Home | Publications | Professional | Teaching | Research | Personal   

Jeffrey Todd McDonald, Ph. D.
Professor of Computer Science
 Publications



Full CV

Book Chapters


Nonlinear Epilepsy Forewarning by Support Vector Machines
Chapter 3 in Epilepsy Topics, M.D. Holmes ed. (InTech publ., Croatia) 2014 (ISBN 978-953-51-1630-1)
W.S. Ashbee, L.M. Hively, and J.T. McDonald (pdf)

Journal articles


An Automated Security Concerns Recommender Based on Use Case Specification Ontology
Automated Software Engineering, vol. 29, no. 42, June 2022. doi: 10.1007/s10515-022-00334-0
Imano Williams, Xiaohong Yuan, Mohd Anwar, and Todd McDonald.

Near-Real-Time IDS for the U.S. FAA's NextGen ADS-B
Big Data and Cognitive Computing, June 2021, vol. 5, no. 2, pp 91-106. doi: 10.3390/bdcc5020027
Dustin M. Mink, Jeffrey McDonald, Sikha Bagui, William B. Glisson, Jordan Shropshire, Ryan Benton, and Samuel Russ.

Detection and Defense of Cyber Attacks on the Machine Learning Control of Robotic Systems
Journal of Defense Modeling and Simulation, Nov. 2021, doi: 10.1177/15485129211043874
George Clark, Todd R. Andel, J.T. McDonald, T. Johnsten, and T. Thomas.

Predicting State Transitions in Brain Dynamics Through Spectral Distance of Phase Space Graphs
Journal of Computational Neuroscience, October 2018, doi: 10.1007/s10827-018-0700-1
Patrick Luckett, Elena Pavelescu, Todd McDonald, Lee M. Hively, and Juan Ochoa.

Identifying Stealth Malware Using CPU Power Consumption and Learning Algorithms
Journal of Computer Security, vol. 26 no. 5, pp. 589-613, 2018, doi: 10.3233/JCS-171060
Patrick Luckett, J. Todd McDonald, William B. Glisson, Ryan Benton, Joel Dawson, and Blair Doyle.

A Detailed Look at 'I Think I CAN'
The Journal of Information Warfare, vol. 16, no. 3, July 2017
Adam J. Brown, Todd R. Andel, J. T. McDonald, and Mark Yampolskiy.

Dissimilarity of graph invariant features from EEG phase-space analysis
Journal of Computer Engineering and Information Technology, vol. 6, no. 3, May 2017
P. Luckett, J. T. McDonald, and L. M. Hively.

A Method for Developing Abuse Cases and Its Evaluation
Journal of Software, vol. 11, no. 5, May 2016. doi: 10.17706/jsw.11.5.520-527
Imano Williams, Xiaohong Yuan, Jeffrey T. McDonald, and Mohd Anwar.

Multidisciplinary Approaches for Cyber Security
National Cybersecurity Institute's Journal, vol. II, August 2014
J. Todd McDonald and Lee M. Hively.

Analysis and Categorical Application of LSB Steganalysis Techniques.
The Journal of Information Warfare, July 2014
Joshua R. Cazalas, Todd R. Andel, and J. Todd McDonald.

Design and Implementation of Hiding Techniques to Obfuscate Against Side-Channel Attacks on AES.
International Journal of Computing & Network Technology, May 2014, vol. 2, no. 2, pp. 65-72
Todd R. Andel, Austin Fritzke, Jeffrey W. Humphries, and J. Todd McDonald.

RSA Power Analysis Obfuscation: A Dynamic Algorithmic Hardware Countermeasure.
International Journal of Computing & Digital Systems, May 2014, vol. 3, no. 2, pp. 69-78
Todd R. Andel, John Barron, J. Todd McDonald, and Jeffrey W. Humphries.

