Home | Publications | Professional | Teaching | Research | Personal   

Jeffrey Todd McDonald, Ph. D.
Professor of Computer Science
 Publications



Full CV

Book Chapters


Nonlinear Epilepsy Forewarning by Support Vector Machines
Chapter 3 in Epilepsy Topics, M.D. Holmes ed. (InTech publ., Croatia) 2014 (ISBN 978-953-51-1630-1)
W.S. Ashbee, L.M. Hively, and J.T. McDonald (pdf)

Editorials


Editor, Special Issue on Cyber Modeling and Simulation
Journal of Defense Modeling and Simulation: Applications, Methodology, Technology, vol. 14, no. 3, pp. 197-199, July 2017. SAGE Publishing, DOI: 10.1177/1548512917699729
J. Todd McDonald, Todd R. Andel, Mikel D. Petty

Editor, Proceedings of the 6th Software Security, Protection, and Reverse Engineering Workshop (SSPREW-6)
December 5-6, 2016, Los Angeles, California, USA, ACM Publishing, ISBN: 978-1-4503-4841-6
Mila Dalla Preda, Natalia Stakhanova, and Jeffrey Todd McDonald.

Editor, Proceedings of the 5th Program Protection and Reverse Engineering Workshop (PPREW-5)
December 8, 2015, Los Angeles, California, USA, ACM Publishing, ISBN: 978-1-4503-3642-0
Jeffrey Todd McDonald, Mila Dalla Preda, and Natalia Stakhanova.

Editor, Proceedings of the 4th Program Protection and Reverse Engineering Workshop (PPREW-4)
December 9, 2014, New Orleans, LA, USA, ACM Publishing, ISBN: 978-1-60558-637-3.
Mila Dalla Preda and Jeffrey Todd McDonald.

Editor, Proceedings of the 3rd ACM SIGPLAN Program Protection and Reverse Engineering Workshop (PPREW-2014)
January 26, 2014, San Diego, CA, USA, ACM Publishing, ISBN: 978-1-4503-2649-0.
J. Todd McDonald, Mila Dalla Preda, Arun Lakhotia, and Roberto Giacobazzi.

Introduction to the Special Issue on Cyber Security and Management
No. 4, Inf Syst E-Bus Manage (2012) 10: 429-431. doi: 10.1007/s10257-012-0204-x Springer.
Frederick T. Shelton and J. Todd McDonald

Editor, Proceedings of the 2nd ACM SIGPLAN Program Protection and Reverse Engineering Workshop (PPREW-2013)
January 25, 2013, Rome, Italy, ACM Publishing, ISBN: 978-1-4503-1857-0.
J. Todd McDonald and Mila Dalla Preda

Editor, Special Issue on Cyber Defense - Methodologies and Techniques for Evaluation
Journal of Defense Modeling and Simulation: Applications, Methodology, Technology, online: Oct 2011, in press: Oct 2012
J. Todd McDonald and Eric D. Trias (pdf)


Journal articles


A Detailed Look at 'I Think I CAN'
The Journal of Information Warfare, vol. 16, no. 3, July 2017
Adam J. Brown, Todd R. Andel, J. T. McDonald, and Mark Yampolskiy.

Dissimilarity of graph invariant features from EEG phase-space analysis
Journal of Computer Engineering and Information Technology, vol. 6, no. 3, May 2017
P. Luckett, J. T. McDonald, and L. M. Hively.

A Method for Developing Abuse Cases and Its Evaluation
Journal of Software, vol. 11, no. 5, May 2016. doi: 10.17706/jsw.11.5.520-527
Imano Williams+, Xiaohong Yuan, Jeffrey T. McDonald, and Mohd Anwar.

Multidisciplinary Approaches for Cyber Security
National Cybersecurity Institute's Journal, vol. II, August 2014
J. Todd McDonald and Lee M. Hively.

Analysis and Categorical Application of LSB Steganalysis Techniques.
The Journal of Information Warfare, July 2014
Joshua R. Cazalas, Todd R. Andel, and J. Todd McDonald.

