@ARTICLE{sridhar14scp,
  author = "Meera Sridhar and Richard Wartell and Kevin W. Hamlen",
  title = "Hippocratic Binary Instrumentation: First Do No Harm",
  journal = "Science of Computer Programming (SCP)",
  year = 2014,
  note = "forthcoming",
}
@INPROCEEDINGS{wartell14pakdd,
  author = "Richard Wartell and Yan Zhou and Kevin W. Hamlen and Murat Kantarcioglu",
  title = "Shingled Graph Disassembly: Finding the Undecidable Path",
  booktitle = "Proceedings of the 18th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD)",
  year = 2014,
  month = "May",
  address = "Tainan, Taiwan",
  note = "forthcoming",
}
@INPROCEEDINGS{khan14ic2e,
  author = "Safwan Mahmud Khan and Kevin W. Hamlen and Murat Kantarcioglu",
  title = "Silver Lining: Enforcing Secure Information Flow at the Cloud Edge",
  booktitle = "Proceedings of the 2nd IEEE Conference on Cloud Engineering (IC2E)",
  year = 2014,
  pages = "37--46",
  month = "March",
  address = "Boston, Massachusetts",
}
@PHDTHESIS{khan13thesis,
  author = "Safwan Mahmud Khan",
  title = "Decentralizing Trust: New Security Paradigms for Cloud Computing",
  school = "The University of Texas at Dallas",
  year = 2013,
  address = "Richardson, Texas",
  month = "December",
}
@MASTERSTHESIS{karamchandani13thesis,
  author = "Dhiraj V. Karamchandani",
  title = "Surveying the Landscape of {ActionScript} Security Trends and Threats",
  school = "The University of Texas at Dallas",
  year = 2013,
  address = "Richardson, Texas",
  month = "December",
}
@INPROCEEDINGS{fu13acsac,
  author = "Yangchun Fu and Zhiqiang Lin and Kevin W. Hamlen",
  title = "Subverting System Authentication with Context-Aware, Reactive Virtual Machine Introspection",
  booktitle = "Proceedings of the 29th Annual Computer Security Applications Conference (ACSAC)",
  year = 2013,
  pages = "229--238",
  month = "December",
  address = "New Orleans, Louisiana",
}
@ARTICLE{parveen13ijait,
  author = "Pallabi Parveen and Nathan McDaniel and Zackary Weger and Jonathan Evans and Bhavani Thuraisingham and Kevin Hamlen and Latifur Khan",
  title = "Evolving Insider Threat Detection Stream Mining Perspective",
  journal = "International Journal on Artificial Intelligence Tools (IJAIT)",
  year = 2013,
  volume = 22,
  number = 5,
  pages = "1360013",
  month = "October",
}
@INPROCEEDINGS{wartell13raid,
  author = "Richard Wartell and Yan Zhou and Kevin W. Hamlen and Murat Kantarcioglu",
  title = "Shingled Graph Disassembly: Finding the Undecideable Path",
  booktitle = "Proceedings of the 16th International Symposium on Research in Attacks, Intrusions and Defenses (RAID)",
  year = 2013,
  pages = "460--462",
  month = "October",
  address = "Saint Lucia",
}
@TECHREPORT{wartell13techrep,
  author = "Richard Wartell and Yan Zhou and Kevin W. Hamlen and Murat Kantarcioglu",
  title = "Shingled Graph Disassembly: Finding the Undecideable Path",
  institution = "Computer Science Department, The University of Texas at Dallas",
  year = 2013,
  number = "UTDCS-12-13",
  month = "June",
  address = "Richardson, Texas",
}
@ARTICLE{khan13ijns,
  author = "Safwan M. Khan and Kevin W. Hamlen",
  title = "{Penny}: Secure, Decentralized Data Management",
  journal = "International Journal of Network Security (IJNS)",
  year = 2013,
  volume = 16,
  number = 4,
  pages = "289--303",
  month = "July",
}
@INCOLLECTION{hamlen13cisco,
  author = "Kevin W. Hamlen",
  title = "When Gothic Horror Gives Birth to Malware",
  booktitle = "The 2013 Cisco Annual Security Report",
  year = 2013,
  pages = "46--47",
  publisher = "Cisco Systems",
  month = "January",
}
@INPROCEEDINGS{hamlen13isi,
  author = "Kevin W. Hamlen",
  title = "Stealthy Software: Next-generation Cyber-attacks and Defenses, Invited Paper",
