Kevin W. Hamlen
According to our database1, Kevin W. Hamlen authored at least 76 papers between 2006 and 2020.
Legend:Book In proceedings Article PhD thesis Other
Exploiting the Trust Between Boundaries: Discovering Memory Corruptions in Printers via Driver-Assisted Testing.
Proceedings of the 21st ACM SIGPLAN/SIGBED International Conference on Languages, 2020
Automating Cyberdeception Evaluation with Deep Learning.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020
CONFIRM: Evaluating Compatibility and Relevance of Control-flow Integrity Protections for Modern Software.
Proceedings of the 28th USENIX Security Symposium, 2019
Better Late Than Never: An n-Variant Framework of Verification for Java Source Code on CPU x GPU Hybrid Platform.
Proceedings of the 28th International Symposium on High-Performance Parallel and Distributed Computing, 2019
CUDA au Coq: A Framework for Machine-validating GPU Assembly Programs.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2019
Binary Control-Flow Trimming.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Smart Contract Defense through Bytecode Rewriting.
Proceedings of the IEEE International Conference on Blockchain, 2019
Improving intrusion detectors by crook-sourcing.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
Autonomous Cyber Deception - Reasoning, Adaptive Planning, and Evaluation of HoneyThings
Springer, ISBN: 978-3-030-02110-8, 2019
Inscription: Thwarting ActionScript Web Attacks From Within.
Proceedings of the 17th IEEE International Conference On Trust, 2018
HoneyV: A virtualized honeynet system based on network softwarization.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018
Superset Disassembly: Statically Rewriting x86 Binaries Without Heuristics.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Decentralized IoT Data Management Using BlockChain and Trusted Execution Environment.
Proceedings of the 2018 IEEE International Conference on Information Reuse and Integration, 2018
SEISMIC: SEcure In-lined Script Monitors for Interrupting Cryptojacks.
Proceedings of the Computer Security, 2018
Automated Threat Report Classification over Multi-Source Data.
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018
BCD: Decomposing Binary Code Into Components Using Graph-Based Clustering.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
VisualVital: An observation model for multiple sections of scenes.
Proceedings of the 2017 IEEE SmartWorld, 2017
Efficient Multistream Classification Using Direct Density Ratio Estimation.
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017
FUSION: An Online Method for Multistream Classification.
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017
Object Flow Integrity.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017
Unsupervised deep embedding for novel class detection over data stream.
Proceedings of the 2017 IEEE International Conference on Big Data, BigData 2017, 2017
Searching for software diversity: attaining artificial diversity through program synthesis.
Proceedings of the 2016 New Security Paradigms Workshop, 2016
A Data Driven Approach for the Science of Cyber Security: Challenges and Directions.
Proceedings of the 17th IEEE International Conference on Information Reuse and Integration, 2016
Adaptive encrypted traffic fingerprinting with bi-directional dependence.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
Proceedings of the Cyber Deception, Building the Scientific Foundation, 2016
IEEE Trans. Dependable Secur. Comput., 2015
Compiler-instrumented, Dynamic Secret-Redaction of Legacy Processes for Attacker Deception.
Proceedings of the 24th USENIX Security Symposium, 2015
Opaque Control-Flow Integrity.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Hippocratic binary instrumentation: First do no harm.
Sci. Comput. Program., 2014
Penny: Secure, Decentralized Data Management.
I. J. Network Security, 2014
Shingled Graph Disassembly: Finding the Undecideable Path.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2014
Silver Lining: Enforcing Secure Information Flow at the Cloud Edge.
Proceedings of the 2014 IEEE International Conference on Cloud Engineering, 2014
From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Vigiles: Fine-Grained Access Control for MapReduce Systems.
Proceedings of the 2014 IEEE International Congress on Big Data, Anchorage, AK, USA, June 27, 2014
Evolving Insider Threat Detection Stream Mining Perspective.
Int. J. Artif. Intell. Tools, 2013
Data security services, solutions and standards for outsourcing.