Design and Implementation of Hiding Techniques to Obfuscate Against Side-Channel Attacks on AES.
International Journal of Computing & Network Technology, May 2014, vol. 2, no. 2, pp. 65-72
Todd R. Andel, Austin Fritzke, Jeffrey W. Humphries, and J. Todd McDonald.

RSA Power Analysis Obfuscation: A Dynamic Algorithmic Hardware Countermeasure.
International Journal of Computing & Digital Systems, May 2014, vol. 3, no. 2, pp. 69-78
Todd R. Andel, John Barron, J. Todd McDonald, and Jeffrey W. Humphries.

Integrating Historical Security Jewels in Information Assurance Education.
IEEE Security & Privacy, Special Issue on Lost Treasures of Computer Security & Privacy, vol. 10, no. 6, Nov.-Dec. 2012, pp. 45-50
Jeffrey T. McDonald and Todd R. Andel. (pdf)

Considering Software Protection for Embedded Systems.
Crosstalk: The Journal of Defense Software Engineering, vol. 22, no. 6, Sept/Oct 2009, pp. 4-8.
Yong C. Kim and J. Todd McDonald. (pdf)

Tamper Resistant Software Through Intent Protection.
International Journal of Network Security, vol. 7, no. 3, Nov 2008, pp. 370-382.
Alec Yasinsac and J. Todd McDonald. (pdf)

Software Issues in Digital Forensics.
ACM SIGOPS OS Review, Special Issue on Forensics, vol. 42, no. 3, April 2008, pp. 29-40.
J. Todd McDonald, Yong Kim, and Alec Yasinsac. (pdf)


Invited Papers/Magazines


Side-Channel Based Detection of Malicious Software.
Dagstuhl Reports, No. 17281, Malware Analysis: From Large-Scale Data Triage to Targeted Attack Recognition. Schloss Dagstuhl, Germany, September 2017. ISSN: 2192-5283. Published Online
J. Todd McDonald

Program Partitioning and Polymorphic Functions: A Two-Pronged Approach for Program Protection Research.
unpublished, ARO Workshop on Continuously Upgradeable Software Security and Protection (SSP'14), Scottsdale, Arizona, November 7, 2014.
J. Todd McDonald and Todd R. Andel. (pdf)

Capturing the Essence of Practical Obfuscation.
Proceedings of the 6th International Conference on Information Systems, Technology, and Management (ICISTM'12), Program Protection and Reverse Engineering Workshop, (eds.) Dua, S. et al.,Springer.
J. Todd McDonald. (pdf)

Guarding the Cybercastle in 2020
IANewsletter, vol. 11, no. 3, Fall 2008.
T. McDonald, B. Peterson, D. Karrels, T. Andel, and R. Raines. (pdf)


Refereed conference and workshop papers


Evaluating Optimal Phase Ordering in Obfuscation Executives
Accepted, 7th Software Security, Protection, and Reverse Engineering Workshop (SSPREW-7), December 11-12, 2017, Orlando, FL, USA.
William Holder, J. Todd McDonald, and Todd R. Andel.

Rootkit Detection through Phase-Space Analysis of Power Voltage Measurements
Accepted, 12th IEEE International Conference on Malicious and Unwanted Software (MALCON 2017), January 16-18, 2018, San Juan, Puerto Rico, USA.
Joel A. Dawson, J. Todd McDonald, Jordan Shropshire, Todd R. Andel, Patrick Luckett, Lee Hively.

MedDevRisk: Risk Analysis Methodology for Networked Medical Devices
Accepted, 51st Hawaii International Conference on System Sciences (HICSS-51), January 3-6, 2018, Hilton Waikoloa Village, HI, USA.
Katherine Seale, Jeffrey McDonald, William Glisson, Harold Pardue, and Michael Jacobs.

Enhanced Operating System Protection to Support Digital Forensic Investigations
Proceedings of the 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-17), August 1-4, 2017, Sydney, Australia. doi: 10.1109/Trustcom/BigDataSE/ICESS.2017.296
J. Todd McDonald, Ramya Manikyam, William B. Glisson, Todd R. Andel, and Yuan X. Gu

I Think I CAN
Proceedings of the 12th International Conference on Cyber Warfare and Security - (ICCWS 2017, pp. 67-73, March 2-3, 2017, Dayton, OH, USA. Academic Conferences and Publishing International.
Adam J. Brown, Todd R. Andel, Jeffrey McDonald, and Mark Yampolskiy.

