Kevin W. Hamlen
Kevin W. Hamlen
Louis A. Beecherl, Jr. Distinguished Professor of Computer Science, The University of Texas at
Verified email at - Homepage
Cited by
Cited by
A hierarchical CPU scheduler for multimedia operating systems
P Goyal, X Guo, HM Vin
OSDI 96 (22), 107-121, 1996
Binary stirring: Self-randomizing instruction addresses of legacy x86 binary code
R Wartell, V Mohan, KW Hamlen, Z Lin
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
Security issues for cloud computing
K Hamlen, M Kantarcioglu, L Khan, B Thuraisingham
International Journal of Information Security and Privacy (IJISP) 4 (2), 36-48, 2010
Computability classes for enforcement mechanisms
KW Hamlen, G Morrisett, FB Schneider
ACM Transactions on Programming Languages and Systems (TOPLAS) 28 (1), 175-205, 2006
Opaque Control-Flow Integrity.
V Mohan, P Larsen, S Brunthaler, KW Hamlen, M Franz
NDSS 26, 27-30, 2015
Decentralized IoT data management using blockchain and trusted execution environment
G Ayoade, V Karande, L Khan, K Hamlen
2018 IEEE international conference on information reuse and integration (IRI …, 2018
Facing the reality of data stream classification: coping with scarcity of labeled data
MM Masud, C Woolam, J Gao, L Khan, J Han, KW Hamlen, NC Oza
Knowledge and information systems 33, 213-244, 2012
Flow-based identification of botnet traffic by mining multiple log files
MM Masud, T Al-Khateeb, L Khan, B Thuraisingham, KW Hamlen
2008 first international conference on distributed framework and …, 2008
From patches to honey-patches: Lightweight attacker misdirection, deception, and disinformation
F Araujo, KW Hamlen, S Biedermann, S Katzenbeisser
Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014
Superset Disassembly: Statically Rewriting x86 Binaries Without Heuristics.
E Bauman, Z Lin, KW Hamlen
NDSS, 2018
Differentiating code from data in x86 binaries
R Wartell, Y Zhou, KW Hamlen, M Kantarcioglu, B Thuraisingham
Joint European Conference on Machine Learning and Knowledge Discovery in …, 2011
Certified in-lined reference monitoring on. net
KW Hamlen, G Morrisett, FB Schneider
Proceedings of the 2006 workshop on Programming languages and analysis for …, 2006
Securing untrusted code via compiler-agnostic binary rewriting
R Wartell, V Mohan, KW Hamlen, Z Lin
Proceedings of the 28th Annual Computer Security Applications Conference …, 2012
Adaptive encrypted traffic fingerprinting with bi-directional dependence
K Al-Naami, S Chandra, A Mustafa, L Khan, Z Lin, K Hamlen, ...
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
Aspect-oriented in-lined reference monitors
KW Hamlen, M Jones
Proceedings of the third ACM SIGPLAN workshop on Programming languages and …, 2008
Hatman: Intra-cloud trust management for Hadoop
SM Khan, KW Hamlen
2012 IEEE Fifth International Conference on Cloud Computing, 494-501, 2012
Seismic: Secure in-lined script monitors for interrupting cryptojacks
W Wang, B Ferrell, X Xu, KW Hamlen, S Hao
Computer Security: 23rd European Symposium on Research in Computer Security …, 2018
Insider threat detection using stream mining and graph mining
P Parveen, J Evans, B Thuraisingham, KW Hamlen, L Khan
2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011
On the Trusted Use of Large-Scale Personal Data.
YA de Montjoye, SS Wang, A Pentland, DTT Anh, A Datta
IEEE Data Eng. Bull. 35 (4), 5-8, 2012
Cloud-based malware detection for evolving data streams
MM Masud, TM Al-Khateeb, KW Hamlen, J Gao, L Khan, J Han, ...
ACM transactions on management information systems (TMIS) 2 (3), 1-27, 2011
The system can't perform the operation now. Try again later.
Articles 1–20