Integrating Historical Security Jewels in Information Assurance Education.
IEEE Security & Privacy, Special Issue on Lost Treasures of Computer Security & Privacy, vol. 10, no. 6, Nov.-Dec. 2012, pp. 45-50
Jeffrey T. McDonald and Todd R. Andel. (pdf)

Considering Software Protection for Embedded Systems.
Crosstalk: The Journal of Defense Software Engineering, vol. 22, no. 6, Sept/Oct 2009, pp. 4-8.
Yong C. Kim and J. Todd McDonald. (pdf)

Tamper Resistant Software Through Intent Protection.
International Journal of Network Security, vol. 7, no. 3, Nov 2008, pp. 370-382.
Alec Yasinsac and J. Todd McDonald. (pdf)

Software Issues in Digital Forensics.
ACM SIGOPS OS Review, Special Issue on Forensics, vol. 42, no. 3, April 2008, pp. 29-40.
J. Todd McDonald, Yong Kim, and Alec Yasinsac. (pdf)


Invited Papers/Magazines


Side-Channel Based Detection of Malicious Software.
Dagstuhl Reports, No. 17281, Malware Analysis: From Large-Scale Data Triage to Targeted Attack Recognition. Schloss Dagstuhl, Germany, September 2017. ISSN: 2192-5283. Published Online
J. Todd McDonald

Program Partitioning and Polymorphic Functions: A Two-Pronged Approach for Program Protection Research.
unpublished, ARO Workshop on Continuously Upgradeable Software Security and Protection (SSP'14), Scottsdale, Arizona, November 7, 2014.
J. Todd McDonald and Todd R. Andel. (pdf)

Capturing the Essence of Practical Obfuscation.
Proceedings of the 6th International Conference on Information Systems, Technology, and Management (ICISTM'12), Program Protection and Reverse Engineering Workshop, (eds.) Dua, S. et al.,Springer.
J. Todd McDonald. (pdf)

Guarding the Cybercastle in 2020
IANewsletter, vol. 11, no. 3, Fall 2008.
T. McDonald, B. Peterson, D. Karrels, T. Andel, and R. Raines. (pdf)


Refereed conference and workshop papers


PEffectiveness of Adversarial Component Recovery in Protected Netlist Circuit Designs
Proceedings of the 19th International Conference on Security and Cryptography (SECRYPT 2022),11-13 July 2022, Lisbon, Portugal.
Jeffrey T. McDonald, Jennifer Parnell*, Todd R. Andel, Samuel H. Russ

Phase Space Power Analysis for PC-based Rootkit Detection
Proceedings of the ACM Southeast Conference, April 18-20, 2022, Jacksonville State University, AL, USA
J. Todd McDonald, Rebecca C. Clark, Lee M. Hively and Samuel H. Russ.

Circuit-Variant Moving Target Defense for Side-Channel Attacks
Proceedings of the 17th International Conference on Cyber Warfare and Security (ICCWS-2022), 17-18 March 2022, Albany, New York, USA
Tristen Mullins, Brandon Baggett, Todd R. Andel, Jeffrey T. McDonald.

Looking at a Moving Target Defense of EthernetIP
Proceedings of IEEE SoutheastCon 2022, March 31 - April 3, 2022, Mobile, AL, USA
Cordell Clay Davidson, Todd R. Andel, and Jeffrey Todd McDonald.

Argon: A Toolbase for Evaluating Software Protection Techniques Against Symbolic Execution Attacks
Proceedings of IEEE SoutheastCon 2022, March 31 - April 3, 2022, Mobile, AL, USA
Deepak Adhikari, Jeffrey Todd McDonald, Todd R. Andel, and Joseph Richardson.

Profiling CPU Behavior for Detection of Android Ransomware
Proceedings of IEEE SoutheastCon 2022, March 31 - April 3, 2022, Mobile, AL, USA
Reeve Cabral, J. Todd McDonald, Lee Hively, and Ryan Benton.

Evaluating Security of Executable Steganography for Digital Software Watermarking
Proceedings of IEEE SoutheastCon 2022, March 31 - April 3, 2022, Mobile, AL, USA
J. Alex Mullins, J. Todd McDonald, William R. Mahoney, and Todd R. Andel.

The Impact of Software Fingerprinting in LLVM
Proceedings of the 17th International Conference on Cyber Warfare and Security (ICCWS-2022), 17-18 March 2022, Albany, New York, USA
William Mahoney, Phil Sigillito, J. Todd McDonald.

Classifying Android Applications Via System Stats
Proceedings of the 2021 IEEE Conference on BigData (IEEE BigData 2021), virtual, pp. 5388-5394
Joshua Hightower, William Bradley Glisson, Ryan Benton, Jeffrey Todd McDonald.

