Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Kevin W. Hamlen is active.

Publication


Featured researches published by Kevin W. Hamlen.


computer and communications security | 2012

Binary stirring: self-randomizing instruction addresses of legacy x86 binary code

Richard Wartell; Vishwath Mohan; Kevin W. Hamlen; Zhiqiang Lin

Unlike library code, whose instruction addresses can be randomized by address space layout randomization (ASLR), application binary code often has static instruction addresses. Attackers can exploit this limitation to craft robust shell codes for such applications, as demonstrated by a recent attack that reuses instruction gadgets from the static binary code of victim applications. This paper introduces binary stirring, a new technique that imbues x86 native code with the ability to self-randomize its instruction addresses each time it is launched. The input to STIR is only the application binary code without any source code, debug symbols, or relocation information. The output is a new binary whose basic block addresses are dynamically determined at load-time. Therefore, even if an attacker can find code gadgets in one instance of the binary, the instruction addresses in other instances are unpredictable. An array of binary transformation techniques enable STIR to transparently protect large, realistic applications that cannot be perfectly disassembled due to computed jumps, code-data interleaving, OS callbacks, dynamic linking and a variety of other difficult binary features. Evaluation of STIR for both Windows and Linux platforms shows that stirring introduces about 1.6% overhead on average to application runtimes.


ACM Transactions on Programming Languages and Systems | 2006

Computability classes for enforcement mechanisms

Kevin W. Hamlen; J. Gregory Morrisett; Fred B. Schneider

A precise characterization of those security policies enforceable by program rewriting is given. This also exposes and rectifies problems in prior work, yielding a better characterization of those security policies enforceable by execution monitors as well as a taxonomy of enforceable security policies. Some but not all classes can be identified with known classes from computational complexity theory.


International Journal of Information Security and Privacy | 2010

Security Issues for Cloud Computing

Kevin W. Hamlen; Murat Kantarcioglu; Latifur Khan; Bhavani M. Thuraisingham

In this paper, the authors discuss security issues for cloud computing and present a layered framework for secure clouds and then focus on two of the layers, i.e., the storage layer and the data layer. In particular, the authors discuss a scheme for secure third party publications of documents in a cloud. Next, the paper will converse secure federated query processing with map Reduce and Hadoop, and discuss the use of secure co-processors for cloud computing. Finally, the authors discuss XACML implementation for Hadoop and discuss their beliefs that building trusted applications from untrusted components will be a major aspect of secure cloud computing.


acm workshop on programming languages and analysis for security | 2006

Certified In-lined Reference Monitoring on .NET

Kevin W. Hamlen; Greg Morrisett; Fred B. Schneider

MOBILE is an extension of the .NET Common Intermediate Language that supports certified In-Lined Reference Monitoring. Mobile programs have the useful property that if they are well-typed with respect to a declared security policy, then they are guaranteed not to violate that security policy when executed. Thus, when an In-Lined Reference Monitor (IRM) is expressed in Mobile, it can be certified by a simple type-checker to eliminate the need to trust the producer of the IRM.Security policies in Mobile are declarative, can involve unbounded collections of objects allocated at runtime, and can regard infinite-length histories of security events exhibited by those objects. The prototype Mobile implementation enforces properties expressed by finite-state security automata - one automaton for each security-relevant object - and can type-check Mobile programs in the presence of exceptions, finalizers, concurrency, and non-termination. Executing Mobile programs requires no change to existing .NET virtual machine implementations, since Mobile programs consist of normal managed CIL code with extra typing annotations stored in .NET attributes.


acm workshop on programming languages and analysis for security | 2008

Aspect-oriented in-lined reference monitors

Kevin W. Hamlen; Micah Jones

An Aspect-Oriented, declarative, security policy specification language is presented, for enforcement by In-lined Reference Monitors. The semantics of the language establishes a formal connection between Aspect-Oriented Programming and In-lined Reference Monitoring wherein policy specifications denote Aspect-Oriented security automata---security automata whose edge labels are encoded as pointcut expressions. The prototype language implementation enforces these security policies by automatically rewriting Java bytecode programs so as to detect and prevent policy violations at runtime.


Knowledge and Information Systems | 2012

Facing the reality of data stream classification: coping with scarcity of labeled data

Mohammad M. Masud; Clay Woolam; Jing Gao; Latifur Khan; Jiawei Han; Kevin W. Hamlen; Nikunj C. Oza

Recent approaches for classifying data streams are mostly based on supervised learning algorithms, which can only be trained with labeled data. Manual labeling of data is both costly and time consuming. Therefore, in a real streaming environment where large volumes of data appear at a high speed, only a small fraction of the data can be labeled. Thus, only a limited number of instances will be available for training and updating the classification models, leading to poorly trained classifiers. We apply a novel technique to overcome this problem by utilizing both unlabeled and labeled instances to train and update the classification model. Each classification model is built as a collection of micro-clusters using semi-supervised clustering, and an ensemble of these models is used to classify unlabeled data. Empirical evaluation of both synthetic and real data reveals that our approach outperforms state-of-the-art stream classification algorithms that use ten times more labeled data than our approach.


