Options:
@PHDTHESIS{duan21thesis,
  author = "Jun Duan",
  title = "Securing Computations with GPUs",
  school = "The University of Texas at Dallas",
  year = 2021,
  address = "Richardson, Texas",
  month = "May",
}
@ARTICLE{yilmaz21cas,
  author = "Fadi Yilmaz and Meera Sridhar and Abhinav Mohanty and Vasant Tendulkar and Kevin W. Hamlen",
  title = "A Fine-grained Classification and Security Analysis of Web-based Virtual Machine Vulnerabilities",
  journal = "Computers & Security",
  volume = 105,
  year = 2021,
  month = "June",
}
@ARTICLE{araujo21jisa,
  author = "Frederico Araujo and Gbadebo Ayoade and Khaled Al-Naami and Yang Gao and Kevin W. Hamlen and Latifur Khan",
  title = "Crook-sourced Intrusion Detection as a Service",
  journal = "Journal of. Information Security and Applications (JISA)",
  volume = 61,
  year = 2021,
  month = "September",
}
@ARTICLE{alnaami21tdsc,
  author = "Khaled Al-Naami and Amir El-Ghamry and Md Shihabul Islam and Latifur Khan and Bhavani M. Thuraisingham and Kevin W. Hamlen and Mohammed Alrahmawy",
  title = "{BiMorphing:} A Bi-directional Bursting Defense Against Website Fingerprinting Attacks",
  journal = "IEEE Transactions on. Dependable and Secure Computing (TDSC)",
  volume = 18,
  number = 2,
  year = 2021,
  pages = "505--517",
  month = "March--April",
}
@INPROCEEDINGS{araujo21hicss,
  author = "Frederico Araujo and Sailik Sengupta and Jiyong Jang and Adam Doup{\'e} and Kevin W. Hamlen and Subbarao Kambhampati",
  title = "Software Deception Steering through Version Emulation",
  booktitle = "Proceedings of the. 54th Hawaii International. Conference on. System Sciences (HICSS)",
  year = 2021,
  month = "January",
}
@INPROCEEDINGS{he20lctes,
  author = "Xiaoyu He and Erick Bauman and Feng Li and Lei Yu and Linyu Li and Bingchang Liu and Aihua Piao and Kevin W. Hamlen and Wei Huo and Wei Zou",
  title = "Exploiting the Trust Between Boundaries: Discovering Memory Corruptions in Printers via Driver-assisted Testing",
  booktitle = "Proceedings of the. 21st ACM SIGPLAN/SIGBED International. Conference on. Languages, Compilers, and Tools for Embedded Systems (LCTES)",
  year = 2020,
  month = "June",
  address = "London, UK",
}
@INPROCEEDINGS{wang20bigdatasec,
  author = "Zhuoyi Wang and Yigong Wang and Bo Dong and Sahoo Pracheta and Kevin Hamlen and Latifur Khan"
  title = "Adaptive Margin Based Deep Adversarial Metric Learning",
  booktitle = "Proceedings of the. 6th IEEE International. Conference on. Big Data Security on Cloud (BigDataSecurity)",
  year = 2020,
  month = "May",
  address = "Baltimore, Maryland",
}
@PHDTHESIS{ghaffarinia20thesis,
  author = "Masoud Ghaffarinia",
  title = "Automated Binary Software Attack Surface Reduction",
  school = "The University of Texas at Dallas",
  year = 2020,
  address = "Richardson, Texas",
  month = "May",
}
@PHDTHESIS{xu20thesis,
  author = "Xiaoyang Xu",
  title = "Native Software Security Hardening in the Real World: Compatibility, Modularit, Expressiveness, and Performance",
  school = "The University of Texas at Dallas",
  year = 2020,
  address = "Richardson, Texas",
  month = "May",
}
@INPROCEEDINGS{araujo19acsac,
  author = "Frederico Araujo and Gbadebo Ayoade and Khaled Al-Naami and Yang Gao and Kevin W. Hamlen and Latifur Khan"
  title = "Improving Intrusion Detectors by Crook-sourcing",
  booktitle = "Proceedings of the. 35th Annual Computer Security Applications Conference.",
  year = 2019,
  pages = "245--256",
  month = "December",
  address = "San Juan, Puerto Rico",
}
@INPROCEEDINGS{ayoade20hicss,
  author = "Gbadebo Ayoade and Frederico Araujo and Khaled Al-Naami and Ahmad M. Mustafa and Yang Gao and Kevin W. Hamlen and Latifur Khan",
  title = "Automating Cyberdeception Evaluation with Deep Learning",
  booktitle = "Proceedings of the. 53rd Hawaii International. Conference on. System Sciences (HICSS)",
  year = 2020,
  month = "January",
  address = "Grand Wailea, Maui",
}
@INPROCEEDINGS{hamlen19feast,
  author = "Kevin W. Hamlen and Dakota Fisher and Gilmore R. Lundquist",
  title = "Source-free Machine-checked Validation of Native Code in {Coq}",
  booktitle = "Proceedings of the. 4th Workshop on Forming an Ecosystem Around Software Transformation (FEAST)",
  year = 2019,
  month = "November",
  address = "London, UK",
}
@INPROCEEDINGS{ghaffarinia19ccs,
  author = "Masoud Ghaffarinia and Kevin W. Hamlen",
  title = "Binary Control-flow Trimming",
  booktitle = "Proceedings of the. 26th ACM Conference on. Computer and Communications Security (CCS)",
  year = 2019,
  pages = "1009--1022",
  month = "November",
  address = "London, UK",
}
@INPROCEEDINGS{lundquist19minikanren,
  author = "Gilmore R. Lundquist and Utsav Bhatt and Kevin W. Hamlen",
  title = "Relational Processing for Fun and Diversity: Simulating a {CPU} Relationally with {miniKanren}",
  booktitle = "Proceedings of the. 1st miniKanren and Relational Programming Workshop",
  year = 2019,
  pages = "100--114",
  month = "August",
  address = "Berlin, Germany",
}
@INPROCEEDINGS{xu19usenix,
  author = "Xiaoyang Xu and Masoud Ghaffarinia and Wenhao Wang and Kevin W. Hamlen and Zhiqiang Lin",
  title = "{ConFIRM}: Evaluating Compatibility and Relevance of Control-flow Integrity Protections for Modern Software",
  booktitle = "Proceedings of the. 28th USENIX Security Symposium.",
  year = 2019,
  pages = "1805--1821",
  month = "August",
  address = "Santa Clara, California",
}