Program Protection Through Software-Based Hardware Abstraction
Proceedings of the 18th International Conference on Security and Cryptography (SECRYPT 2021), Virtual, July 6-8 2021. doi: 10.5220/0010557502470258
Jeffrey T. McDonald, Ramya K. Manikyam, Sébastien Bardin, Richard Bonichon, and Todd Andel.

Program Encryption Toolkit - A Tool for Digital Logic Education and Undergraduate Research
Proceedings of the 2021 ASEE Annual Conference and Exposition, Virtual, July 26-29 2021. https://peer.asee.org/37605
Jeffrey T. McDonald, Dawn McKinney, and Todd R. Andel.

Software Fingerprinting in LLVM
Proceedings of the 16th International Conference on Cyber Warfare and Security (ICCWS-2021)
William Mahoney, Gregory Hoff, J. Todd McDonald, George Grispos.

Machine Learning Classification of Obfuscation using Image Visualization
Proceedings of the 18th International Conference on Security and Cryptography (SECRYPT 2021) - Short Paper, Virtual, July 6-8 2021. doi: 10.5220/0010607408540859
Colby Parker, Jeffrey T. McDonald, Dimitrios Damopoulos.

Location Distribution as a Side Channel Countermeasure
Proceedings of the IEEE SoutheastCon 2021, Virtual, 10-14 Mar 2021.
Brandon Baggett, Todd R. Andel, and J. Todd McDonald.

Machine Learning-Based Android Malware Detection Using Manifest Permissions
Proceedings of 54th Hawaii International Conference on System Sciences (HICSS-54), Kauai, Hawaii, January 5-8 2021.
Nathan Herron, J. Todd McDonald, William B. Glisson, and Ryan Benton.

Deception Detection Using Machine Learning
Proceedings of 54th Hawaii International Conference on System Sciences (HICSS-54), Kauai, Hawaii, January 5-8 2021.
A. Ceballos Delgado, W. Glisson, N. Shashidhar, J. McDonald, G. Grispos, and R. Benton.

Polymorphic Circuit Generation Using Random Boolean Logic Expansion
Proceedings of the 35th ACM/SIGAPP Symposium On Applied Computing (SAC'20), Brno, Czech Republic, March 30-April 3, 2020. doi: 10.1145/3341105.3374031
Jeffrey T. McDonald, Trinity L. Stroud, and Todd R. Andel.

Parking Lot using MRCNN
Proceedings of the IEEE 10th International Conference on Computing, Communication and Networking Technologies, July 2019, IIT Kanpur, India
Javaria Ahmad, Zachary Lewis, Prakash Duraisamy, Todd McDonald

Detecting Repackaged Android Applications Using Perceptual Hashing
Proceedings of the 53rd Hawaii International Conference on System Sciences (HICSS-53), Grand Wailea Maui, HI, January 7-10, 2020
Thanh Nguyen, J. Todd McDonald, William B. Glisson, and Todd R. Andel.

Attack Modeling and Mitigation Strategies for Risk Based Analysis of Networked Medical Devices
Proceedings of the 53rd Hawaii International Conference on System Sciences (HICSS-53), Grand Wailea Maui, HI, January 7-10, 2020
Bronwyn J. Hodges, J. Todd McDonald, William B. Glisson, Maureen S. Van Devender, Michael Jacobs, and J. Harold Pardue.

A Deep Learning Approach to Phase-Space Analysis for Seizure Detection
Proceedings of the 10th ACM International Conference on Bioinformatics, Computational Biology and Health Informatics (ACM-BCB'19), ACM, New York, NY, USA. doi: 10.1145/3307339.3342131
Patrick Luckett, Thomas Watts, J. Todd McDonald, Lee Hively, and Ryan Benton.

Evaluating Side Channel Resilience in iPhone 5c Unlock Scenarios
Proceedings of the IEEE SoutheastCon 2019, Huntsville, AL, April 11-14, 2019
Fernando Lorenzo, Jeffrey McDonald, Todd R. Andel, William B. Glisson, and Samuel Russ.

