Kevin W. Hamlen

Orcid: 0000-0003-0479-6280

According to our database1, Kevin W. Hamlen authored at least 97 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Ensuring End-to-End IoT Data Security and Privacy Through Cloud-Enhanced Confidential Computing.
Proceedings of the Data and Applications Security and Privacy XXXVIII, 2024

VulPrompt: Prompt-Based Vulnerability Detection Using Few-Shot Graph Learning.
Proceedings of the Data and Applications Security and Privacy XXXVIII, 2024

2023
Con2Mix: A semi-supervised method for imbalanced tabular security data.
J. Comput. Secur., 2023

Renewable Just-In-Time Control-Flow Integrity.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

Cross Domain Vulnerability Detection using Graph Contrastive Learning.
Proceedings of the First Tiny Papers Track at ICLR 2023, 2023

VulMAE: Graph Masked Autoencoders for Vulnerability Detection from Source and Binary Codes.
Proceedings of the Foundations and Practice of Security - 16th International Symposium, 2023

Securing Smart Vehicles Through Federated Learning.
Proceedings of the Foundations and Practice of Security - 16th International Symposium, 2023

SMET: Semantic Mapping of CVE to ATT&CK and Its Application to Cybersecurity.
Proceedings of the Data and Applications Security and Privacy XXXVII, 2023

Confidential Execution of Deep Learning Inference at the Untrusted Edge with ARM TrustZone.
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023

2022
CAPT: Contrastive Pre-Training based Semi-Supervised Open-Set Learning.
Proceedings of the 5th IEEE International Conference on Multimedia Information Processing and Retrieval, 2022

Controllable Fake Document Infilling for Cyber Deception.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2022, 2022

MCoM: A Semi-Supervised Method for Imbalanced Tabular Security Data.
Proceedings of the Data and Applications Security and Privacy XXXVI, 2022

SentMod: Hidden Backdoor Attack on Unstructured Textual Data.
Proceedings of the 8th IEEE Intl Conference on Big Data Security on Cloud, 2022

A Federated Approach for Learning from Electronic Health Records.
Proceedings of the 8th IEEE Intl Conference on Big Data Security on Cloud, 2022

2021
BiMorphing: A Bi-Directional Bursting Defense against Website Fingerprinting Attacks.
IEEE Trans. Dependable Secur. Comput., 2021

Crook-sourced intrusion detection as a service.
J. Inf. Secur. Appl., 2021

A fine-grained classification and security analysis of web-based virtual machine vulnerabilities.
Comput. Secur., 2021

Software Deception Steering through Version Emulation.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

2020
Exploiting the Trust Between Boundaries: Discovering Memory Corruptions in Printers via Driver-Assisted Testing.
Proceedings of the 21st ACM SIGPLAN/SIGBED International Conference on Languages, 2020

Automating Cyberdeception Evaluation with Deep Learning.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

FEAST'20: Fifth Workshop on Forming an Ecosystem Around Software Transformation.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Adaptive Margin Based Deep Adversarial Metric Learning.
Proceedings of the 6th IEEE International Conference on Big Data Security on Cloud, 2020

2019
CONFIRM: Evaluating Compatibility and Relevance of Control-flow Integrity Protections for Modern Software.
Proceedings of the 28th USENIX Security Symposium, 2019

Better Late Than Never: An n-Variant Framework of Verification for Java Source Code on CPU x GPU Hybrid Platform.
Proceedings of the 28th International Symposium on High-Performance Parallel and Distributed Computing, 2019

CUDA au Coq: A Framework for Machine-validating GPU Assembly Programs.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2019

Binary Control-Flow Trimming.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Smart Contract Defense through Bytecode Rewriting.
Proceedings of the IEEE International Conference on Blockchain, 2019

Improving intrusion detectors by crook-sourcing.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

Autonomous Cyber Deception - Reasoning, Adaptive Planning, and Evaluation of HoneyThings
Springer, ISBN: 978-3-030-02110-8, 2019

2018
Inscription: Thwarting ActionScript Web Attacks From Within.
Proceedings of the 17th IEEE International Conference On Trust, 2018

HoneyV: A virtualized honeynet system based on network softwarization.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Superset Disassembly: Statically Rewriting x86 Binaries Without Heuristics.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Decentralized IoT Data Management Using BlockChain and Trusted Execution Environment.
Proceedings of the 2018 IEEE International Conference on Information Reuse and Integration, 2018

SEISMIC: SEcure In-lined Script Monitors for Interrupting Cryptojacks.
Proceedings of the Computer Security, 2018

Automated Threat Report Classification over Multi-Source Data.
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018

BCD: Decomposing Binary Code Into Components Using Graph-Based Clustering.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
VisualVital: An observation model for multiple sections of scenes.
Proceedings of the 2017 IEEE SmartWorld, 2017

Efficient Multistream Classification Using Direct Density Ratio Estimation.
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017

FUSION: An Online Method for Multistream Classification.
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017

Object Flow Integrity.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Unsupervised deep embedding for novel class detection over data stream.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

2016
Searching for software diversity: attaining artificial diversity through program synthesis.
Proceedings of the 2016 New Security Paradigms Workshop, 2016

A Data Driven Approach for the Science of Cyber Security: Challenges and Directions.
Proceedings of the 17th IEEE International Conference on Information Reuse and Integration, 2016

Adaptive encrypted traffic fingerprinting with bi-directional dependence.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