@INPROCEEDINGS{ayoade19blockchain,
  author = "Gbadebo Ayoade and Erick Bauman and Latifur Khan and Kevin W. Hamlen",
  title = "Smart Contract Defense Through Bytecode Rewriting",
  booktitle = "Proceedings of the. IEEE International. Conference on. Recent Advances on Blockchain and its Applications (ICBC)",
  year = 2019,
  pages = "384--389",
  month = "July",
  address = "Atlanta, Georgia",
}
@INPROCEEDINGS{duan19hpdc,
  author = "Jun Duan and Kevin W. Hamlen and Benjamin Ferrell",
  title = "Better Late Than Never: An {$n$}-Variant Framework of Verification for {Java} Source Code on {CPU$\times$GPU} Hybrid Platform",
  booktitle = "Proceedings of the. 28th International. Symposium on. High-Performance Parallel and Distributed Computing (HPDC)",
  year = 2019,
  pages = "207--218",
  month = "June",
  address = "Phoenix, Arizona",
}
@PHDTHESIS{ayoade19thesis,
  author = "Gbadebo Gbadero Ayoade",
  title = "Mitigating Cyberattack with Machine Learning-based Feature Space Transforms",
  school = "The University of Texas at Dallas",
  year = 2019,
  address = "Richardson, Texas",
  month = "December",
}
@PHDTHESIS{wang19thesis,
  author = "Wenhao Wang",
  title = "Source-free, Component-driven Software Security Hardening",
  school = "The University of Texas at Dallas",
  year = 2019,
  address = "Richardson, Texas",
  month = "May",
}
@PHDTHESIS{bauman19thesis,
  author = "Erick Bauman",
  title = "Securing Binary Programs Without Perfect Disassembly",
  school = "The University of Texas at Dallas",
  year = 2019,
  address = "Richardson, Texas",
  month = "December",
}
@INPROCEEDINGS{ferrell19date,
  author = "Benjamin Ferrell and Jun Duan and Kevin W. Hamlen",
  title = "{CUDA} au {Coq}: A Framework for Machine-validating {GPU} Assembly Programs",
  booktitle = "Proceedings of the. 26th Design, Automation \& Test in Europe Conference. \& Exhibition (DATE)",
  year = 2019,
  pages = "474--479",
  month = "March",
  address = "Florence, Italy",
}
@INPROCEEDINGS{xu18feast,
  author = "Xiaoyang Xu and Wenhao Wang and Kevin W. Hamlen and Zhiqiang Lin",
  title = "Towards Interface-Driven {COTS} Binary Hardening",
  booktitle = "Proceedings of the. 3rd Workshop on Forming an Ecosystem Around Software Transformation (FEAST)",
  year = 2018,
  month = "October",
  address = "Toronto, Canada",
}
@INPROCEEDINGS{ayoade18cic,
  author = "Gbadebo Ayoade and Swarup Chandra and Latifur Khan and Kevin Hamlen and Bhavani Thuraisingham",
  title = "Automated Threat Report Classification over Multi-source Data",
  booktitle = "Proceedings of the. 4th IEEE International. Conference on. Collaboration and Internet Computing (CIC)",
  year = 2018,
  pages = "236--245",
  month = "October",
  address = "Pittsburgh, Pennsylvania",
}
@INPROCEEDINGS{wang18esorics,
  author = "Wenhao Wang and Benjamin Ferrell and Xiaoyang Xu and Kevin W. Hamlen and Shuang Hao",
  title = "{SEISMIC}: SEcure In-lined Script Monitors for Interrupting Cryptojacks",
  booktitle = "Proceedings of the. 23rd European Symposium on. Research in Computer Security (ESORICS)",
  year = 2018,
  pages = "122--142",
  month = "September",
  address = "Barcelona, Spain",
}
@INPROCEEDINGS{ayoade18iri,
  author = "Gbadebo Ayoade and Vishal Karande and Kevin Hamlen and Latifur Khan",
  title = "Decentralized {IoT} Data Management Using {BlockChain} and Trusted Execution Environment",
  booktitle = "Proceedings of the. 19th IEEE International. Conference on. Information Reuse and Integration for Data Science",
  year = 2018,
  pages = "15--22",
  month = "July",
  address = "Salt Lake City, Utah",
}
@INPROCEEDINGS{sridhar18trustcom,
  author = "Meera Sridhar and Abhinav Mohanty and Fady Yilmaz and Vasant Tendulkar and Kevin W. Hamlen",
  title = "{Inscription}: Thwarting {ActionScript} Web Attacks From Within",
  booktitle = "Proceedings of the. 17th International. Conference on. Trust, Security and Privacy in Computing and Communications (TrustCom)",
  year = 2018,
  pages = "504--515",
  month = "July",
  address = "New York, New York",
}
@INPROCEEDINGS{karande18asiaccs,
  author = "Vishal Karande and Swarup Chandra and Zhiqiang Lin and Juan Caballero and Latifur Khan and Kevin W. Hamlen",
  title = "{BCD}: Decomposing Binary Code into Components Using Graph-based Clustering",
  booktitle = "Proceedings of the. 13th Asia Conference on. Computer and Communications Security (AsiaCCS)",
  year = 2018,
  pages = "393--398",
  month = "June",
  address = "Incheon, S. Korea",
}
@INPROCEEDINGS{rashidi18noms,
  author = "Bahman Rashidi and Carol J. Fung and Kevin W. Hamlen and Andrzej Kamisinski",
  title = "{HoneyV}: A Virtualized Honeynet System Based on Network Softwarization",
  booktitle = "Proceedings of the. 14th IEEE/IFIP Network Operations and Management Symposium. (NOMS)",
  year = 2018,
  month = "April",
  address = "Taipei, Taiwan",
}
@INPROCEEDINGS{bauman18ndss,
  author = "Erick Bauman and Zhiqiang Lin and Kevin W. Hamlen",
  title = "Superset Disassembly: Statically Rewriting {x86} Binaries Without Heuristics",
  booktitle = "Proceedings of the. 25th Network and Distributed Systems Security Symposium. (NDSS)",
  year = 2018,
  month = "February",
  address = "San Diego, California",
}
@ARTICLE{sridhar17jissec,
  author = "Meera Sridhar and Mounica Chirva and Benjamin Ferrell and Dhiraj Karamchandani and Kevin W. Hamlen",
  title = "{Flash} in the Dark: Illuminating the Landscape of {ActionScript} Web Security Trends and Threats",