  booktitle = "Proceedings of the 11th IEEE Intelligence and Security Informatics Conference (ISI)",
  year = 2013,
  pages = "109--112",
  month = "June",
  address = "Seattle, Washington",
}
@TECHREPORT{sridhar13hip,
  author = "Meera Sridhar and Richard Wartell and Kevin W. Hamlen",
  title = "Hippocratic Binary Instrumentation: First Do No Harm",
  institution = "Computer Science Department, The University of Texas at Dallas",
  year = 2013,
  number = "UTDCS-03-13",
  address = "Richardson, Texas",
  month = "February",
}
@INPROCEEDINGS{khan13ccgrid,
  author = "Safwan M. Khan and Kevin W. Hamlen",
  title = "Computation Certification as a Service in the Cloud",
  booktitle = "Proceedings of the 13th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid)",
  year = 2013,
  pages = "434--441",
  month = "May",
  address = "Delft, The Netherlands",
}
@ARTICLE{hamlen12deb,
  author = "Kevin W. Hamlen and Lalana Kagal and Murat Kantarcioglu",
  title = "Policy Enforcement Framework for Cloud Data Management",
  journal = "IEEE Data Engineering Bulletin (DEB), Special Issue on Security and Privacy in Cloud Computing",
  year = 2012,
  volume = 35,
  number = 4,
  pages = "39--45",
  editor = "David B. Lomet and Sharad Mehrotra",
  month = "December",
}
@PHDTHESIS{wartell12thesis,
  author = "Richard Wartell",
  title = "Rewriting {x86} Binaries Without Code Producer Cooperation",
  school = "The University of Texas at Dallas",
  year = 2012,
  address = "Richardson, Texas",
  month = "December",
}
@ARTICLE{hamlen13csi,
  author = "Kevin W. Hamlen and Bhavani M. Thuraisingham",
  title = "Data Security Services, Solutions and Standards for Outsourcing",
  journal = "Computer Standards \& Interfaces",
  year = 2013,
  volume = 35,
  number = 1,
  pages = "1--5",
  month = "January",
}
@ARTICLE{mohan12alp,
  author = "Vishwath Mohan and Kevin W. Hamlen",
  title = "{Frankenstein}: A Tale of Horror and Logic Programming",
  journal = "ALP Newsletter Digest",
  year = 2012,
  volume = 25,
  number = 4,
  editor = "Agostino Dovier and Enrico Pontelli",
  month = "December",
}
@ARTICLE{hamlen12iree,
  author = "William Hamlen and Kevin Hamlen",
  title = "An Interactive Computer Model of Two-Country Trade",
  journal = "International Review of Economics Education (IREE)",
  year = 2012,
  volume = 11,
  number = 2,
  pages = "91--101",
  month = "November",
}
@INPROCEEDINGS{wartell12acsac,
  author = "Richard Wartell and Vishwath Mohan and Kevin W. Hamlen and Zhiqiang Lin",
  title = "Securing Untrusted Code via Compiler-Agnostic Binary Rewriting",
  booktitle= "Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC)",
  year = 2012,
  pages = "299--308",
  month = "December",
  address = "Orlando, Florida",
}
@INPROCEEDINGS{wartell12ccs,
  author = "Richard Wartell and Vishwath Mohan and Kevin W. Hamlen and Zhiqiang Lin",
  title = "Binary Stirring: Self-randomizing Instruction Addresses of Legacy {x86} Binary Code",
  booktitle = "Proceedings of the 19th ACM Conference on Computer and Communications Security (CCS)",
  year = 2012,
  pages = "157--168",
  month = "October",
  address = "Raleigh, North Carolina",
}
@INPROCEEDINGS{mohan12woot,
  author = "Vishwath Mohan and Kevin W. Hamlen",
  title = "{Frankenstein}: Stitching Malware from Benign Binaries",
  booktitle = "Proceedings of the 6th USENIX Workshop on Offensive Technologies (WOOT)",
  year = 2012,
  pages = "77--84",
  month = "August",
  address = "Bellevue, Washington",
}
@INPROCEEDINGS{khan12cloud,
  author = "Safwan M. Khan and Kevin W. Hamlen",
  title = "{Hatman}: Intra-cloud Trust Management for {Hadoop}",
  booktitle = "Proceedings of the 5th IEEE International Conference on Cloud Computing (CLOUD)",