Exploitation and Detection of a Malicious Mobile Application
Proceedings of the 50th Hawaii International Conference on System Sciences (HICSS-50), January 4-7, 2017, Hilton Waikoloa Village, HI, USA
Thanh Nguyen, Jeffrey T. McDonald, and William Bradley Glisson.

Attack-Graph Threat Modeling Assessment of Ambulatory Medical Devices
Proceedings of the 50th Hawaii International Conference on System Sciences (HICSS-50), January 4-7, 2017, Hilton Waikoloa Village, HI, USA.
Patrick H. Luckett, Jeffrey T. McDonald, and William Bradley Glisson.

Comparing Effectiveness of Commercial Obfuscators against MATE Attacks
Proceedings of the 6th Software Security, Protection, and Reverse Engineering Workshop (SSPREW-6), December 5-6, 2016, Los Angeles, CA, ACM. doi: 10.1145/3015135.3015143
Ramya Manikyam, J. Todd McDonald, William R. Mahoney, Todd R. Andel, and Samuel H. Russ.

Buffer Overflow Attack's Power Consumption Signatures
Proceedings of the 6th Software Security, Protection, and Reverse Engineering Workshop (SSPREW-6), December 5-6, 2016, Los Angeles, CA, ACM. doi: 10.1145/3015135.3015141
Samuel Moore, Mark Yampolskiy, Jacob Gatlin, Jeffrey T. McDonald, and Todd R. Andel.

Improving Penetration Testing Methodologies for Security-Based Risk Assessment
Cybersecurity Symposium: Your Security, Your Future 2016: Edited Proceedings Volume, 18-20 April 2016, Coeur d'Alene, ID, USA. IEEE, 2017. doi: 10.1109/CYBERSEC.2016.016
Joel Dawson and J. Todd McDonald.

Neural Network Analysis of System Call Timing for Rootkit Detection
Cybersecurity Symposium: Your Security, Your Future 2016: Edited Proceedings Volume, 18-20 April 2016, Coeur d'Alene, ID, USA. IEEE, 2017. doi: 10.1109/CYBERSEC.2016.008
Patrick Luckett, J. Todd McDonald, and Joel Dawson.

Vulnerability Analysis of Desktop 3D Printer Software
Proceedings of the International Symposium on Resilient Cyber Systems, 16-18 Aug. 2016, Resilience Week (RWS), 2016, IEEE. doi: 10.1109/RWEEK.2016.7573305
Samuel Moore, Phillip Armstrong, Jeffrey T. McDonald, and Mark Yampolskiy.

The Application of Moving Target Defense to Field Programmable Gate Arrays
Proceedings of the 11th Annual Cyber and Information Security Research Conference (CISR), April 5-7, 2016, Oak Ridge, TN, ACM. doi: 10.1145/2897795.2897820
John Dombrowski, Todd R. Andel, and J. Todd McDonald.

Seizure Detection via Distance Traversal of Phase-Space Graphs
Late-Breaking Papers, poster, IEEE International Conference on Biomedical and Health Informatics (BHI), February 24-27, 2016, Las Vegas, NV
Patrick Luckett, J. Todd McDonald, Lee M. Hively.

A Method for Developing Abuse Cases and Its Evaluation
Proceedings of ICSIE 2016 5th International Conference on Software and Information Engineering, May 11-13, 2016, Tokyo, Japan.
Imano Williams, Xiaohong Yuan, Jeffrey McDonald, and Mohd Anwar.

Polymorphic Functions for Intellectual Property Protection
Best Poster Award, Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust (HOST 2016), May 5-7, 2016, McLean, VA, USA
J. Todd McDonald, Yong C. Kim, Todd R. Andel, James McVicar, and Mile Forbes.