  journal = "Journal of. Information Systems Security (JISSec)",
  volume = 13,
  number = 2,
  year = 2017,
  pages = "59--96",
  month = "December",
}
@PHDTHESIS{alnaami17thesis,
  author = "Khaled Mohammed Al-Naami",
  title = "Enhancing Cybersecurity with Encrypted Traffic Fingerprinting",
  school = "The University of Texas at Dallas",
  year = 2017,
  address = "Richardson, Texas",
  month = "December",
}
@INPROCEEDINGS{mustafa17bigdata,
  author = "Ahmad M. Mustafa and Gbadebo Ayoade and Khaled Al-Naami and Latifur Khan and Kevin W. Hamlen and Bhavani M. Thuraisingham and Frederico Araujo",
  title = "Unsupervised Deep Embedding for Novel Class Detection over Data Stream",
  booktitle = "Proceedings of the. 5th IEEE International. Conference on. Big Data (BigData)",
  year = 2017,
  pages = "1830--1839",
  month = "December",
  address = "Boston, Massachusetts",
}
@INPROCEEDINGS{wang17ccs,
  author = "Wenhao Wang and Xiaoyang Xu and Kevin W. Hamlen",
  title = "Object Flow Integrity",
  booktitle = "Proceedings of the. 24th ACM Conference on. Computer and Communications Security (CCS)",
  year = 2017,
  pages = "1909--1924",
  month = "November",
  address = "Dallas, Texas",
}
@INPROCEEDINGS{ahsanul17cikm,
  author = "Ahsanul Haque and Zhuoyi Wang and Swarup Chandra and Bo Dong and Latifur Khan and Kevin W. Hamlen",
  title = "{FUSION}: An Online Method for Multistream Classification",
  booktitle = "Proceedings of the. 26th ACM Conference on. Information and Knowledge Management (CIKM)",
  year = 2017,
  pages = "919--928",
  month = "November",
  address = "Singapore",
}
@INPROCEEDINGS{duan17uic,
  author = "Jun Duan and Kang Zhang and Kevin W. Hamlen",
  title = "{VisualVital}: An Observation Model for Multiple Sections of Scenes",
  booktitle = "Proceedings of the. 14th IEEE International. Conference on. Ubiquitous Intelligence and Computing (UIC)",
  year = 2017,
  month = "August",
  address = "San Francisco, California",
}
@INPROCEEDINGS{haque17icde,
  author = "Ahsanul Haque and Swarup Chandra and Latifur Khan and Kevin Hamlen and Charu Aggarwal",
  title = "Efficient Multistream Classification using Direct Density Ratio Estimation",
  booktitle = "Proceedings of the. 33rd IEEE International. Conference on. Data Engineering (ICDE)",
  pages = "155--158",
  year = 2017,
  month = "April",
  address = "San Diego, California",
}
@INPROCEEDINGS{alnaami16acsac,
  author = "Khaled Al-Naami and Swarup Chandra and Ahmad M. Mustafa and Latifur Khan and Zhiqiang Lin and Kevin W. Hamlen and Bhavani M. Thuraisingham",
  title = "Adaptive Encrypted Traffic Fingerprinting with Bi-directional Dependence",
  booktitle = "Proceedings of the. 32nd Annual Conference on. Computer Security Applications (ACSAC)",
  pages = "177--188",
  year = 2016,
  month = "December",
  address = "Los Angeles, California",
}
@INPROCEEDINGS{ghaffarinia16feast,
  author = "Masoud Ghaffarinia and Kevin W. Hamlen",
  title = "Binary Software Complexity Reduction: From Artifact- to Feature-Removal",
  booktitle = "Proceedings of the. 1st Workshop on Forming an Ecosystem Around Software Transformation (FEAST)",
  year = 2016,
  month = "October",
  address = "Vienna, Austria",
}
@INPROCEEDINGS{lundquist16nspw,
  author = "Gilmore R. Lundquist and Vishwath Mohan and Kevin W. Hamlen",
  title = "Searching for Software Diversity: Attaining Artificial Diversity through Program Synthesis",
  booktitle = "Proceedings of the. 24th New Security Paradigms Workshop (NSPW)",
  year = 2016,
  month = "September",
  address = "Colorado, USA",
}
@PHDTHESIS{araujo16thesis,
  author = "Frederico Araujo",
  title = "Engineering Cyber-deceptive Software",
  school = "The University of Texas at Dallas",
  year = 2016,
  address = "Richardson, Texas",
  month = "August",
}
@INPROCEEDINGS{thuraisingham16iri,
  author = "Bhavani Thuraisingham and Murat Kantarcioglu and Kevin Hamlen and Latifur Khan and Tim Finin and Anupam Joshi and Tim Oates and Elisa Bertino",
  title = "A Data Driven Approach for the Science of Cyber Security: Challenges and Directions",
  booktitle = "Proceedings of the. IEEE 17th Conference on. Information Reuse and Integration (IRI)",
  year = 2016,
  month = "July",
  address = "Pittsburgh, Pennsylvania",
}
@INPROCEEDINGS{sridhar16fcs,
  author = "Meera Sridhar and Abhinav Mohanty and Vasant Tendulkar and Fadi Yilmaz and Kevin W. Hamlen",
  title = "In a {Flash}: An In-lined Monitoring Approach to {Flash} App Security",
  booktitle = "the 12th Workshop on Foundations of Computer Security (FCS)",
  year = 2016,
  month = "June",
  address = "Lisbon, Portugal",
}
@INCOLLECTION{araujo19chapter,
  author = "Frederico Araujo and Gbadebo Ayoade and Kevin W. Hamlen and Latifur Khan",
  title = "Deception-Enhanced Threat Sensing for Resilient Intrusion Detection",
  booktitle = "Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of HoneyThings",
  year = 2019,
  editor = "Ehab Al-Shaer and Jinpeng Wei and Kevin W. Hamlen and Cliff Wang",
  pages = "147--165",
  chapter = 8,
  publisher = "Springer",
}
@BOOK{alshaer19springer,
  editor = "Ehab Al-Shaer and Jinpeng Wei and Kevin W. Hamlen and Cliff Wang",
  title = "Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of HoneyThings",
  publisher = "Springer",
  year = 2019,
}
@INCOLLECTION{araujo16chapter,
  author = "Frederico Araujo and Kevin W. Hamlen",
  title = "Embedded Honeypotting",