Investigating 3D Printer Residual Data
Proceedings of the 52nd Hawaii International Conference on System Sciences (HICSS-52), Grand Wailea Maui, HI, January 3-8, 2019
Daniel Miller, Brad Glisson, J. Todd McDonald, and Mark Yampolskiy.

Leave It to Weaver
Proceedings of the 8th Software Security, Protection, and Reverse Engineering Workshop, San Juan, Puerto Rico, December 3-4, 2018
William Mahoney, Joseph Franco, Greg Hoff, and Jeffrey McDonald.

Towards Protection Mechanisms for Secure and Efficient CAN Operation
Proceedings of the 37th IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV, January 11-13, 2019
Todd R Andel, Jeffrey Todd McDonald, Adam Brown, Tyler Trigg, Paul Carsten.

Android Malware Detection Using Step-Size Based Multi-layered Vector Space Models
Proceedings of the 13th IEEE International Conference on Malicious and Unwanted Software (MALCON 2018), Nantucket, MA, October 22-24, 2018
Colby Parker, J. Todd McDonald, Tom Johnsten, and Ryan Benton.

Digital Blues: An Investigation into the Use of Bluetooth Protocols
Proceedings of the 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-18), New York City, NY, July 31 - August 3, 2018
William B. Ledbetter, William B. Glisson, J. Todd McDonald, Todd R. Andel, George Grispos, and Kim-Kwang Raymond Choo.

Hypergraphs in Phase Space: A New Method for Predicting Epileptic Seizures
Proceedings of the IEEE SoutheastCon 2018, St. Petersburg, FL, April 19-22, 2018
Patrick Luckett, Elena Pavelescu, J. Todd McDonald, Lee M. Hively, and Juan Ochoa.

CAN Authorization Using Message Priority Bit-Level Access Control
Proceedings of the International Conference on Data Intelligence & Security (ICDIS-2018), April 8-10, 2018.
Adam Brown, Todd R. Andel, Mark Yampolskiy, J. Todd McDonald.

Enhancing Security against Software Attacks with Reprogrammable Hardware
Proceedings of the International Conference on Data Intelligence & Security (ICDIS-2018), April 8-10, 2018
Todd R. Andel, Lindsey N. Whitehurst, Jeffrey T. McDonald, and Waleed Al-Assadi.

Phase Space Detection of Virtual Machine Cyber Events through Hypervisor-level System Call Analysis
Proceedings of the International Conference on Data Intelligence & Security (ICDIS-2018), April 8-10, 2018, doi: 10.1109/ICDIS.2018.00034
Joel A. Dawson, J. Todd McDonald, Lee Hively, Todd R. Andel, Mark Yampolskiy and Charles Hubbard.

Evaluating Optimal Phase Ordering in Obfuscation Executives
Proceedings of the 7th Software Security, Protection, and Reverse Engineering Workshop (SSPREW-7), December 11-12, 2017, Orlando, FL, USA.
William Holder, J. Todd McDonald, and Todd R. Andel.

Rootkit Detection through Phase-Space Analysis of Power Voltage Measurements
Proceedings of the 12th IEEE International Conference on Malicious and Unwanted Software (MALCON 2017), January 16-18, 2018, San Juan, Puerto Rico, USA.
Joel A. Dawson, J. Todd McDonald, Jordan Shropshire, Todd R. Andel, Patrick Luckett, Lee Hively.

MedDevRisk: Risk Analysis Methodology for Networked Medical Devices
Proceedings of the 51st Hawaii International Conference on System Sciences (HICSS-51), January 3-6, 2018, Hilton Waikoloa Village, HI, USA.
Katherine Seale, Jeffrey McDonald, William Glisson, Harold Pardue, and Michael Jacobs.

Enhanced Operating System Protection to Support Digital Forensic Investigations
Proceedings of the 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-17), August 1-4, 2017, Sydney, Australia. doi: 10.1109/Trustcom/BigDataSE/ICESS.2017.296
J. Todd McDonald, Ramya Manikyam, William B. Glisson, Todd R. Andel, and Yuan X. Gu

I Think I CAN
Proceedings of the 12th International Conference on Cyber Warfare and Security - (ICCWS 2017, pp. 67-73, March 2-3, 2017, Dayton, OH, USA. Academic Conferences and Publishing International.
Adam J. Brown, Todd R. Andel, Jeffrey McDonald, and Mark Yampolskiy.