Utilizing the Cloud to Store Camera Hijacked Images
Proceedings of Hawaii International Conference on System Sciences (HICSS-49), January 4-7, 2017, Kauai, Hawaii, IEEE Publishing, 2017. doi: 10.1109/HICSS.2016.679
C. Kynigos, W.B. Glisson, T.R. Andel, and J.T. McDonald.

Security in Agile Development: Pedagogic Lessons from an Undergraduate Software Engineering Case Study
Communications in Computer and Information Science: Cyber Security, vol. 589, pp. 127-141, 8 January, 2016, Springer. doi: 10.1007/978-3-319-28313-5_9
J. Todd McDonald, Tyler H. Trigg, Clifton E. Roberts, and Blake J. Darden.

A System to Recognize Intruders in Controller Area Network (CAN)
Proceedings of 3rd International Symposium for ICS and SCADA Cyber Security Research (ICS-CSR 2015), Ingolstadt, Germany, 17-18 September, 2015. doi: 10.14236/ewic/ICS2015.15
Paul Carsten, Todd R. Andel, Mark Yampolskiy, Jeffrey T. McDonald, and Samuel Russ.

Compromising a Medical Mannequin
Proceedings of 21st Americas Conference on Information Systems (AMCIS 2015), Puerto Rico, 13-15 August, 2015.
William B. Glisson, Todd Andel, Todd McDonald, Mike Jacobs, Matt Campbell, Johnny Mayr.

In-Vehicle Networks: Attacks, Vulnerabilities, and Proposed Solutions
Proceedings of 2015 Cyber and Information Security Research Conference (CISR '15), Oak Ridge, TN, 7-9 April 2015, Article 1, ACM. doi: 10.1145/2746266.2746267
Paul Carsten, Todd R. Andel, Mark Yampolskiy, and Jeffrey T. McDonald.

Probing the Limits of Virtualized Software Protection
Proceedings of the 4th Program Protection and Reverse Engineering Workshop (PPREW-4), New Orleans, LA, 9 December 2014. ACM Publishing. doi: 10.1145/2689702.2689707
Joshua Cazalas, J. Todd McDonald, Todd R. Andel, Natalia Stakhanova.

Intellectual Property Protection in Additive Layer Manufacturing: Requirements for Secure Outsourcing
Proceedings of the 4th Program Protection and Reverse Engineering Workshop (PPREW-4), New Orleans, LA, 9 December 2014. ACM Publishing. doi: 10.1145/2689702.2689709
Mark Yampolskiy, Todd R. Andel, J. Todd McDonald, William B. Glisson, Alec Yasinsac.

Software Security and Randomization through Program Partitioning and Circuit Variation
Proceedings of 1st Workshop on Moving Target Defense (MTD 2014), Scottsdale, Arizona, November 3, 2014. ACM Publishing. doi: 10.1145/2663474.2663484
Todd R. Andel, Lindsey N. Whitehurst, and J. Todd McDonald.

Exploring Security in ZigBee Networks
Proceedings of 2014 Cyber and Information Security Research Conference (CISR '14), Oak Ridge, TN, 8-10 April 2014. ACM Publishing. doi: 10.1145/2602087.2602090 (Best Paper Award)
Lindsey N. Whitehurst, Todd R. Andel, and J. Todd McDonald.

Analysis and Categorical Application of LSB Steganalysis Techniques
Proceedings of 9th International Conference on Cyber Warfare and Security (ICCWS-2014), 24-25 March, 2014, Purdue University, West Lafayette, Indiana, USA.
Joshua R. Cazalas, Todd R. Andel, and J. Todd McDonald.

A Systems Approach to Cyber Assurance Education
Proceedings of the Information Security Curriculum Development Conference (INFOSECCD 2013), October 11-12, 2013, Kennesaw, GA, USA, ACM Publishing. doi: 10.145/ 2528908.2528920
Todd R. Andel and J. Todd McDonald.

