Kevin Hamlen

Kevin Hamlen

Professor - Computer Science
 
972-883-4724
ECS3704
Faculty Homepage
Tags: Security Computer Science

Professional Preparation

Ph.D. - Computer Science
Cornell University - 2006
MS - Computer Science
Cornell University - 2002
BS - Computer Science
Carnegie Mellon University - 1998
BS - Mathematical Sciences
Carnegie Mellon University - 1998

Research Areas

Thesis Research

Security Policy Enforcement by Program-Rewriting

PhD Dissertation
Computer Science Department, Cornell University
Fall 2000 - August 2006
Advisors: Dr. Greg Morrisett, Dr. Fred Schneider, Dr. Shimon Edelman

Proof-Carrying Code for x86 Architectures

Senior Honors Thesis
School of Computer Science, Carnegie Mellon University
Fall 1997 - Spring 1998
Advisor: Dr. Peter Lee

Publications

Richard Wartell, Yan Zhou, Kevin W. Hamlen, and Murat Kantacioglu. Shingled Graph Disassembly: Finding the Undecidable Path. In Proceedings of the 18th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD). Tainan, Taiwan. May 2014, forthcoming. forthcoming - Publication
Safwan Mahmud Khan, Kevin W. Hamlen, and Murat Kantarcioglu. Silver Lining: Enforcing Secure Information Flow at the Cloud Edge. In Proceedings of the 2nd IEEE Conference on Cloud Engineering (IC2E). Boston, Massachusetts. March 2014, forthcoming. forthcoming - Publication
Yangchun Fu, Zhiqiang Lin, and Kevin W. Hamlen. Subverting System Authentication with Context-Aware, Reactive Virtual Machine Introspection. In Proceedings of the 29th Annual Computer Security Applications Conference (ACSAC), pp. 229-238. New Orleans, Louisiana. December 2013. forthcoming - Publication
Pallabi Parveen, Nathan McDaniel, Zackary Weger, Jonathan Evans, Bhavani Thuraisingham, Kevin Hamlen, and Latifur Khan. Evolving Insider Threat Detection Stream Mining Perspective. International Journal on Artificial Intelligence Tools (IJAIT), 22(5). August 2013. 2013 - Publication
Kevin W. Hamlen and Bhavani M. Thuraisingham. Data Security Services, Solutions and Standards for Outsourcing. Computer Standards & Interfaces, 35(1):1-5. January 2013. 2013 - Publication
Richard Wartell, Yan Zhou, Kevin W. Hamlen, and Murat Kantarcioglu. Shingled Graph Disassembly: Finding the Undecidable Path. Tech. rep. (UTDCS-12-13). Richardson, Texas: Computer Science Department, The University of Texas at Dallas, June 2013. 2013 - Publication
Bhavani Thuraisingham, Vaibhav Khadilkar, Jyothsna Rachapalli, Tyrone Cadenhead, Murat Kantarcioglu, Kevin Hamlen, Latifur Khan, and Farhan Husain. Cloud-Centric Assured Information Sharing, Invited paper. In Proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics (PAISI), pp. 1-26, May 2012. [BibTeX] 2012 - Publication
Vishwath Mohan and Kevin W. Hamlen. Frankenstein: Stitching Malware from Benign Binaries. In Proceedings of the 6th USENIX Workshop on Offensive Technologies (WOOT), August 2012, conditionally accepted. [BibTeX] [acceptance rate: 40%] 2012 - Publication

Appointments

Associate Professor
The University of Texas at Dallas [2012–Present]
Assistant Professor
The University of Texas at Dallas [2006–2012]
Research Intern
Microsoft Research, Cambridge [2002–2002]
Technical Consultant
Microsoft Research, Redmond [2001–2001]
Research and Teaching Assistant
Cornell University [1998–2006]