Exploitation and Detection of a Malicious Mobile Application
Proceedings of the 50th Hawaii International Conference on System Sciences (HICSS-50), January 4-7, 2017, Hilton Waikoloa Village, HI, USA
Thanh Nguyen, Jeffrey T. McDonald, and William Bradley Glisson.

Attack-Graph Threat Modeling Assessment of Ambulatory Medical Devices
Proceedings of the 50th Hawaii International Conference on System Sciences (HICSS-50), January 4-7, 2017, Hilton Waikoloa Village, HI, USA.
Patrick H. Luckett, Jeffrey T. McDonald, and William Bradley Glisson.

Comparing Effectiveness of Commercial Obfuscators against MATE Attacks
Proceedings of the 6th Software Security, Protection, and Reverse Engineering Workshop (SSPREW-6), December 5-6, 2016, Los Angeles, CA, ACM. doi: 10.1145/3015135.3015143
Ramya Manikyam, J. Todd McDonald, William R. Mahoney, Todd R. Andel, and Samuel H. Russ.

Buffer Overflow Attack's Power Consumption Signatures
Proceedings of the 6th Software Security, Protection, and Reverse Engineering Workshop (SSPREW-6), December 5-6, 2016, Los Angeles, CA, ACM. doi: 10.1145/3015135.3015141
Samuel Moore, Mark Yampolskiy, Jacob Gatlin, Jeffrey T. McDonald, and Todd R. Andel.

Improving Penetration Testing Methodologies for Security-Based Risk Assessment
Cybersecurity Symposium: Your Security, Your Future 2016: Edited Proceedings Volume, 18-20 April 2016, Coeur d'Alene, ID, USA. IEEE, 2017. doi: 10.1109/CYBERSEC.2016.016
Joel Dawson and J. Todd McDonald.

Neural Network Analysis of System Call Timing for Rootkit Detection
Cybersecurity Symposium: Your Security, Your Future 2016: Edited Proceedings Volume, 18-20 April 2016, Coeur d'Alene, ID, USA. IEEE, 2017. doi: 10.1109/CYBERSEC.2016.008
Patrick Luckett, J. Todd McDonald, and Joel Dawson.

Vulnerability Analysis of Desktop 3D Printer Software
Proceedings of the International Symposium on Resilient Cyber Systems, 16-18 Aug. 2016, Resilience Week (RWS), 2016, IEEE. doi: 10.1109/RWEEK.2016.7573305
Samuel Moore, Phillip Armstrong, Jeffrey T. McDonald, and Mark Yampolskiy.

The Application of Moving Target Defense to Field Programmable Gate Arrays
Proceedings of the 11th Annual Cyber and Information Security Research Conference (CISR), April 5-7, 2016, Oak Ridge, TN, ACM. doi: 10.1145/2897795.2897820
John Dombrowski, Todd R. Andel, and J. Todd McDonald.

Seizure Detection via Distance Traversal of Phase-Space Graphs
Late-Breaking Papers, poster, IEEE International Conference on Biomedical and Health Informatics (BHI), February 24-27, 2016, Las Vegas, NV
Patrick Luckett, J. Todd McDonald, Lee M. Hively.

A Method for Developing Abuse Cases and Its Evaluation
Proceedings of ICSIE 2016 5th International Conference on Software and Information Engineering, May 11-13, 2016, Tokyo, Japan.
Imano Williams, Xiaohong Yuan, Jeffrey McDonald, and Mohd Anwar.

Polymorphic Functions for Intellectual Property Protection
Best Poster Award, Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust (HOST 2016), May 5-7, 2016, McLean, VA, USA
J. Todd McDonald, Yong C. Kim, Todd R. Andel, James McVicar, and Mile Forbes.

Utilizing the Cloud to Store Camera Hijacked Images
Proceedings of Hawaii International Conference on System Sciences (HICSS-49), January 4-7, 2017, Kauai, Hawaii, IEEE Publishing, 2017. doi: 10.1109/HICSS.2016.679
C. Kynigos, W.B. Glisson, T.R. Andel, and J.T. McDonald.