  booktitle = "Cyber Deception: Building the Scientific Foundation",
  year = 2016,
  editor = "Sushil Jajodia and V.S. Subrahmanian and Vipin Swarup and Cliff Wang",
  pages = "195--225",
  chapter = 10,
  publisher = "Springer",
}
@BOOK{jajodia16springer,
  editor = "Sushil Jajodia and V.S. Subrahamian and Vipin Swarup and Cliff Wang",
  title = "Cyber Deception: Building the Scientific Foundation",
  publisher = "Springer",
  year = 2016,
}
@INPROCEEDINGS{araujo15usesec,
  author = "Frederico Araujo and Kevin W. Hamlen",
  title = "Compiler-instrumented, Dynamic Secret-Redaction of Legacy Processes for Attacker Deception",
  booktitle = "Proceedings of the. 24th USENIX Security Symposium.",
  year = 2015,
  month = "August",
  address = "Washington, D.C.",
}
@INPROCEEDINGS{araujo15cset,
  author = "Frederico Araujo and Mohammad Shapouri and Sonakshi Pandey and Kevin W. Hamlen",
  title = "Experiences with Honey-Patching in Active Cyber Security Education",
  booktitle = "Proceedings of the. 8th Workshop on Cyber Security Experimentation and Test (CSET)",
  year = 2015,
  month = "August",
  address = "USENIX Security Symposium., Washington, D.C.",
}
@INPROCEEDINGS{mohan15ndss,
  author = "Vishwath Mohan and Per Larsen and Stefan Brunthaler and Kevin W. Hamlen and Michael Franz",
  title = "Opaque Control-Flow Integrity",
  booktitle = "Proceedings of the. 22nd Network and Distributed System Security Symposium. (NDSS)",
  year = 2015,
  month = "February",
  address = "San Diego, California",
}
@PHDTHESIS{mohan14thesis,
  author = "Vishwath R. Mohan",
  title = "Source-free Binary Mutation for Offense and Defense",
  school = "The University of Texas at Dallas",
  year = 2014,
  address = "Richardson, Texas",
  month = "December",
}
@ARTICLE{phung15tdsc,
  author = "Phu H. Phung and Maliheh Monshizadeh and Meera Sridhar and Kevin W. Hamlen and V.N. Venkatakrishnan",
  title = "Between Worlds: Securing Mixed {JavaScript}/{ActionScript} Multi-party Web Content",
  journal = "IEEE Transactions on. Dependable and Secure Computing (TDSC)",
  volume = 12,
  number = 4,
  pages = "443--457",
  year = 2015,
  month = "July--August",
}
@INPROCEEDINGS{araujo14ccs,
  author = "Frederico Araujo and Kevin W. Hamlen and Sebastian Biedermann and Stefan Katzenbeisser",
  title = "From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation",
  booktitle = "Proceedings of the. 21st ACM Conference on. Computer and Communications Security (CCS)",
  year = 2014,
  pages = "942--953",
  month = "November",
  address = "Scottsdale, Arizona",
}
  author = "Huseyin Ulusoy and Murat Kantarcioglu and Erman Pattuk and Kevin W. Hamlen",
  title = "{Vigiles}: Fine-grained Access Control for {MapReduce} Systems",
  booktitle = "Proceedings of the. 2nd IEEE International. Congress on Big Data (BigData)",
  year = 2014,
  pages = "40--47",
  month = "June--July",
  address = "Anchorage, Alaska",
}
@PHDTHESIS{sridhar14thesis,
  author = "Meera Sridhar",
  title = "Model-checking In-lined Reference Monitors",
  school = "The University of Texas at Dallas",
  year = 2014,
  address = "Richardson, Texas",
  month = "August",
}
@ARTICLE{sridhar14scp,
  author = "Meera Sridhar and Richard Wartell and Kevin W. Hamlen",
  title = "Hippocratic Binary Instrumentation: First Do No Harm",
  journal = "Science of Computer Programming (SCP), Special Issue on Invariant Generation",
  volume = 93,
  number = "B",
  pages = "110--124",
  year = 2014,
  month = "November",
}
@INPROCEEDINGS{wartell14pakdd,
  author = "Richard Wartell and Yan Zhou and Kevin W. Hamlen and Murat Kantarcioglu",
  title = "Shingled Graph Disassembly: Finding the Undecidable Path",
  booktitle = "Proceedings of the. 18th Pacific-Asia Conference on. Knowledge Discovery and Data Mining (PAKDD)",
  year = 2014,
  pages = "273--285",
  month = "May",
  address = "Tainan, Taiwan",
}
@INPROCEEDINGS{khan14ic2e,
  author = "Safwan Mahmud Khan and Kevin W. Hamlen and Murat Kantarcioglu",
  title = "Silver Lining: Enforcing Secure Information Flow at the Cloud Edge",
  booktitle = "Proceedings of the. 2nd IEEE Conference on. Cloud Engineering (IC2E)",
  year = 2014,
  pages = "37--46",
  month = "March",
  address = "Boston, Massachusetts",
}
@PHDTHESIS{khan13thesis,
  author = "Safwan Mahmud Khan",
  title = "Decentralizing Trust: New Security Paradigms for Cloud Computing",
  school = "The University of Texas at Dallas",
  year = 2013,
  address = "Richardson, Texas",
  month = "December",
}
@MASTERSTHESIS{karamchandani13thesis,
  author = "Dhiraj V. Karamchandani",
  title = "Surveying the Landscape of {ActionScript} Security Trends and Threats",
  school = "The University of Texas at Dallas",
  year = 2013,
  address = "Richardson, Texas",
  month = "December",
}
@INPROCEEDINGS{fu13acsac,
  author = "Yangchun Fu and Zhiqiang Lin and Kevin W. Hamlen",
  title = "Subverting System Authentication with Context-Aware, Reactive Virtual Machine Introspection",
  booktitle = "Proceedings of the. 29th Annual Computer Security Applications Conference. (ACSAC)",
  year = 2013,
  pages = "229--238",
  month = "December",
  address = "New Orleans, Louisiana",
}
@ARTICLE{parveen13ijait,
  author = "Pallabi Parveen and Nathan McDaniel and Zackary Weger and Jonathan Evans and Bhavani Thuraisingham and Kevin Hamlen and Latifur Khan",
  title = "Evolving Insider Threat Detection Stream Mining Perspective",
  journal = "International. Journal on. Artificial Intelligence Tools (IJAIT)",