Forewarning of Epileptic Events from Scalp EEG
Proceedings of the ORNL Biomedical Science and Engineering Center Conference (BSEC 2013), May 21-23, 2013, Oak Ridge National Laboratory.
Lee M. Hively, J. Todd McDonald, Nancy Munro, Emily Cornelius. (pdf)

Developing a Power Measurement Framework for Cyber Defense
Proceedings of the 8th Cyber Security and Information Intelligence Workshop (CSIIRW-2012), January 2013, Oak Ridge National Laboratory.
Jarilyn M. Hernández, Line Pouchard, J. Todd McDonald. (pdf)

Theorem-Based, Data-Driven, Cyber Event Detection
Poster, Proceedings of the 8th Cyber Security and Information Intelligence Workshop (CSIIRW-2012), January 2013, Oak Ridge National Laboratory.
Lee M. Hively and J. Todd McDonald. (pdf)

Application Security Models for Mobile Agent Systems
Electronic Notes in Computer Science, vol. 157, no. 3, 25 May 2006, pp. 43-59.
J. Todd McDonald and A. Yasinsac. (pdf)

Hybrid Approach for Secure Mobile Agent Computations
Lecture Notes in Computer Science, vol. 4074, Sept. 20-22, 2005, Springer-Verlag, pp. 38-53.
J. Todd McDonald. (pdf)

Evaluating Component Hiding Techniques in Circuit Topologies
International Conference on Communications, Communication and Information Systems Security Symposium (ICC-CISS-2012), June 10-15, 2012, Ottawa, Canada
J. Todd McDonald, Yong C. Kim, Daniel Koranek, James D. Parham. (pdf)

Examining Tradeoffs for Hardware-Based Intellectual Property Protection
Proceedings of the 7th International Conference on Information Warfare (ICIW-2012), March 22-23, 2012, University of Washington, Seattle, USA.
J. Todd McDonald and Yong C. Kim. (pdf)

Deterministic Circuit Variation for Anti-Tamper Applications
Proceedings of the Cyber Security and Information Intelligence Research Workshop (CSIIRW ’11), October 12-14, 2011, Oak Ridge, TN, USA.
J. Todd McDonald, Yong C. Kim, Daniel Koranek. (pdf) (slides)

Hiding Circuit Components Using Boundary Blurring Techniques
Proceedings of the IEEE Annual Symposium on VLSI (ISVLSI10), Jul. 5-7, 2010, Lixouri, Cephalonia, Greece.
James D. Parham, Yong C. Kim, J. Todd McDonald, and Michael Grimaila. (pdf)

A Java based Component Identification Tool for Measuring the Strength of Circuit Protections
Proceedings of the of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research, (eds.) Sheldon, F.T. et al., Apr. 21-23, 2010, Oak Ridge, Tennessee, USA.
James D. Parham, J. Todd McDonald, Michael R. Grimaila, Yong C. Kim. (pdf) (slides)

An Application of Deception in Cyberspace: Operating System Obfuscation.
Proceedings of the 5th International Conference on Information Warfare and Security, 8-9 April 2010, The Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, USA.
Sherry B. Murphy, J. Todd McDonald, and Robert F. Mills. (pdf)

Using Logic-Based Reduction for Adversarial Component Recovery
Proceedings of the 25th ACM Symposium on Applied Computing, March 2010, Sierre, Switzerland.
J. Todd McDonald, Eric D. Trias, Yong C. Kim, and Michael R. Grimaila. (pdf) (slides)

Protecting Reprogrammable Hardware with Polymorphic Circuit Variation
Proceedings of the 2nd Cyberspace Research Workshop, June 2009, Shreveport, Louisiana, USA.
J. Todd McDonald, Yong C. Kim, and Michael R. Grimaila. (pdf) (slides)

Developing Systems for Cyber Situational Awareness
Proceedings of the 2nd Cyberspace Research Workshop 2009, June 2009, Shreveport, Louisiana, USA.
James S. Okolica, J. Todd McDonald, Gilbert L. Peterson, Robert F. Mills, and Michael W. Haas. (pdf) (slides)

Increasing Stability and Distinguishability of the Digital Fingerprint in FPGAs Through Inputword Analysis
Proceedings of the IEEE International Conference on Field Programmable Logic and Applications (FPL 09), Aug 31-Sep 2, 2009, Prague, Czech Republic.
Hiren Patel, Yong C. Kim, J. Todd McDonald, LaVern Starman. (pdf)