Security in Agile Development: Pedagogic Lessons from an Undergraduate Software Engineering Case Study
Communications in Computer and Information Science: Cyber Security, vol. 589, pp. 127-141, 8 January, 2016, Springer. doi: 10.1007/978-3-319-28313-5_9
J. Todd McDonald, Tyler H. Trigg, Clifton E. Roberts, and Blake J. Darden.

A System to Recognize Intruders in Controller Area Network (CAN)
Proceedings of 3rd International Symposium for ICS and SCADA Cyber Security Research (ICS-CSR 2015), Ingolstadt, Germany, 17-18 September, 2015. doi: 10.14236/ewic/ICS2015.15
Paul Carsten, Todd R. Andel, Mark Yampolskiy, Jeffrey T. McDonald, and Samuel Russ.

Compromising a Medical Mannequin
Proceedings of 21st Americas Conference on Information Systems (AMCIS 2015), Puerto Rico, 13-15 August, 2015.
William B. Glisson, Todd Andel, Todd McDonald, Mike Jacobs, Matt Campbell, Johnny Mayr.

In-Vehicle Networks: Attacks, Vulnerabilities, and Proposed Solutions
Proceedings of 2015 Cyber and Information Security Research Conference (CISR '15), Oak Ridge, TN, 7-9 April 2015, Article 1, ACM. doi: 10.1145/2746266.2746267
Paul Carsten, Todd R. Andel, Mark Yampolskiy, and Jeffrey T. McDonald.

Probing the Limits of Virtualized Software Protection
Proceedings of the 4th Program Protection and Reverse Engineering Workshop (PPREW-4), New Orleans, LA, 9 December 2014. ACM Publishing. doi: 10.1145/2689702.2689707
Joshua Cazalas, J. Todd McDonald, Todd R. Andel, Natalia Stakhanova.

Intellectual Property Protection in Additive Layer Manufacturing: Requirements for Secure Outsourcing
Proceedings of the 4th Program Protection and Reverse Engineering Workshop (PPREW-4), New Orleans, LA, 9 December 2014. ACM Publishing. doi: 10.1145/2689702.2689709
Mark Yampolskiy, Todd R. Andel, J. Todd McDonald, William B. Glisson, Alec Yasinsac.

Software Security and Randomization through Program Partitioning and Circuit Variation
Proceedings of 1st Workshop on Moving Target Defense (MTD 2014), Scottsdale, Arizona, November 3, 2014. ACM Publishing. doi: 10.1145/2663474.2663484
Todd R. Andel, Lindsey N. Whitehurst, and J. Todd McDonald.

Exploring Security in ZigBee Networks
Proceedings of 2014 Cyber and Information Security Research Conference (CISR '14), Oak Ridge, TN, 8-10 April 2014. ACM Publishing. doi: 10.1145/2602087.2602090 (Best Paper Award)
Lindsey N. Whitehurst, Todd R. Andel, and J. Todd McDonald.

Analysis and Categorical Application of LSB Steganalysis Techniques
Proceedings of 9th International Conference on Cyber Warfare and Security (ICCWS-2014), 24-25 March, 2014, Purdue University, West Lafayette, Indiana, USA.
Joshua R. Cazalas, Todd R. Andel, and J. Todd McDonald.

A Systems Approach to Cyber Assurance Education
Proceedings of the Information Security Curriculum Development Conference (INFOSECCD 2013), October 11-12, 2013, Kennesaw, GA, USA, ACM Publishing. doi: 10.145/ 2528908.2528920
Todd R. Andel and J. Todd McDonald.

Forewarning of Epileptic Events from Scalp EEG
Proceedings of the ORNL Biomedical Science and Engineering Center Conference (BSEC 2013), May 21-23, 2013, Oak Ridge National Laboratory.
Lee M. Hively, J. Todd McDonald, Nancy Munro, Emily Cornelius. (pdf)

Developing a Power Measurement Framework for Cyber Defense
Proceedings of the 8th Cyber Security and Information Intelligence Workshop (CSIIRW-2012), January 2013, Oak Ridge National Laboratory.
Jarilyn M. Hernández, Line Pouchard, J. Todd McDonald. (pdf)

Theorem-Based, Data-Driven, Cyber Event Detection
Poster, Proceedings of the 8th Cyber Security and Information Intelligence Workshop (CSIIRW-2012), January 2013, Oak Ridge National Laboratory.
Lee M. Hively and J. Todd McDonald. (pdf)