  year = 2013,
  volume = 22,
  number = 5,
  pages = "1360013",
  month = "October",
}
@INPROCEEDINGS{wartell13raid,
  author = "Richard Wartell and Yan Zhou and Kevin W. Hamlen and Murat Kantarcioglu",
  title = "Shingled Graph Disassembly: Finding the Undecideable Path",
  booktitle = "Proceedings of the. 16th International. Symposium on. Research in Attacks, Intrusions and Defenses (RAID)",
  year = 2013,
  pages = "460--462",
  month = "October",
  address = "Saint Lucia",
}
@TECHREPORT{wartell13techrep,
  author = "Richard Wartell and Yan Zhou and Kevin W. Hamlen and Murat Kantarcioglu",
  title = "Shingled Graph Disassembly: Finding the Undecideable Path",
  institution = "Computer Science Department, The University of Texas at Dallas",
  year = 2013,
  number = "UTDCS-12-13",
  month = "June",
  address = "Richardson, Texas",
}
@ARTICLE{khan13ijns,
  author = "Safwan Mahmud Khan and Kevin W. Hamlen",
  title = "{Penny}: Secure, Decentralized Data Management",
  journal = "International. Journal of. Network Security (IJNS)",
  year = 2014,
  volume = 16,
  number = 5,
  pages = "340--354",
  month = "September",
}
@INCOLLECTION{hamlen13cisco,
  author = "Kevin W. Hamlen",
  title = "When Gothic Horror Gives Birth to Malware",
  booktitle = "The 2013 Cisco Annual Security Report",
  year = 2013,
  pages = "46--47",
  publisher = "Cisco Systems",
  month = "January",
}
@INPROCEEDINGS{hamlen13isi,
  author = "Kevin W. Hamlen",
  title = "Stealthy Software: Next-generation Cyber-attacks and Defenses, Invited Paper",
  booktitle = "Proceedings of the. 11th IEEE Intelligence and Security Informatics Conference. (ISI)",
  year = 2013,
  pages = "109--112",
  month = "June",
  address = "Seattle, Washington",
}
@INPROCEEDINGS{krawczyk13isi,
  author = "Daniel Krawczyk and James Bartlett and Murat Kantarcioglu and Kevin Hamlen and Bhavani Thuraisingham",
  title = "Measuring Expertise and Bias in Cyber Security Using Cognitive and Neuroscience Approaches",
  booktitle = "Proceedings of the. 11th IEEE Intelligence and Security Informatics Conference. (ISI)",
  year = 2013,
  pages = "364--367",
  month = "June",
  address = "Seattle, Washington",
}
@TECHREPORT{sridhar13hip,
  author = "Meera Sridhar and Richard Wartell and Kevin W. Hamlen",
  title = "Hippocratic Binary Instrumentation: First Do No Harm",
  institution = "Computer Science Department, The University of Texas at Dallas",
  year = 2013,
  number = "UTDCS-03-13",
  address = "Richardson, Texas",
  month = "February",
}
@INPROCEEDINGS{khan13ccgrid,
  author = "Safwan M. Khan and Kevin W. Hamlen",
  title = "Computation Certification as a Service in the Cloud",
  booktitle = "Proceedings of the. 13th IEEE/ACM International. Symposium on. Cluster, Cloud and Grid Computing (CCGrid)",
  year = 2013,
  pages = "434--441",
  month = "May",
  address = "Delft, The Netherlands",
}
@ARTICLE{thuraisingham12deb,
  author = "Bhavani Thuraisingham and Tahseen Al-Khatib and Latifur Khan and Mehedy Masud and Kevin Hamlen and Vaibhav Khadilkar and Satyen Abrol",
  title = "Design and Implementation of a Data Mining System for Malware Detection",
  journal = "Journal of. Integrated Design \& Process Science (JIDPS)",
  volume = 16,
  number = 2,
  pages = "33--49",
  year = 2012,
}
@ARTICLE{hamlen12deb,
  author = "Kevin W. Hamlen and Lalana Kagal and Murat Kantarcioglu",
  title = "Policy Enforcement Framework for Cloud Data Management",
  journal = "IEEE Data Engineering Bulletin (DEB), Special Issue on Security and Privacy in Cloud Computing",
  year = 2012,
  volume = 35,
  number = 4,
  pages = "39--45",
  editor = "David B. Lomet and Sharad Mehrotra",
  month = "December",
}
@PHDTHESIS{wartell12thesis,
  author = "Richard Wartell",
  title = "Rewriting {x86} Binaries Without Code Producer Cooperation",
  school = "The University of Texas at Dallas",
  year = 2012,
  address = "Richardson, Texas",
  month = "December",
}
@ARTICLE{hamlen13csi,
  author = "Kevin W. Hamlen and Bhavani M. Thuraisingham",
  title = "Data Security Services, Solutions and Standards for Outsourcing",
  journal = "Computer Standards \& Interfaces",
  year = 2013,
  volume = 35,
  number = 1,
  pages = "1--5",
  month = "January",
}
@ARTICLE{mohan12alp,
  author = "Vishwath Mohan and Kevin W. Hamlen",
  title = "{Frankenstein}: A Tale of Horror and Logic Programming",
  journal = "ALP Newsletter Digest",
  year = 2012,
  volume = 25,
  number = 4,
  editor = "Agostino Dovier and Enrico Pontelli",
  month = "December",
}
@ARTICLE{hamlen12iree,
  author = "William Hamlen and Kevin Hamlen",
  title = "An Interactive Computer Model of Two-Country Trade",
  journal = "International. Review of Economics Education (IREE)",
  year = 2012,
  volume = 11,
  number = 2,
  pages = "91--101",
  month = "November",
}
@INPROCEEDINGS{wartell12acsac,
  author = "Richard Wartell and Vishwath Mohan and Kevin W. Hamlen and Zhiqiang Lin",
  title = "Securing Untrusted Code via Compiler-Agnostic Binary Rewriting",
  booktitle= "Proceedings of the. 28th Annual Computer Security Applications Conference. (ACSAC)",
  year = 2012,
  pages = "299--308",
  month = "December",
  address = "Orlando, Florida",
}
@INPROCEEDINGS{wartell12ccs,
  author = "Richard Wartell and Vishwath Mohan and Kevin W. Hamlen and Zhiqiang Lin",
  title = "Binary Stirring: Self-randomizing Instruction Addresses of Legacy {x86} Binary Code",
