Kevin Hamlen

Professor - Computer Science
Tags: Security Computer Science

Professional Preparation

Ph.D. - Computer Science
Cornell University - 2006
MS - Computer Science
Cornell University - 2002
BS - Computer Science
Carnegie Mellon University - 1998
BS - Mathematical Sciences
Carnegie Mellon University - 1998

Research Areas

Thesis Research

Security Policy Enforcement by Program-Rewriting

PhD Dissertation
Computer Science Department, Cornell University
Fall 2000 - August 2006
Advisors: Dr. Greg Morrisett, Dr. Fred Schneider, Dr. Shimon Edelman

Proof-Carrying Code for x86 Architectures

Senior Honors Thesis
School of Computer Science, Carnegie Mellon University
Fall 1997 - Spring 1998
Advisor: Dr. Peter Lee

Publications

Richard Wartell, Yan Zhou, Kevin W. Hamlen, Murat Kantarcioglu, and Bhavani Thuraisingham. Differentiating Code from Data in x86 Binaries. In Proceedings of the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD), 3:522-536, September 2011. [BibTeX] [acceptance rate: 20%] 2011 - Publication
Mohammad M. Masud, Tahseen M. Al-Khateeb, Kevin W. Hamlen, Jing Gao, Latifur Khan, Jiawei Han, and Bhavani Thuraisingham. Cloud-based Malware Detection for Evolving Data Streams. ACM Transactions on Management Information Systems (TMIS), 2(3), October 2011. [BibTeX] 2011 - Publication
Bhavani Thuraisingham and Kevin W. Hamlen. Challenges and Future Directions of Software Technology: Secure Software Development, Invited paper. In Proceedings of the 34th IEEE Annual International Computer Security and Applications Conference (COMPSAC), pp. 17-20, July 2010. [BibTeX] 2010 - Publication
Meera Sridhar and Kevin W. Hamlen. Model-Checking In-Lined Reference Monitors. In Proceedings of the 11th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI), pp. 312-327, January 2010. [BibTeX] [acceptance rate: 36.8%] 2010 - Publication
Micah Jones and Kevin W. Hamlen. Disambiguating Aspect-oriented Security Policies. In Proceedings of the 9th International Conference on Aspect-Oriented Software Development (AOSD), pp. 193-204, March 2010. [BibTeX] [acceptance rate: 22%]. 2010 - Publication
Aditi Patwardhan, Kevin W. Hamlen, and Kendra Cooper. Towards Security-aware Program Visualization for Analyzing In-lined Reference Monitors. In Proceedings of the International Workshop on Visual Languages and Computing (VLC), pp. 257-260, October 2010. [BibTeX] [acceptance rate: 36.5%]. 2010 - Publication
Meera Sridhar and Kevin W. Hamlen. ActionScript In-lined Reference Monitoring in Prolog. In Proceedings of the 12th International Symposium on Practical Aspects of Declarative Languages (PADL), pp. 149-151, January 2010. [BibTeX] [acceptance rate: 37.9%]. 2010 - Publication
Kevin W. Hamlen, Murat Kantarcioglu, Latifur Khan, and Bhavani Thuraisingham. Security Issues for Cloud Computing. International Journal of Information Security and Privacy (IJISP), 4(2):39-51, April-June 2010. [BibTeX] [impact factor: 1.094]. 2010 - Publication
Bhavani Thuraisingham and Kevin W. Hamlen. Secure Semantic Sensor Web and Pervasive Computing. In Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC), pp. 5-10, June 2010. [BibTeX] 2010 - Publication
Arindam Khaled, Mohammad Farhan Husain, Latifur Khan, Kevin W. Hamlen, and Bhavani Thuraisingham. A Token-Based Access Control System for RDF Data in the Clouds. In Proceedings of the 2nd IEEE International Conference on Cloud Computing Technology and Science (CloudCom), pp. 104-111, November/December 2010. [BibTeX] [acceptance rate: <25%]. 2010 - Publication

Appointments

Associate Professor
The University of Texas at Dallas [2012–Present]
Assistant Professor
The University of Texas at Dallas [2006–2012]
Research Intern
Microsoft Research, Cambridge [2002–2002]
Technical Consultant
Microsoft Research, Redmond [2001–2001]
Research and Teaching Assistant
Cornell University [1998–2006]