  year = 2012,
  pages = "494--501",
  month = "June",
  address = "Honolulu, Hawaii",
}
@INPROCEEDINGS{khan12trustcom,
  author = "Safwan M. Khan and Kevin W. Hamlen",
  title = "{AnonymousCloud}: A Data Ownership Privacy Provider Framework in Cloud Computing",
  booktitle = "Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)",
  year = 2012,
  pages = "170--176",
  month = "June",
  address = "Liverpool, UK",
}
@INPROCEEDINGS{thuraisingham12paisi,
  author = "Bhavani Thuraisingham and Vaibhav Khadilkar and Jyothsna Rachapalli and Tyrone Caden head and Murat Katarcioglu and Kevin Hamlen and Latifur Khan and Farhan Husain",
  title = "Cloud-Centric Assured Information Sharing",
  booktitle = "Proceedings of the 7th Pacific Asia Workshop on Intelligence and Security Informatics (PAISI)",
  year = 2012,
  pages = "1--26",
  editor = "Michael Chau and G. Alan Wang and Wei Thoo Yue and Hsinchun Chen",
  month = "May",
  address = "Kuala Lumpur, Malaysia",
}
@ARTICLE{hamlen12isi,
  author = "Kevin W. Hamlen and William Hamlen",
  title = "An Economic Perspective of Message-dropping Attacks in Peer-to-peer Overlays",
  journal = "Intelligence and Security Informatics (ISI)",
  year = 2012,
  volume = 1,
  number = 6,
  month = "March",
}
@ARTICLE{thuraisingham12ijisp,
  author = "Bhavani Thuraisingham and Balakrishnan Prabhakaran and Latifur Khan and Kevin W. Hamlen",
  title = "A Database Inference Controller for {3D} Motion Capture Databases",
  journal = "International Journal of Information Security and Privacy (IJISP)",
  year = 2012,
  note = "forthcoming",
}
@INPROCEEDINGS{hamlen12tacas,
  author = "Kevin W. Hamlen and Micah M. Jones and Meera Sridhar",
  title = "Aspect-oriented Runtime Monitor Certification",
  booktitle = "Proceedings of the 18th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS)",
  year = 2012,
  pages = "126--140",
  month = "March--April",
  address = "Tallinn, Estonia",
}
@PHDTHESIS{ramanujam11thesis,
  author = "Sunitha Ramanujam",
  title = "Towards an Integrated Semantic Web: Interoperability Between Data Models",
  school = "The University of Texas at Dallas",
  year = 2011,
  address = "Richardson, Texas",
  month = "December",
}
@PHDTHESIS{jones11thesis,
  author = "Micah Jones",
  title = "Declarative Aspect-oriented Security Policies for In-lined Reference Monitors",
  school = "The University of Texas at Dallas",
  year = 2011,
  address = "Richardson, Texas",
  month = "December",
}
@TECHREPORT{thuraisingham11cloudAIS,
  author = "Bhavani Thuraisingham and Vaibhav Khadilkar and Jyothsna Rachapalli and Tyrone Cadenhead and Murat Kantarcioglu and Kevin Hamlen and Latifur Khan and Farhan Husain",
  title = "Towards the Design and Implementation of a Cloud-centric Assured Information Sharing System",
  institution = "Computer Science Department, The University of Texas at Dallas",
  year = 2011,
  number = "UTDCS-27-11",
  address = "Richardson, Texas",
  month = "September",
}
@INPROCEEDINGS{parveen11ictai,
  author = "Pallabi Parveen and Zackary R. Weger and Bhavani Thuraisingham and Kevin W. Hamlen and Latifur Khan",
  title = "Supervised Learning for Insider Threat Detection Using Stream Mining",
  booktitle = "Proceedings of the 23rd IEEE International Conference on Tools with Artificial Intelligence (ICTAI)",
  year = 2011,
  pages = "1032--1039",
  month = "November",
  address = "Boca Raton, Florida",
}
@INPROCEEDINGS{parveen11passat,
  author = "Pallabi Parveen and Jonathan Evans and Bhavani Thuraisingham and Kevin W. Hamlen and Latifur Khan",
  title = "Insider Threat Detection using Stream Mining and Graph Mining",
  booktitle = "Proceedings of the 3rd IEEE Conference on Privacy, Security, Risk and Trust (PASSAT)",