Additional Information

Honors and Awards
  • NYU-Poly CSAW Best Applied Security Paper of the Year award, 2nd place, 2014.
  • Metroplex Technology Business Council Tech Titan Technology Inventor, Finalist (final four), 2013.
  • Outstanding Teaching Award, Erik Jonsson School of Engineering and Computer Science, The University of Texas at Dallas, 2013.
  • Best Student Paper Award, Annual Computer Security Applications Conference (ACSAC), 2012.
  • NYU-Poly AT&T Best Applied Security Paper of the Year award, 2nd place, 2012.
  • Faculty Research Award, Erik Jonsson School of Engineering and Computer Science, The University of Texas at Dallas, 2012.
  • Best Paper Award, IEEE International Conference on Tools with Artificial Intelligence (ICTAI), Special Session on Stream Data Mining, 2011.
  • CAREER Award, National Science Foundation, 2011.
  • Air Force Young Investigator Program Program (Career) Award, 2008.
  • Allen Newell Award for Excellence in Undergraduate Research, CMU, 1998.
  • Phi Kappa Phi Honor Society, Carnegie Mellon University, 1998.
  • Phi Beta Kappa Honor Society, Carnegie Mellon University, 1998.
Professional Memberships
  • Institute of Electrical and Electronics Engineers (IEEE), 2010–present
  • Association of Computing Machinery (ACM), 2008–present

News Articles

Frankenstein Programmers Test a Cybersecurity Monster
Frankenstein Programmers Test a Cybersecurity Monster To catch a thief, you have to think like one. UT Dallas computer scientists are trying to stay one step ahead of cyberattackers by creating their own monster. Their monster, called "Frankenstein", can cloak itself by creating malicious software entirely from the standard programs already found on victim computers. The work is the invention of computer science doctoral student Vishwath Mohan and his supervisor Dr. Kevin Hamlen. Just as Mary Shelley's Victor Frankenstein stitched together the body parts of ordinary individuals to create a monster, Mohan and Hamlen's Frankenstein can automatically create viruses by stitching together pieces of benign programs. "Shelley's story is an example of a horror that can result from science, and similarly, we intend our creation as a warning that we need better detections for these types of intrusions," said Dr. Hamlen, associate professor of computer science at UT Dallas. Hamlen said Frankenstein could be used to aid government counter terrorism efforts by providing cover for infiltration of terrorist computer networks. The UT Dallas research is the first published example describing this type of stealth technology. Hamlen is part of the Cyber Security Research and Education Center in the Erik Jonsson School of Engineering and Computer Science. The research was supported by the National Science Foundation and Air Force Office of Scientific Research.
Cybersecurity Researchers Roll Out A New Heartbleed Solution
As companies scrambled in recent days to address the latest cybersecurity bug known as Heartbleed, researchers at The University of Texas at Dallas had a solution that fixes the vulnerability, and also detects and entraps hackers who might be using it to steal sensitive data.
The advanced technique — dubbed Red Herring — was created by a team led by Dr. Kevin Hamlen, an associate professor of computer science in the Erik Jonsson School of Computer Science and Engineering. It automates the process of creating decoy servers, making hackers believe they have gained access to confidential, secure information, when in fact their deeds are being monitored, analyzed and traced back to the source.
Cybersecurity Researchers Roll Out A New Heartbleed Solution
As companies scrambled in recent days to address the latest cybersecurity bug known as Heartbleed, researchers at The University of Texas at Dallas had a solution that fixes the vulnerability, and also detects and entraps hackers who might be using it to steal sensitive data.
The advanced technique — dubbed Red Herring — was created by a team led by Dr. Kevin Hamlen, an associate professor of computer science in the Erik Jonsson School of Computer Science and Engineering. It automates the process of creating decoy servers, making hackers believe they have gained access to confidential, secure information, when in fact their deeds are being monitored, analyzed and traced back to the source.
Latest Computer Threat Could Be Worst Yet
The next looming threat to your computer is more insidious than anything experts have seen in the past, says a UT Dallas computer scientist.

Dr. Kevin Hamlen is referring to a form of malicious software, or malware, that he calls “reactively adaptive.” And although the threat is still hypothetical, he and his colleagues caution that unless adequate defenses are developed soon, reactively adaptive malware could one day roam the Internet with impunity, producing potentially disastrous consequences.
Latest Computer Threat Could Be Worst Yet
The next looming threat to your computer is more insidious than anything experts have seen in the past, says a UT Dallas computer scientist.

Dr. Kevin Hamlen is referring to a form of malicious software, or malware, that he calls “reactively adaptive.” And although the threat is still hypothetical, he and his colleagues caution that unless adequate defenses are developed soon, reactively adaptive malware could one day roam the Internet with impunity, producing potentially disastrous consequences.