Dynamic polymorphic reconfiguration for anti-tamper circuits
Proceedings of the IEEE International Conference on Field Programmable Logic and Applications (FPL 09), Aug 31-Sep 2, 2009, Prague, Czech Republic.
Roy Porter, Samuel J. Stone, Yong C. Kim, J. Todd McDonald, LaVern A. Starman. (pdf)

Analyzing Functional Entropy of Software-Based Intent Protection Schemes
Proceedings of the 4th International Conference on Information Warfare and Security, 26-27 March 2009, University of Cape Town, South Africa.
J. Todd McDonald, Eric D. Trias, and Alan C. Lin. (pdf) (slides)

Creating digital fingerprints on commercial field programmable gate arrays
Proceedings of the IEEE International Conference on Field Programmable Technology (ICFPT 2008), ICECE Technology, December 2008, Taipei, Taiwan, pp. 345-348.
James Crouch, Hiren Patel, Yong C Kim, J. Todd McDonald, Tony C. Kim. (pdf)

Practical Methods for Software Security Education
National Science Foundation Faculty Workshop on Secure Software Development, April 14-15, 2008, Orlando, FL.
J. Todd McDonald, Stuart H. Kurkowski, Richard A. Raines, Robert W. Bennington. (pdf)

Developing a Requirements Framework for Cybercraft Trust Evaluation
Proceedings of the 3rd International Conference on Information Warfare and Security, 24-25 April 2008, Peter Kiewit Institute, University of Nebraska Omaha, USA.
J. Todd McDonald and Shannon Hunt. (pdf) (slides)

Towards Working With Small Atomic Functions
Proceedings of the Fifteenth International Workshop on Security Protocols, (eds.) Christianson, B. et al., Springer Verlag, 18-20 April 2007, Brno, Czech Republic, pp. 191-200.
Alec Yasinsac and J. Todd McDonald. (pdf)

Applications for Provably Secure Intent Protection with Bounded Input-Size Programs
Proceedings of the International Conference on Availability, Reliability and Security (ARES 2007), April 10-13, 2007. (28% acceptance rate, 60/212).
J. Todd McDonald and Alec Yasinsac. (pdf)

Program Intent Protection Using Circuit Encryption
Proceedings of the 8th International Symposium on System and Information Security, Sao Jose dos Campos, Sao Paulo, Brazil, November 8-10, 2006. (29% acceptance rate, 40/140).
J. Todd McDonald and Alec Yasinsac. (pdf)

Foundations for Security Aware Software Development Education
Proceedings of the Hawaii International Conference on System Sciences (HICSS'05), January 4-7, 2006.
Alec Yasinsac and J. Todd McDonald. (pdf)

Of Unicorns and Random Programs
Proceedings of the 3rd IASTED International Conference on Communications and Computer Networks (IASTED/CCN), October 24-26, 2005, Marina del Rey, CA.
Alec Yasinsac and J. Todd McDonald,. (pdf)

Mobile Agent Data Integrity Using Multi-agent Architecture
Proceedings of the International Workshop on Security in Parallel and Distributed Systems (PDCS 2004), 14-17 September 2004, San Francisco, CA.
J. Todd McDonald, A. Yasinsac, W. Thompson. (pdf)

Semantic Encryption Transformation Scheme
Proceedings of the International Workshop on Security in Parallel and Distributed Systems (PDCS 2004), 14-17 September 2004, San Francisco, CA.
W. Thompson, A. Yasinsac, J. Todd McDonald. (pdf)

Agent-Based Architecture for Modeling and Simulation Integration
Proceedings of the National Aerospace & Electronics Conference (NAECON 2000), Oct 2000, Dayton, OH. (2nd Place Best Paper for NAECON 2000 in the Student Award Category).
J. Todd McDonald and M. Talbert. (pdf)

Heterogeneous Database Integration Using Agent-Oriented Information Systems
Proceedings of the International Conference on Artificial Intelligence (IC-AI-2000), Jun 2000, Las Vegas, NV.
J. Todd McDonald, M. Talbert, and S. Deloach. (pdf)



bottom