  year = 2011,
  pages = "1102--1110",
  month = "October",
  address = "Boston, Massachusetts",
}
@ARTICLE{hamlen11ijsc,
  author = "Kevin W. Hamlen and Bhavani Thuraisingham",
  title = "Secure Semantic Computing",
  journal = "International Journal of Semantic Computing",
  year = 2011,
  volume = 5,
  number = 2,
  pages = "121--131",
  month = "June",
}
@ARTICLE{masud11tmis,
  author = "Mohammad M. Masud and Tahseen M. Al-Khateeb and Kevin W. Hamlen and Jing Gao and Latifur Khan and Jiawei Han and Bhavani Thuraisingham",
  title = "Cloud-based Malware Detection for Evolving Data Streams",
  journal = "ACM Transactions on Management Information Systems (TMIS)",
  year = 2011,
  volume = 2,
  number = 3,
  month = "October",
}
@ARTICLE{masud11kais,
  author = "Mohammad Mehedy Masud and Clay Woolam and Jing Gao and Latifur Khan and Jiawei Han and Kevin W. Hamlen and Nikunj C. Oza",
  title = "Facing the Reality of Data Stream Classification: Coping with Scarcity of Labeled Data",
  journal = "Knowledge and Information Systems (KAIS)",
  year = 2011,
  pages = "1--32",
  month = "November",
}
@INPROCEEDINGS{wartell11pkdd,
  author = "Richard Wartell and Yan Zhou and Kevin W. Hamlen and Murat Kantarcioglu and Bhavani Thuraisingham",
  title = "Differentiating Code from Data in x86 Binaries",
  booktitle = "Proceedings of the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD)",
  year = 2011,
  volume = 3,
  pages = "522--536",
  editor = "Dimitrios Gunopulos and Thomas Hofmann and Donato Malerba and Michalis Vazirgiannis",
  month = "September",
  address = "Athens, Greece",
}
@INPROCEEDINGS{jones11mobiwis,
  author = "Micah Jones and Kevin W. Hamlen",
  title = "A Service-oriented Approach to Mobile Code Security",
  booktitle = "Proceedings of the 8th International Conference on Mobile Web Information Systems (MobiWIS)",
  year = 2011,
  pages = "531--538",
  editor = "Elhadi Shakshuki and Muhammad Younas",
  month = "September",
  address = "Niagara Falls, Ontario",
}
@TECHREPORT{hamlen11chekov,
  author = "Kevin W. Hamlen and Micah M. Jones and Meera Sridhar",
  title = "{Chekov}: Aspect-oriented Runtime Monitor Certification via Model-checking",
  institution = "Computer Science Department, The University of Texas at Dallas",
  year = 2011,
  number = "UTDCS-16-11",
  address = "Richardson, Texas",
  month = "May",
}
@INPROCEEDINGS{sridhar11plpv,
  author = "Meera Sridhar and Kevin W. Hamlen",
  title = "Flexible In-lined Reference Monitor Certification: Challenges and Future Directions",
  booktitle = "Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages meets Program Verification (PLPV)",
  year = 2011,
  pages = "55--60",
  editor = "Ranjit Jhala and Wouter Swierstra",
  month = "January",
  address = "Austin, Texas",
}
@INPROCEEDINGS{khaled10cloudcom,
  author = "Arindam Khaled and Mohammad Farhan Husain and Latifur Khan and Kevin W. Hamlen and Bhavani Thuraisingham",
  title = "A Token-based Access Control System for {RDF} Data in the Clouds",
  booktitle = "Proceedings of the 2nd IEEE International Conference on Cloud Computing Technology and Science (CloudCom)",
  year = 2010,
  pages = "104--111",
  month = "November/December",
  address = "Indianapolis, Indiana",
}
@INPROCEEDINGS{patwardhan10vlc,
  author = "Aditi Patwardhan and Kevin W. Hamlen and Kendra Cooper",
  title = "Towards Security-aware Program Visualization for Analyzing In-lined Reference Monitors",
  booktitle = "Proceedings of the International Workshop on Visual Languages and Computing (VLC)",
  year = 2010,
  pages = "257--260",
  month = "October",
  address = "Oak Brook, Illinois",
}
@ARTICLE{hamlen10ijisp,
  author = "Kevin W. Hamlen and Murat Kantarcioglu and Latifur Khan and Bhavani Thuraisingham",