Comput. Stand. Interfaces, 2013
Measuring expertise and bias in cyber security using cognitive and neuroscience approaches.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013
Stealthy software: Next-generation cyber-attacks and defenses.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013
Computation Certification as a Service in the Cloud.
Proceedings of the 13th IEEE/ACM International Symposium on Cluster, 2013
Subverting system authentication with context-aware, reactive virtual machine introspection.
Proceedings of the Annual Computer Security Applications Conference, 2013
An economic perspective of message-dropping attacks in peer-to-peer overlays.
Security Informatics, 2012
Design and Implementation of a Data Mining System for Malware Detection.
J. Integr. Des. Process. Sci., 2012
Policy Enforcement Framework for Cloud Data Management.
IEEE Data Eng. Bull., 2012
Frankenstein: Stitching Malware from Benign Binaries.
Proceedings of the 6th USENIX Workshop on Offensive Technologies, 2012
AnonymousCloud: A Data Ownership Privacy Provider Framework in Cloud Computing.
Proceedings of the 11th IEEE International Conference on Trust, 2012
Aspect-Oriented Runtime Monitor Certification.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2012
Cloud-Centric Assured Information Sharing.
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2012
Binary stirring: self-randomizing instruction addresses of legacy x86 binary code.
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Securing untrusted code via compiler-agnostic binary rewriting.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012
Hatman: Intra-cloud Trust Management for Hadoop.
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012
Cloud-based malware detection for evolving data streams.
ACM Trans. Management Inf. Syst., 2011
A Service-oriented Approach to Mobile Code Security.
Proceedings of the 2nd International Conference on Ambient Systems, 2011
Facing the reality of data stream classification: coping with scarcity of labeled data.
Knowl. Inf. Syst., 2011
Secure Semantic Computing.
Int. J. Semantic Comput., 2011
Insider Threat Detection Using Stream Mining and Graph Mining.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
Flexible in-lined reference monitor certification: challenges and future directions.
Proceedings of the 5th ACM Workshop Programming Languages meets Program Verification, 2011
Differentiating Code from Data in x86 Binaries.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2011
Supervised Learning for Insider Threat Detection Using Stream Mining.
Proceedings of the IEEE 23rd International Conference on Tools with Artificial Intelligence, 2011
Identity management for cloud computing: developments and directions.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011
Security Issues for Cloud Computing.
Model-Checking In-Lined Reference Monitors.
Proceedings of the Verification, 2010
Secure Semantic Sensor Web and Pervasive Computing.
Proceedings of the IEEE International Conference on Sensor Networks, 2010
ActionScript In-Lined Reference Monitoring in Prolog.
Proceedings of the Practical Aspects of Declarative Languages, 2010
Towards Security-aware Program Visualization for Analyzing In-lined Reference Monitors.
Proceedings of the 16th International Conference on Distributed Multimedia Systems, 2010
Challenges and Future Directions of Software Technology: Secure Software Development.
Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010
A Token-Based Access Control System for RDF Data in the Clouds.
Proceedings of the Cloud Computing, Second International Conference, 2010
Disambiguating aspect-oriented security policies.
Proceedings of the 9th International Conference on Aspect-Oriented Software Development, 2010
Exploiting an antivirus interface.
Comput. Stand. Interfaces, 2009
ActionScript bytecode verification with co-logic programming.
Proceedings of the 2009 Workshop on Programming Languages and Analysis for Security, 2009
Enforcing IRM security policies: Two case studies.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009
Aspect-oriented in-lined reference monitors.
Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security, 2008
Data Mining for Security Applications.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008
Secure peer-to-peer networks for trusted collaboration.
Proceedings of the 3rd International Conference on Collaborative Computing: Networking, 2007
Centralized Security Labels in Decentralized P2P Networks.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007
Computability classes for enforcement mechanisms.
ACM Trans. Program. Lang. Syst., 2006
Certified In-lined Reference Monitoring on .NET.
Proceedings of the 2006 Workshop on Programming Languages and Analysis for Security, 2006