Embedded Honeypotting.
Proceedings of the Cyber Deception, Building the Scientific Foundation, 2016

2015
Between Worlds: Securing Mixed JavaScript/ActionScript Multi-Party Web Content.
IEEE Trans. Dependable Secur. Comput., 2015

Compiler-instrumented, Dynamic Secret-Redaction of Legacy Processes for Attacker Deception.
Proceedings of the 24th USENIX Security Symposium, 2015

Opaque Control-Flow Integrity.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

2014
Hippocratic binary instrumentation: First do no harm.
Sci. Comput. Program., 2014

Penny: Secure, Decentralized Data Management.
Int. J. Netw. Secur., 2014

Shingled Graph Disassembly: Finding the Undecideable Path.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2014

Silver Lining: Enforcing Secure Information Flow at the Cloud Edge.
Proceedings of the 2014 IEEE International Conference on Cloud Engineering, 2014

From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Vigiles: Fine-Grained Access Control for MapReduce Systems.
Proceedings of the 2014 IEEE International Congress on Big Data, Anchorage, AK, USA, June 27, 2014

2013
Evolving Insider Threat Detection Stream Mining Perspective.
Int. J. Artif. Intell. Tools, 2013

Data security services, solutions and standards for outsourcing.
Comput. Stand. Interfaces, 2013

Measuring expertise and bias in cyber security using cognitive and neuroscience approaches.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013

Stealthy software: Next-generation cyber-attacks and defenses.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013

Computation Certification as a Service in the Cloud.
Proceedings of the 13th IEEE/ACM International Symposium on Cluster, 2013

Subverting system authentication with context-aware, reactive virtual machine introspection.
Proceedings of the Annual Computer Security Applications Conference, 2013

2012
An economic perspective of message-dropping attacks in peer-to-peer overlays.
Secur. Informatics, 2012

Design and Implementation of a Data Mining System for Malware Detection.
J. Integr. Des. Process. Sci., 2012

Policy Enforcement Framework for Cloud Data Management.
IEEE Data Eng. Bull., 2012

Frankenstein: Stitching Malware from Benign Binaries.
Proceedings of the 6th USENIX Workshop on Offensive Technologies, 2012

AnonymousCloud: A Data Ownership Privacy Provider Framework in Cloud Computing.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Aspect-Oriented Runtime Monitor Certification.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2012

Cloud-Centric Assured Information Sharing.
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2012

Binary stirring: self-randomizing instruction addresses of legacy x86 binary code.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Securing untrusted code via compiler-agnostic binary rewriting.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

Hatman: Intra-cloud Trust Management for Hadoop.
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012

2011
Cloud-based malware detection for evolving data streams.
ACM Trans. Manag. Inf. Syst., 2011

A Service-oriented Approach to Mobile Code Security.
Proceedings of the 2nd International Conference on Ambient Systems, 2011

Facing the reality of data stream classification: coping with scarcity of labeled data.
Knowl. Inf. Syst., 2011

Secure Semantic Computing.
Int. J. Semantic Comput., 2011

Insider Threat Detection Using Stream Mining and Graph Mining.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Flexible in-lined reference monitor certification: challenges and future directions.
Proceedings of the 5th ACM Workshop Programming Languages meets Program Verification, 2011

Differentiating Code from Data in x86 Binaries.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2011

Supervised Learning for Insider Threat Detection Using Stream Mining.
Proceedings of the IEEE 23rd International Conference on Tools with Artificial Intelligence, 2011

Identity management for cloud computing: developments and directions.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

2010
Security Issues for Cloud Computing.
Int. J. Inf. Secur. Priv., 2010

Model-Checking In-Lined Reference Monitors.
Proceedings of the Verification, 2010

Secure Semantic Sensor Web and Pervasive Computing.
Proceedings of the IEEE International Conference on Sensor Networks, 2010

ActionScript In-Lined Reference Monitoring in Prolog.
Proceedings of the Practical Aspects of Declarative Languages, 2010

Towards Security-aware Program Visualization for Analyzing In-lined Reference Monitors.
Proceedings of the 16th International Conference on Distributed Multimedia Systems, 2010

Challenges and Future Directions of Software Technology: Secure Software Development.
Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

A Token-Based Access Control System for RDF Data in the Clouds.
Proceedings of the Cloud Computing, Second International Conference, 2010

Disambiguating aspect-oriented security policies.
Proceedings of the 9th International Conference on Aspect-Oriented Software Development, 2010

2009
Exploiting an antivirus interface.
Comput. Stand. Interfaces, 2009

ActionScript bytecode verification with co-logic programming.
Proceedings of the 2009 Workshop on Programming Languages and Analysis for Security, 2009

Enforcing IRM security policies: Two case studies.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009

2008
Aspect-oriented in-lined reference monitors.
Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security, 2008

Data Mining for Security Applications.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

2007
Secure peer-to-peer networks for trusted collaboration.
Proceedings of the 3rd International Conference on Collaborative Computing: Networking, 2007

Centralized Security Labels in Decentralized P2P Networks.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2006
Security Policy Enforcement by Automated Program-rewriting.
PhD thesis, 2006

Computability classes for enforcement mechanisms.
ACM Trans. Program. Lang. Syst., 2006

Certified In-lined Reference Monitoring on .NET.
Proceedings of the 2006 Workshop on Programming Languages and Analysis for Security, 2006


  Loading...