Follow
Kevin W. Hamlen
Kevin W. Hamlen
Louis A. Beecherl, Jr. Distinguished Professor of Computer Science, The University of Texas at
Verified email at utdallas.edu - Homepage
Title
Cited by
Cited by
Year
Binary stirring: Self-randomizing instruction addresses of legacy x86 binary code
R Wartell, V Mohan, KW Hamlen, Z Lin
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
4752012
Transparent ROP Exploit Mitigation Using Indirect Branch Tracing.
V Pappas, M Polychronakis, AD Keromytis
USENIX Security Symposium, 447-462, 2013
4402013
Security issues for cloud computing
K Hamlen, M Kantarcioglu, L Khan, B Thuraisingham
International Journal of Information Security and Privacy (IJISP) 4 (2), 36-48, 2010
3412010
Computability classes for enforcement mechanisms
KW Hamlen, G Morrisett, FB Schneider
ACM Transactions on Programming Languages and Systems (TOPLAS) 28 (1), 175-205, 2006
2982006
Opaque Control-Flow Integrity.
V Mohan, P Larsen, S Brunthaler, KW Hamlen, M Franz
NDSS 26, 27-30, 2015
2202015
Facing the reality of data stream classification: coping with scarcity of labeled data
MM Masud, C Woolam, J Gao, L Khan, J Han, KW Hamlen, NC Oza
Knowledge and information systems 33, 213-244, 2012
1562012
Flow-based identification of botnet traffic by mining multiple log files
MM Masud, T Al-Khateeb, L Khan, B Thuraisingham, KW Hamlen
2008 first international conference on distributed framework and …, 2008
1472008
Decentralized IoT data management using blockchain and trusted execution environment
G Ayoade, V Karande, L Khan, K Hamlen
2018 IEEE International Conference on Information Reuse and Integration (IRI …, 2018
1452018
From patches to honey-patches: Lightweight attacker misdirection, deception, and disinformation
F Araujo, KW Hamlen, S Biedermann, S Katzenbeisser
Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014
1252014
Differentiating code from data in x86 binaries
R Wartell, Y Zhou, KW Hamlen, M Kantarcioglu, B Thuraisingham
Machine Learning and Knowledge Discovery in Databases: European Conference …, 2011
1152011
Superset Disassembly: Statically Rewriting x86 Binaries Without Heuristics.
E Bauman, Z Lin, KW Hamlen
NDSS, 2018
1132018
Certified in-lined reference monitoring on. net
KW Hamlen, G Morrisett, FB Schneider
Proceedings of the 2006 workshop on Programming languages and analysis for …, 2006
1132006
Securing untrusted code via compiler-agnostic binary rewriting
R Wartell, V Mohan, KW Hamlen, Z Lin
Proceedings of the 28th Annual Computer Security Applications Conference …, 2012
1082012
Aspect-oriented in-lined reference monitors
KW Hamlen, M Jones
Proceedings of the third ACM SIGPLAN workshop on Programming languages and …, 2008
932008
Hatman: Intra-cloud trust management for Hadoop
SM Khan, KW Hamlen
2012 IEEE Fifth International Conference on Cloud Computing, 494-501, 2012
912012
On the Trusted Use of Large-Scale Personal Data.
YA de Montjoye, SS Wang, A Pentland, DTT Anh, A Datta
IEEE Data Eng. Bull. 35 (4), 5-8, 2012
842012
Insider threat detection using stream mining and graph mining
P Parveen, J Evans, B Thuraisingham, KW Hamlen, L Khan
2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011
822011
Cloud-based malware detection for evolving data streams
MM Masud, TM Al-Khateeb, KW Hamlen, J Gao, L Khan, J Han, ...
ACM transactions on management information systems (TMIS) 2 (3), 1-27, 2011
762011
Seismic: Secure in-lined script monitors for interrupting cryptojacks
W Wang, B Ferrell, X Xu, KW Hamlen, S Hao
Computer Security: 23rd European Symposium on Research in Computer Security …, 2018
712018
AnonymousCloud: A data ownership privacy provider framework in cloud computing
SM Khan, KW Hamlen
2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012
642012
The system can't perform the operation now. Try again later.
Articles 1–20