  booktitle = "Proceedings of the. 19th ACM Conference on. Computer and Communications Security (CCS)",
  year = 2012,
  pages = "157--168",
  month = "October",
  address = "Raleigh, North Carolina",
}
@INPROCEEDINGS{mohan12woot,
  author = "Vishwath Mohan and Kevin W. Hamlen",
  title = "{Frankenstein}: Stitching Malware from Benign Binaries",
  booktitle = "Proceedings of the. 6th USENIX Workshop on Offensive Technologies (WOOT)",
  year = 2012,
  pages = "77--84",
  month = "August",
  address = "Bellevue, Washington",
}
@INPROCEEDINGS{khan12cloud,
  author = "Safwan M. Khan and Kevin W. Hamlen",
  title = "{Hatman}: Intra-cloud Trust Management for {Hadoop}",
  booktitle = "Proceedings of the. 5th IEEE International. Conference on. Cloud Computing (CLOUD)",
  year = 2012,
  pages = "494--501",
  month = "June",
  address = "Honolulu, Hawaii",
}
@INPROCEEDINGS{khan12trustcom,
  author = "Safwan M. Khan and Kevin W. Hamlen",
  title = "{AnonymousCloud}: A Data Ownership Privacy Provider Framework in Cloud Computing",
  booktitle = "Proceedings of the. 11th IEEE International. Conference on. Trust, Security and Privacy in Computing and Communications (TrustCom)",
  year = 2012,
  pages = "170--176",
  month = "June",
  address = "Liverpool, UK",
}
@INPROCEEDINGS{thuraisingham12paisi,
  author = "Bhavani Thuraisingham and Vaibhav Khadilkar and Jyothsna Rachapalli and Tyrone Caden head and Murat Katarcioglu and Kevin Hamlen and Latifur Khan and Farhan Husain",
  title = "Cloud-Centric Assured Information Sharing",
  booktitle = "Proceedings of the. 7th Pacific Asia Workshop on Intelligence and Security Informatics (PAISI)",
  year = 2012,
  pages = "1--26",
  editor = "Michael Chau and G. Alan Wang and Wei Thoo Yue and Hsinchun Chen",
  month = "May",
  address = "Kuala Lumpur, Malaysia",
}
@ARTICLE{hamlen12isi,
  author = "Kevin W. Hamlen and William Hamlen",
  title = "An Economic Perspective of Message-dropping Attacks in Peer-to-peer Overlays",
  journal = "Security Informatics",
  year = 2012,
  volume = 1,
  number = 6,
  month = "March",
}
@UNPUBLISHED{thuraisingham12,
  author = "Bhavani Thuraisingham and Balakrishnan Prabhakaran and Latifur Khan and Kevin W. Hamlen",
  title = "A Database Inference Controller for {3D} Motion Capture Databases",
  year = 2012,
  note = "unpublished manuscript",
}
@INPROCEEDINGS{hamlen12tacas,
  author = "Kevin W. Hamlen and Micah M. Jones and Meera Sridhar",
  title = "Aspect-oriented Runtime Monitor Certification",
  booktitle = "Proceedings of the. 18th International. Conference on. Tools and Algorithms for the Construction and Analysis of Systems (TACAS)",
  year = 2012,
  pages = "126--140",
  month = "March--April",
  address = "Tallinn, Estonia",
}
@PHDTHESIS{ramanujam11thesis,
  author = "Sunitha Ramanujam",
  title = "Towards an Integrated Semantic Web: Interoperability Between Data Models",
  school = "The University of Texas at Dallas",
  year = 2011,
  address = "Richardson, Texas",
  month = "December",
}
@PHDTHESIS{jones11thesis,
  author = "Micah Jones",
  title = "Declarative Aspect-oriented Security Policies for In-lined Reference Monitors",
  school = "The University of Texas at Dallas",
  year = 2011,
  address = "Richardson, Texas",
  month = "December",
}
@TECHREPORT{thuraisingham11cloudAIS,
  author = "Bhavani Thuraisingham and Vaibhav Khadilkar and Jyothsna Rachapalli and Tyrone Cadenhead and Murat Kantarcioglu and Kevin Hamlen and Latifur Khan and Farhan Husain",
  title = "Towards the Design and Implementation of a Cloud-centric Assured Information Sharing System",
  institution = "Computer Science Department, The University of Texas at Dallas",
  year = 2011,
  number = "UTDCS-27-11",
  address = "Richardson, Texas",
  month = "September",
}
@INPROCEEDINGS{hamlen11csiirw,
  author = "Kevin Hamlen and Peng Liu and Murat Kantarcioglu and Bhavani Thuraisingham and Ting Yu",
  title = "Identity Management for Cloud Computing: Developments and Directions",
  booktitle = "Proceedings of the. 7th Annual Cyber Security and Information Intelligence Research Workshop (CSIIRW)",
  year = 2011,
  month = "October",
  address = "Oak Ridge, Tennessee",
}
@INPROCEEDINGS{parveen11ictai,
  author = "Pallabi Parveen and Zackary R. Weger and Bhavani Thuraisingham and Kevin W. Hamlen and Latifur Khan",
  title = "Supervised Learning for Insider Threat Detection Using Stream Mining",
  booktitle = "Proceedings of the. 23rd IEEE International. Conference on. Tools with Artificial Intelligence (ICTAI)",
  year = 2011,
  pages = "1032--1039",
  month = "November",
  address = "Boca Raton, Florida",
}
@INPROCEEDINGS{parveen11passat,
  author = "Pallabi Parveen and Jonathan Evans and Bhavani Thuraisingham and Kevin W. Hamlen and Latifur Khan",
  title = "Insider Threat Detection using Stream Mining and Graph Mining",
  booktitle = "Proceedings of the. 3rd IEEE Conference on. Privacy, Security, Risk and Trust (PASSAT)",
  year = 2011,
  pages = "1102--1110",
  month = "October",
  address = "Boston, Massachusetts",
}
@ARTICLE{hamlen11ijsc,
  author = "Kevin W. Hamlen and Bhavani Thuraisingham",
  title = "Secure Semantic Computing",
  journal = "International. Journal of. Semantic Computing",
  year = 2011,
  volume = 5,
  number = 2,
  pages = "121--131",
  month = "June",
}
@ARTICLE{masud11tmis,
  author = "Mohammad M. Masud and Tahseen M. Al-Khateeb and Kevin W. Hamlen and Jing Gao and Latifur Khan and Jiawei Han and Bhavani Thuraisingham",