2008 First International Conference on Distributed Framework and Applications | 2008

Flow-based identification of botnet traffic by mining multiple log files

Mohammad M. Masud; Tahseen Al-Khateeb; Latifur Khan; Bhavani M. Thuraisingham; Kevin W. Hamlen

Botnet detection and disruption has been a major research topic in recent years. One effective technique for botnet detection is to identify Command and Control (C&C) traffic, which is sent from a C&C center to infected, hosts (bots) to control the bots. If this traffic can be detected, both the C&C center and the bots it controls can be detected, and the botnet can be disrupted. We propose a multiple log-file based temporal correlation technique for detecting C&C traffic. Our main assumption is that bots respond much faster than humans. By temporally correlating two host-based log files, we are able to detect this property and thereby detect bot activity in a host machine. In our experiments we apply this technique to log files produced by tcpdump and exedump, which record all incoming and outgoing network packets, and the start times of application executions at the host machine, respectively. We apply data mining to extract relevant features from these log files and detect C&C traffic. Our experimental results validate our assumption and show better overall performance when compared to other recently published techniques.


embedded and ubiquitous computing | 2008

Data Mining for Security Applications

Bhavani M. Thuraisingham; Latifur Khan; Mohammad M. Masud; Kevin W. Hamlen

In this paper we discuss various data mining techniques that we have successfully applied for cyber security. These applications include but are not limited to malicious code detection by mining binary executables, network intrusion detection by mining network traffic, anomaly detection, and data stream mining. We summarize our achievements and current works at the University of Texas at Dallas on intrusion detection, and cyber-security research.


annual computer security applications conference | 2012

Securing untrusted code via compiler-agnostic binary rewriting

Richard Wartell; Vishwath Mohan; Kevin W. Hamlen; Zhiqiang Lin

Binary code from untrusted sources remains one of the primary vehicles for malicious software attacks. This paper presents Reins, a new, more general, and lighter-weight binary rewriting and in-lining system to tame and secure untrusted binary programs. Unlike traditional monitors, Reins requires no cooperation from code-producers in the form of source code or debugging symbols, requires no client-side support infrastructure (e.g., a virtual machine or hypervisor), and preserves the behavior of even complex, event-driven, x86 native COTS binaries generated by aggressively optimizing compilers. This makes it exceptionally easy to deploy. The safety of programs rewritten by Reins is independently machine-verifiable, allowing rewriting to be deployed as an untrusted third-party service. An implementation of Reins for Microsoft Windows demonstrates that it is effective and practical for a real-world OS and architecture, introducing only about 2.4% runtime overhead to rewritten binaries.


acm transactions on management information systems | 2011

Cloud-based malware detection for evolving data streams

Mohammad M. Masud; Tahseen Al-Khateeb; Kevin W. Hamlen; Jing Gao; Latifur Khan; Jiawei Han; Bhavani M. Thuraisingham

Data stream classification for intrusion detection poses at least three major challenges. First, these data streams are typically infinite-length, making traditional multipass learning algorithms inapplicable. Second, they exhibit significant concept-drift as attackers react and adapt to defenses. Third, for data streams that do not have any fixed feature set, such as text streams, an additional feature extraction and selection task must be performed. If the number of candidate features is too large, then traditional feature extraction techniques fail. In order to address the first two challenges, this article proposes a multipartition, multichunk ensemble classifier in which a collection of v classifiers is trained from r consecutive data chunks using v-fold partitioning of the data, yielding an ensemble of such classifiers. This multipartition, multichunk ensemble technique significantly reduces classification error compared to existing single-partition, single-chunk ensemble approaches, wherein a single data chunk is used to train each classifier. To address the third challenge, a feature extraction and selection technique is proposed for data streams that do not have any fixed feature set. The techniques scalability is demonstrated through an implementation for the Hadoop MapReduce cloud computing architecture. Both theoretical and empirical evidence demonstrate its effectiveness over other state-of-the-art stream classification techniques on synthetic data, real botnet traffic, and malicious executables.

Collaboration


Dive into the Kevin W. Hamlen's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Latifur Khan

University of Texas System

View shared research outputs
Top Co-Authors

Avatar

Murat Kantarcioglu

University of Texas at Dallas

View shared research outputs
Top Co-Authors

Avatar

Meera Sridhar

University of Texas at Dallas

View shared research outputs
Top Co-Authors

Avatar

Richard Wartell

University of Texas at Dallas

View shared research outputs
Top Co-Authors

Avatar

Vishwath Mohan

University of Texas at Dallas

View shared research outputs
Top Co-Authors

Avatar

Zhiqiang Lin

University of Texas at Dallas

View shared research outputs
Top Co-Authors

Avatar

Micah Jones

University of Texas at Dallas

View shared research outputs
Top Co-Authors

Avatar

Safwan Mahmud Khan

University of Texas at Dallas

View shared research outputs
Top Co-Authors

Avatar

Swarup Chandra

University of Texas at Dallas

View shared research outputs
Researchain Logo
Decentralizing Knowledge