Binary stirring: Self-randomizing instruction addresses of legacy x86 binary code R Wartell, V Mohan, KW Hamlen, Z Lin Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 480 | 2012 |
Transparent ROP Exploit Mitigation Using Indirect Branch Tracing. V Pappas, M Polychronakis, AD Keromytis USENIX Security Symposium, 447-462, 2013 | 443 | 2013 |
Security issues for cloud computing K Hamlen, M Kantarcioglu, L Khan, B Thuraisingham International Journal of Information Security and Privacy (IJISP) 4 (2), 36-48, 2010 | 344 | 2010 |
Computability classes for enforcement mechanisms KW Hamlen, G Morrisett, FB Schneider ACM Transactions on Programming Languages and Systems (TOPLAS) 28 (1), 175-205, 2006 | 299 | 2006 |
Opaque Control-Flow Integrity. V Mohan, P Larsen, S Brunthaler, KW Hamlen, M Franz NDSS 26, 27-30, 2015 | 223 | 2015 |
Facing the reality of data stream classification: coping with scarcity of labeled data MM Masud, C Woolam, J Gao, L Khan, J Han, KW Hamlen, NC Oza Knowledge and information systems 33, 213-244, 2012 | 157 | 2012 |
Decentralized IoT data management using blockchain and trusted execution environment G Ayoade, V Karande, L Khan, K Hamlen 2018 IEEE International Conference on Information Reuse and Integration (IRI …, 2018 | 155 | 2018 |
Flow-based identification of botnet traffic by mining multiple log files MM Masud, T Al-Khateeb, L Khan, B Thuraisingham, KW Hamlen 2008 first international conference on distributed framework and …, 2008 | 149 | 2008 |
From patches to honey-patches: Lightweight attacker misdirection, deception, and disinformation F Araujo, KW Hamlen, S Biedermann, S Katzenbeisser Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014 | 129 | 2014 |
Differentiating code from data in x86 binaries R Wartell, Y Zhou, KW Hamlen, M Kantarcioglu, B Thuraisingham Machine Learning and Knowledge Discovery in Databases: European Conference …, 2011 | 119 | 2011 |
Superset Disassembly: Statically Rewriting x86 Binaries Without Heuristics. E Bauman, Z Lin, KW Hamlen NDSS, 2018 | 114 | 2018 |
Certified in-lined reference monitoring on. net KW Hamlen, G Morrisett, FB Schneider Proceedings of the 2006 workshop on Programming languages and analysis for …, 2006 | 114 | 2006 |
Securing untrusted code via compiler-agnostic binary rewriting R Wartell, V Mohan, KW Hamlen, Z Lin Proceedings of the 28th Annual Computer Security Applications Conference …, 2012 | 109 | 2012 |
Aspect-oriented in-lined reference monitors KW Hamlen, M Jones Proceedings of the third ACM SIGPLAN workshop on Programming languages and …, 2008 | 93 | 2008 |
Hatman: Intra-cloud trust management for Hadoop SM Khan, KW Hamlen 2012 IEEE Fifth International Conference on Cloud Computing, 494-501, 2012 | 92 | 2012 |
On the Trusted Use of Large-Scale Personal Data. YA de Montjoye, SS Wang, A Pentland, DTT Anh, A Datta IEEE Data Eng. Bull. 35 (4), 5-8, 2012 | 84 | 2012 |
Insider threat detection using stream mining and graph mining P Parveen, J Evans, B Thuraisingham, KW Hamlen, L Khan 2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011 | 83 | 2011 |
Cloud-based malware detection for evolving data streams MM Masud, TM Al-Khateeb, KW Hamlen, J Gao, L Khan, J Han, ... ACM transactions on management information systems (TMIS) 2 (3), 1-27, 2011 | 76 | 2011 |
Seismic: Secure in-lined script monitors for interrupting cryptojacks W Wang, B Ferrell, X Xu, KW Hamlen, S Hao Computer Security: 23rd European Symposium on Research in Computer Security …, 2018 | 75 | 2018 |
Adaptive encrypted traffic fingerprinting with bi-directional dependence K Al-Naami, S Chandra, A Mustafa, L Khan, Z Lin, K Hamlen, ... Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016 | 68 | 2016 |