  title = "Security Issues for Cloud Computing",
  journal = "International Journal of Information Security and Privacy (IJISP)",
  year = 2010,
  volume = 4,
  number = 2,
  pages = "36--48",
  month = "April--June",
}
@INPROCEEDINGS{thuraisingham10compsac,
  author = "Bhavani Thuraisingham and Kevin W. Hamlen",
  title = "Challenges and Future Directions of Software Technology: Secure Software Development, Invited Paper",
  booktitle = "Proceedings of the 34th IEEE Annual International Computer Security and Applications Conference (COMPSAC)",
  year = 2010,
  pages = "17--20",
  editor = "Seikh Iqbal Ahamed and Doo-Hwan Bae and Sung Deok Cha and Carl K. Chang and Rajesh Subramanyan and Eric Wong and Hen-I Yang",
  month = "July",
  address = "Seoul, Korea",
}
@MASTERSTHESIS{patwardhan10thesis,
  author = "Aditi A. Patwardhan",
  title = "Security-aware Program Visualization for Analyzing In-lined Reference Monitors",
  school = "The University of Texas at Dallas",
  year = 2010,
  address = "Richardson, Texas",
  month = "June",
}
@INPROCEEDINGS{thuraisingham10sutc,
  author = "Bhavani Thuraisingham and Kevin W. Hamlen",
  title = "Secure Semantic Sensor Web and Pervasive Computing",
  booktitle = "Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC)",
  year = 2010,
  pages = "5--10",
  month = "June",
  address = "Newport Beach, California",
}
@TECHREPORT{hamlen10reins,
  author = "Kevin W. Hamlen and Vishwath Mohan and Richard Wartell",
  title = "Reining in {Windows} {API} Abuses with In-lined Reference Monitors",
  institution = "Computer Science Department, The University of Texas at Dallas",
  year = 2010,
  number = "UTDCS-18-10",
  address = "Richardson, Texas",
  month = "June",
}
@INPROCEEDINGS{jones10aosd,
  author = "Micah Jones and Kevin W. Hamlen",
  title = "Disambiguating Aspect-oriented Security Policies",
  booktitle = "Proceedings of the 9th International Conference on Aspect-Oriented Software Development (AOSD)",
  year = 2010,
  pages = "193--204",
  editor = "Jean-Marc J{\'e}z{\'e}quel and Mario S{\"u}dholt",
  month = "March",
  address = "Rennes, France",
}
@INPROCEEDINGS{sridhar10padl,
  author = "Meera Sridhar and Kevin W. Hamlen",
  title = "{ActionScript} In-lined Reference Monitoring in {Prolog}",
  booktitle = "Proceedings of the 12th International Symposium on Practical Aspects of Declarative Languages (PADL)",
  year = 2010,
  pages = "149--151",
  editor = "Manuel Carro and Ricardo Pe{\~n}a",
  month = "January",
  address = "Madrid, Spain",
}
@INPROCEEDINGS{sridhar10vmcai,
  author = "Meera Sridhar and Kevin W. Hamlen",
  title = "Model-checking In-lined Reference Monitors",
  booktitle = "Proceedings of the 11th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI)",
  year = 2010,
  pages = "312--327",
  editor = "Gilles Barthe and Manuel V. Hermenegildo",
  month = "January",
  address = "Madrid, Spain",
}
@INPROCEEDINGS{devries09plas,
  author = "Brian W. DeVries and Gopal Gupta and Kevin W. Hamlen and Scott Moore and Meera Sridhar",
  title = "{ActionScript} Bytecode Verification With Co-Logic Programming",
  booktitle = "Proceedings of the 4th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS)",
  year = 2009,
  pages = "9--15",
  editor = "Stephen Chong and David A. Naumann",
  month = "June",
  address = "Dublin, Ireland",
}
@INPROCEEDINGS{jones09isi,
  author = "Micah Jones and Kevin W. Hamlen",
  title = "Enforcing {IRM} Security Policies: Two Case Studies",
  booktitle = "Proceedings of the 7th IEEE Intelligence and Security Informatics Conference (ISI)",
  year = 2009,
  pages = "214--216",
  month = "June",
  address = "Dallas, Texas",
}
@ARTICLE{hamlen09csi,
