitoring on. net
KW Hamlen, G Morrisett, FB Schneider
Proceedings of the 2006 workshop on Programming languages and analysis for …, 2006
Securing untrusted code via compiler-agnostic binary rewriting
R Wartell, V Mohan, KW Hamlen, Z Lin
Proceedings of the 28th Annual Computer Security Applications Conference …, 2012
Adaptive encrypted traffic fingerprinting with bi-directional dependence
K Al-Naami, S Chandra, A Mustafa, L Khan, Z Lin, K Hamlen, ...
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
Aspect-oriented in-lined reference monitors
KW Hamlen, M Jones
Proceedings of the third ACM SIGPLAN workshop on Programming languages and …, 2008
Seismic: Secure in-lined script monitors for interrupting cryptojacks
W Wang, B Ferrell, X Xu, KW Hamlen, S Hao
Computer Security: 23rd European Symposium on Research in Computer Security …, 2018
Hatman: Intra-cloud trust management for Hadoop
SM Khan, KW Hamlen
2012 IEEE Fifth International Conference on Cloud Computing, 494-501, 2012
Insider threat detection using stream mining and graph mining
P Parveen, J Evans, B Thuraisingham, KW Hamlen, L Khan
2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011
On the Trusted Use of Large-Scale Personal Data.
YA de Montjoye, SS Wang, A Pentland, DTT Anh, A Datta
IEEE Data Eng. Bull. 35 (4), 5-8, 2012
AnonymousCloud: A data ownership privacy provider framework in cloud computing
SM Khan, KW Hamlen
2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012
The system can't perform the operation now. Try again later.
Articles 1–20