Additional Information

Professional Memberships
  • Institute of Electrical and Electronics Engineers (IEEE), 2010–present
  • Association of Computing Machinery (ACM), 2008–present
Honors and Awards
  • NYU-Poly CSAW Best Applied Security Paper of the Year award, 2nd place, 2014.
  • Metroplex Technology Business Council Tech Titan Technology Inventor, Finalist (final four), 2013.
  • Outstanding Teaching Award, Erik Jonsson School of Engineering and Computer Science, The University of Texas at Dallas, 2013.
  • Best Student Paper Award, Annual Computer Security Applications Conference (ACSAC), 2012.
  • NYU-Poly AT&T Best Applied Security Paper of the Year award, 2nd place, 2012.
  • Faculty Research Award, Erik Jonsson School of Engineering and Computer Science, The University of Texas at Dallas, 2012.
  • Best Paper Award, IEEE International Conference on Tools with Artificial Intelligence (ICTAI), Special Session on Stream Data Mining, 2011.
  • CAREER Award, National Science Foundation, 2011.
  • Air Force Young Investigator Program Program (Career) Award, 2008.
  • Allen Newell Award for Excellence in Undergraduate Research, CMU, 1998.
  • Phi Kappa Phi Honor Society, Carnegie Mellon University, 1998.
  • Phi Beta Kappa Honor Society, Carnegie Mellon University, 1998.

News Articles

Frankenstein Programmers Test a Cybersecurity Monster
To catch a thief, you have to think like one. UT Dallas computer scientists are trying to stay one step ahead of cyberattackers by creating their own monster. Their monster, called "Frankenstein", can cloak itself by creating malicious software entirely from the standard programs already found on victim computers. The work is the invention of computer science doctoral student Vishwath Mohan and his supervisor Dr. Kevin Hamlen. Just as Mary Shelley's Victor Frankenstein stitched together the body parts of ordinary individuals to create a monster, Mohan and Hamlen's Frankenstein can automatically create viruses by stitching together pieces of benign programs. "Shelley's story is an example of a horror that can result from science, and similarly, we intend our creation as a warning that we need better detections for these types of intrusions," said Dr. Hamlen, associate professor of computer science at UT Dallas. Hamlen said Frankenstein could be used to aid government counter terrorism efforts by providing cover for infiltration of terrorist computer networks. The UT Dallas research is the first published example describing this type of stealth technology. Hamlen is part of the Cyber Security Research and Education Center in the Erik Jonsson School of Engineering and Computer Science. The research was supported by the National Science Foundation and Air Force Office of Scientific Research.
Cybersecurity Researchers Roll Out A New Heartbleed Solution
As companies scrambled in recent days to address the latest cybersecurity bug known as Heartbleed, researchers at The University of Texas at Dallas had a solution that fixes the vulnerability, and also detects and entraps hackers who might be using it to steal sensitive data.
The advanced technique — dubbed Red Herring — was created by a team led by Dr. Kevin Hamlen, an associate professor of computer science in the Erik Jonsson School of Computer Science and Engineering. It automates the process of creating decoy servers, making hackers believe they have gained access to confidential, secure information, when in fact their deeds are being monitored, analyzed and traced back to the source.
Cybersecurity Researchers Roll Out A New Heartbleed Solution
As companies scrambled in recent days to address the latest cybersecurity bug known as Heartbleed, researchers at The University of Texas at Dallas had a solution that fixes the vulnerability, and also detects and entraps hackers who might be using it to steal sensitive data.
The advanced technique — dubbed Red Herring — was created by a team led by Dr. Kevin Hamlen, an associate professor of computer science in the Erik Jonsson School of Computer Science and Engineering. It automates the process of creating decoy servers, making hackers believe they have gained access to confidential, secure information, when in fact their deeds are being monitored, analyzed and traced back to the source.
Latest Computer Threat Could Be Worst Yet
The next looming threat to your computer is more insidious than anything experts have seen in the past, says a UT Dallas computer scientist.

Dr. Kevin Hamlen is referring to a form of malicious software, or malware, that he calls “reactively adaptive.” And although the threat is still hypothetical, he and his colleagues caution that unless adequate defenses are developed soon, reactively adaptive malware could one day roam the Internet with impunity, producing potentially disastrous consequences.
Latest Computer Threat Could Be Worst Yet
The next looming threat to your computer is more insidious than anything experts have seen in the past, says a UT Dallas computer scientist.

Dr. Kevin Hamlen is referring to a form of malicious software, or malware, that he calls “reactively adaptive.” And although the threat is still hypothetical, he and his colleagues caution that unless adequate defenses are developed soon, reactively adaptive malware could one day roam the Internet with impunity, producing potentially disastrous consequences.