  title = "Cloud-based Malware Detection for Evolving Data Streams",
  journal = "ACM Transactions on. Management Information Systems (TMIS)",
  year = 2011,
  volume = 2,
  number = 3,
  month = "October",
}
@ARTICLE{masud11kais,
  author = "Mohammad Mehedy Masud and Clay Woolam and Jing Gao and Latifur Khan and Jiawei Han and Kevin W. Hamlen and Nikunj C. Oza",
  title = "Facing the Reality of Data Stream Classification: Coping with Scarcity of Labeled Data",
  journal = "Knowledge and Information Systems (KAIS)",
  year = 2011,
  pages = "1--32",
  month = "November",
}
@INPROCEEDINGS{wartell11pkdd,
  author = "Richard Wartell and Yan Zhou and Kevin W. Hamlen and Murat Kantarcioglu and Bhavani Thuraisingham",
  title = "Differentiating Code from Data in x86 Binaries",
  booktitle = "Proceedings of the. European Conference on. Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD)",
  year = 2011,
  volume = 3,
  pages = "522--536",
  editor = "Dimitrios Gunopulos and Thomas Hofmann and Donato Malerba and Michalis Vazirgiannis",
  month = "September",
  address = "Athens, Greece",
}
@INPROCEEDINGS{jones11mobiwis,
  author = "Micah Jones and Kevin W. Hamlen",
  title = "A Service-oriented Approach to Mobile Code Security",
  booktitle = "Proceedings of the. 8th International. Conference on. Mobile Web Information Systems (MobiWIS)",
  year = 2011,
  pages = "531--538",
  editor = "Elhadi Shakshuki and Muhammad Younas",
  month = "September",
  address = "Niagara Falls, Ontario",
}
@TECHREPORT{hamlen11chekov,
  author = "Kevin W. Hamlen and Micah M. Jones and Meera Sridhar",
  title = "{Chekov}: Aspect-oriented Runtime Monitor Certification via Model-checking",
  institution = "Computer Science Department, The University of Texas at Dallas",
  year = 2011,
  number = "UTDCS-16-11",
  address = "Richardson, Texas",
  month = "May",
}
@INPROCEEDINGS{sridhar11plpv,
  author = "Meera Sridhar and Kevin W. Hamlen",
  title = "Flexible In-lined Reference Monitor Certification: Challenges and Future Directions",
  booktitle = "Proceedings of the. 5th ACM SIGPLAN Workshop on Programming Languages meets Program Verification (PLPV)",
  year = 2011,
  pages = "55--60",
  editor = "Ranjit Jhala and Wouter Swierstra",
  month = "January",
  address = "Austin, Texas",
}
@INPROCEEDINGS{khaled10cloudcom,
  author = "Arindam Khaled and Mohammad Farhan Husain and Latifur Khan and Kevin W. Hamlen and Bhavani Thuraisingham",
  title = "A Token-based Access Control System for {RDF} Data in the Clouds",
  booktitle = "Proceedings of the. 2nd IEEE International. Conference on. Cloud Computing Technology and Science (CloudCom)",
  year = 2010,
  pages = "104--111",
  month = "November/December",
  address = "Indianapolis, Indiana",
}
@INPROCEEDINGS{patwardhan10vlc,
  author = "Aditi Patwardhan and Kevin W. Hamlen and Kendra Cooper",
  title = "Towards Security-aware Program Visualization for Analyzing In-lined Reference Monitors",
  booktitle = "Proceedings of the. International. Workshop on Visual Languages and Computing (VLC)",
  year = 2010,
  pages = "257--260",
  month = "October",
  address = "Oak Brook, Illinois",
}
@ARTICLE{hamlen10ijisp,
  author = "Kevin W. Hamlen and Murat Kantarcioglu and Latifur Khan and Bhavani Thuraisingham",
  title = "Security Issues for Cloud Computing",
  journal = "International. Journal of. Information Security and Privacy (IJISP)",
  year = 2010,
  volume = 4,
  number = 2,
  pages = "36--48",
  month = "April--June",
}
@INPROCEEDINGS{thuraisingham10compsac,
  author = "Bhavani Thuraisingham and Kevin W. Hamlen",
  title = "Challenges and Future Directions of Software Technology: Secure Software Development, Invited Paper",
  booktitle = "Proceedings of the. 34th IEEE Annual International. Computer Security and Applications Conference. (COMPSAC)",
  year = 2010,
  pages = "17--20",
  editor = "Seikh Iqbal Ahamed and Doo-Hwan Bae and Sung Deok Cha and Carl K. Chang and Rajesh Subramanyan and Eric Wong and Hen-I Yang",
  month = "July",
  address = "Seoul, Korea",
}
@MASTERSTHESIS{patwardhan10thesis,
  author = "Aditi A. Patwardhan",
  title = "Security-aware Program Visualization for Analyzing In-lined Reference Monitors",
  school = "The University of Texas at Dallas",
  year = 2010,
  address = "Richardson, Texas",
  month = "June",
}
@INPROCEEDINGS{thuraisingham10sutc,
  author = "Bhavani Thuraisingham and Kevin W. Hamlen",
  title = "Secure Semantic Sensor Web and Pervasive Computing",
  booktitle = "Proceedings of the. IEEE International. Conference on. Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC)",
  year = 2010,
  pages = "5--10",
  month = "June",
  address = "Newport Beach, California",
}
@TECHREPORT{hamlen10reins,
  author = "Kevin W. Hamlen and Vishwath Mohan and Richard Wartell",
  title = "Reining in {Windows} {API} Abuses with In-lined Reference Monitors",
  institution = "Computer Science Department, The University of Texas at Dallas",
  year = 2010,
  number = "UTDCS-18-10",
  address = "Richardson, Texas",
  month = "June",
}
@INPROCEEDINGS{jones10aosd,
  author = "Micah Jones and Kevin W. Hamlen",
  title = "Disambiguating Aspect-oriented Security Policies",
  booktitle = "Proceedings of the. 9th International. Conference on. Aspect-Oriented Software Development (AOSD)",
  year = 2010,
  pages = "193--204",
  editor = "Jean-Marc J{\'e}z{\'e}quel and Mario S{\"u}dholt",
  month = "March",
  address = "Rennes, France",
}