  author = "Kevin W. Hamlen and Vishwath Mohan and Mohammad M. Masud and Latifur Khan and Bhavani Thuraisingham",
  title = "Exploiting an Antivirus Interface",
  journal = "Computer Standards \& Interfaces",
  year = 2009,
  volume = 31,
  number = 6,
  pages = "1182--1189",
  month = "April",
}
@INPROCEEDINGS{thuraisingham08euc,
  author = "Bhavani Thuraisingham and Latifur Khan and Mohammed M. Masud and Kevin W. Hamlen",
  title = "Data Mining for Security Applications",
  booktitle = "Proceedings of the 6th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC)",
  year = 2008,
  pages = "585--589",
  editor = "Cheng-Zhong Xu and Minyi Guo",
  month = "December",
  address = "Shanghai, China",
}
@INPROCEEDINGS{masud08dfma,
  author = "Mohammed M. Masud and Tahseen Al-khateeb and Latifur Khan and Bhavani Thuraisingham and Kevin W. Hamlen",
  title = "Flow-based Identification of Botnet Traffic by Mining Multipe Log Files",
  booktitle = "Proceedings of the International Conference on Distributed Framework \& Applications (DFmA)",
  year = 2008,
  pages = "200--206",
  month = "October",
  address = "Penang, Malaysia",
}
@INPROCEEDINGS{hamlen08plas,
  author = "Kevin W. Hamlen and Micah Jones",
  title = "Aspect-Oriented In-lined Reference Monitors",
  booktitle = "Proceedings of the 3rd ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS)",
  year = 2008,
  pages = "11--20",
  editor = "{\'U}lfar Erlingsson and Marco Pistoia",
  month = "June",
  address = "Tucson, Arizona",
}
@INPROCEEDINGS{hamlen07trustcol,
  author = "Kevin W. Hamlen and Bhavani Thuraisingham",
  title = "Secure Peer-to-peer Networks for Trusted Collaboration, Invited Paper",
  booktitle = "Proceedings of the 3rd IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (COLCOM)",
  year = 2007,
  pages = "58--63",
  month = "November",
  address = "White Plains, New York",
}
@INPROCEEDINGS{tsybulnik07acsac,
  author = "Nathalie Tsybulnik and Kevin W. Hamlen and Bhavani Thuraisingham",
  title = "Centralized Security Labels in Decentralized P2P Networks",
  booktitle = "Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC)",
  year = 2007,
  pages = "315--324",
  month = "December",
  address = "Miami Beach, Florida",
}
@ARTICLE{hamlen06cheer,
  author = "William Hamlen and Kevin W. Hamlen",
  title = "A Closed System of Production Possibility and Social Welfare",
  journal = "Computers in Higher Education Economics Review (CHEER)",
  year = 2006,
  volume = 18,
  number = 1,
  pages = "15--18",
  month = "December",
}
@PHDTHESIS{hamlen06thesis,
  author = "Kevin W. Hamlen",
  title = "Security Policy Enforcement by Automated Program-rewriting",
  school = "Cornell University",
  address = "Ithaca, New York",
  month = "August",
  year = 2006,
}
@INPROCEEDINGS{hamlen06plas,
  author = "Kevin W. Hamlen and Greg Morrisett and Fred B. Schneider",
  title = "Certified In-lined Reference Monitoring on {.NET}",
  booktitle = "Proceedings of the 1st ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS)",
  year = 2006,
  pages = "7--16",
  editor = "Vugranam C. Sreedhar and Steve Zdancewic",
  month = "June",
  address = "Ottawa, Ontario",
}
@ARTICLE{hamlen06toplas,
  author = "Kevin W. Hamlen and Greg Morrisett and Fred B. Schneider",
  title = "Computability Classes for Enforcement Mechanisms",
  journal = "ACM Transactions on Programming Languages and Systems (TOPLAS)",
  year = 2006,
  volume = 28,
  number = 1,
  pages = "175--205",
  month = "January",
}
@MISC{hamlen98thesis,
  author = "Kevin W. Hamlen",
  title = "Proof-Carrying Code for x86 Architectures",
  howpublished = "Undergraduate Senior Honors Thesis, Carnegie Mellon University, Pittsburgh, Pennsylvania",
  year = 1998,
  month = "May",
}