@INPROCEEDINGS{sridhar10padl,
  author = "Meera Sridhar and Kevin W. Hamlen",
  title = "{ActionScript} In-lined Reference Monitoring in {Prolog}",
  booktitle = "Proceedings of the. 12th International. Symposium on. Practical Aspects of Declarative Languages (PADL)",
  year = 2010,
  pages = "149--151",
  editor = "Manuel Carro and Ricardo Pe{\~n}a",
  month = "January",
  address = "Madrid, Spain",
}
@INPROCEEDINGS{sridhar10vmcai,
  author = "Meera Sridhar and Kevin W. Hamlen",
  title = "Model-checking In-lined Reference Monitors",
  booktitle = "Proceedings of the. 11th International. Conference on. Verification, Model Checking, and Abstract Interpretation (VMCAI)",
  year = 2010,
  pages = "312--327",
  editor = "Gilles Barthe and Manuel V. Hermenegildo",
  month = "January",
  address = "Madrid, Spain",
}
@INPROCEEDINGS{devries09plas,
  author = "Brian W. DeVries and Gopal Gupta and Kevin W. Hamlen and Scott Moore and Meera Sridhar",
  title = "{ActionScript} Bytecode Verification With Co-Logic Programming",
  booktitle = "Proceedings of the. 4th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS)",
  year = 2009,
  pages = "9--15",
  editor = "Stephen Chong and David A. Naumann",
  month = "June",
  address = "Dublin, Ireland",
}
@INPROCEEDINGS{jones09isi,
  author = "Micah Jones and Kevin W. Hamlen",
  title = "Enforcing {IRM} Security Policies: Two Case Studies",
  booktitle = "Proceedings of the. 7th IEEE Intelligence and Security Informatics Conference. (ISI)",
  year = 2009,
  pages = "214--216",
  month = "June",
  address = "Dallas, Texas",
}
@ARTICLE{hamlen09csi,
  author = "Kevin W. Hamlen and Vishwath Mohan and Mohammad M. Masud and Latifur Khan and Bhavani Thuraisingham",
  title = "Exploiting an Antivirus Interface",
  journal = "Computer Standards \& Interfaces",
  year = 2009,
  volume = 31,
  number = 6,
  pages = "1182--1189",
  month = "April",
}
@INPROCEEDINGS{thuraisingham08euc,
  author = "Bhavani Thuraisingham and Latifur Khan and Mohammed M. Masud and Kevin W. Hamlen",
  title = "Data Mining for Security Applications",
  booktitle = "Proceedings of the. 6th IEEE/IFIP International. Conference on. Embedded and Ubiquitous Computing (EUC)",
  year = 2008,
  pages = "585--589",
  editor = "Cheng-Zhong Xu and Minyi Guo",
  month = "December",
  address = "Shanghai, China",
}
@INPROCEEDINGS{masud08dfma,
  author = "Mohammed M. Masud and Tahseen Al-khateeb and Latifur Khan and Bhavani Thuraisingham and Kevin W. Hamlen",
  title = "Flow-based Identification of Botnet Traffic by Mining Multipe Log Files",
  booktitle = "Proceedings of the. International. Conference on. Distributed Framework \& Applications (DFmA)",
  year = 2008,
  pages = "200--206",
  month = "October",
  address = "Penang, Malaysia",
}
@INPROCEEDINGS{hamlen08plas,
  author = "Kevin W. Hamlen and Micah Jones",
  title = "Aspect-Oriented In-lined Reference Monitors",
  booktitle = "Proceedings of the. 3rd ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS)",
  year = 2008,
  pages = "11--20",
  editor = "{\'U}lfar Erlingsson and Marco Pistoia",
  month = "June",
  address = "Tucson, Arizona",
}
@INPROCEEDINGS{hamlen07trustcol,
  author = "Kevin W. Hamlen and Bhavani Thuraisingham",
  title = "Secure Peer-to-peer Networks for Trusted Collaboration, Invited Paper",
  booktitle = "Proceedings of the. 3rd IEEE International. Conference on. Collaborative Computing: Networking, Applications and Worksharing (COLCOM)",
  year = 2007,
  pages = "58--63",
  month = "November",
  address = "White Plains, New York",
}
@INPROCEEDINGS{tsybulnik07acsac,
  author = "Nathalie Tsybulnik and Kevin W. Hamlen and Bhavani Thuraisingham",
  title = "Centralized Security Labels in Decentralized P2P Networks",
  booktitle = "Proceedings of the. 23rd Annual Computer Security Applications Conference. (ACSAC)",
  year = 2007,
  pages = "315--324",
  month = "December",
  address = "Miami Beach, Florida",
}
@ARTICLE{hamlen06cheer,
  author = "William Hamlen and Kevin W. Hamlen",
  title = "A Closed System of Production Possibility and Social Welfare",
  journal = "Computers in Higher Education Economics Review (CHEER)",
  year = 2006,
  volume = 18,
  number = 1,
  pages = "15--18",
  month = "December",
}
@PHDTHESIS{hamlen06thesis,
  author = "Kevin W. Hamlen",
  title = "Security Policy Enforcement by Automated Program-rewriting",
  school = "Cornell University",
  address = "Ithaca, New York",
  month = "August",
  year = 2006,
}
@INPROCEEDINGS{hamlen06plas,
  author = "Kevin W. Hamlen and Greg Morrisett and Fred B. Schneider",
  title = "Certified In-lined Reference Monitoring on {.NET}",
  booktitle = "Proceedings of the. 1st ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS)",
  year = 2006,
  pages = "7--16",
  editor = "Vugranam C. Sreedhar and Steve Zdancewic",
  month = "June",
  address = "Ottawa, Ontario",
}
@ARTICLE{hamlen06toplas,
  author = "Kevin W. Hamlen and Greg Morrisett and Fred B. Schneider",
  title = "Computability Classes for Enforcement Mechanisms",
  journal = "ACM Transactions on. Programming Languages and Systems (TOPLAS)",
  year = 2006,
  volume = 28,
  number = 1,
  pages = "175--205",
  month = "January",
}
@MISC{hamlen98thesis,
  author = "Kevin W. Hamlen",
  title = "Proof-Carrying Code for x86 Architectures",
  howpublished = "Undergraduate Senior Honors Thesis, Carnegie Mellon University, Pittsburgh, Pennsylvania",
  year = 1998,
  month = "May",
}