Application Security Models for Mobile Agent Systems
Electronic Notes in Computer Science, vol. 157, no. 3, 25 May 2006, pp. 43-59.
J. Todd McDonald and A. Yasinsac. (pdf)

Hybrid Approach for Secure Mobile Agent Computations
Lecture Notes in Computer Science, vol. 4074, Sept. 20-22, 2005, Springer-Verlag, pp. 38-53.
J. Todd McDonald. (pdf)

Evaluating Component Hiding Techniques in Circuit Topologies
International Conference on Communications, Communication and Information Systems Security Symposium (ICC-CISS-2012), June 10-15, 2012, Ottawa, Canada
J. Todd McDonald, Yong C. Kim, Daniel Koranek, James D. Parham. (pdf)

Examining Tradeoffs for Hardware-Based Intellectual Property Protection
Proceedings of the 7th International Conference on Information Warfare (ICIW-2012), March 22-23, 2012, University of Washington, Seattle, USA.
J. Todd McDonald and Yong C. Kim. (pdf)

Deterministic Circuit Variation for Anti-Tamper Applications
Proceedings of the Cyber Security and Information Intelligence Research Workshop (CSIIRW ’11), October 12-14, 2011, Oak Ridge, TN, USA.
J. Todd McDonald, Yong C. Kim, Daniel Koranek. (pdf) (slides)

Hiding Circuit Components Using Boundary Blurring Techniques
Proceedings of the IEEE Annual Symposium on VLSI (ISVLSI10), Jul. 5-7, 2010, Lixouri, Cephalonia, Greece.
James D. Parham, Yong C. Kim, J. Todd McDonald, and Michael Grimaila. (pdf)

A Java based Component Identification Tool for Measuring the Strength of Circuit Protections
Proceedings of the of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research, (eds.) Sheldon, F.T. et al., Apr. 21-23, 2010, Oak Ridge, Tennessee, USA.
James D. Parham, J. Todd McDonald, Michael R. Grimaila, Yong C. Kim. (pdf) (slides)

An Application of Deception in Cyberspace: Operating System Obfuscation.
Proceedings of the 5th International Conference on Information Warfare and Security, 8-9 April 2010, The Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, USA.
Sherry B. Murphy, J. Todd McDonald, and Robert F. Mills. (pdf)

Using Logic-Based Reduction for Adversarial Component Recovery
Proceedings of the 25th ACM Symposium on Applied Computing, March 2010, Sierre, Switzerland.
J. Todd McDonald, Eric D. Trias, Yong C. Kim, and Michael R. Grimaila. (pdf) (slides)

Protecting Reprogrammable Hardware with Polymorphic Circuit Variation
Proceedings of the 2nd Cyberspace Research Workshop, June 2009, Shreveport, Louisiana, USA.
J. Todd McDonald, Yong C. Kim, and Michael R. Grimaila. (pdf) (slides)

Developing Systems for Cyber Situational Awareness
Proceedings of the 2nd Cyberspace Research Workshop 2009, June 2009, Shreveport, Louisiana, USA.
James S. Okolica, J. Todd McDonald, Gilbert L. Peterson, Robert F. Mills, and Michael W. Haas. (pdf) (slides)

Increasing Stability and Distinguishability of the Digital Fingerprint in FPGAs Through Inputword Analysis
Proceedings of the IEEE International Conference on Field Programmable Logic and Applications (FPL 09), Aug 31-Sep 2, 2009, Prague, Czech Republic.
Hiren Patel, Yong C. Kim, J. Todd McDonald, LaVern Starman. (pdf)

Dynamic polymorphic reconfiguration for anti-tamper circuits
Proceedings of the IEEE International Conference on Field Programmable Logic and Applications (FPL 09), Aug 31-Sep 2, 2009, Prague, Czech Republic.
Roy Porter, Samuel J. Stone, Yong C. Kim, J. Todd McDonald, LaVern A. Starman. (pdf)

Analyzing Functional Entropy of Software-Based Intent Protection Schemes
Proceedings of the 4th International Conference on Information Warfare and Security, 26-27 March 2009, University of Cape Town, South Africa.
J. Todd McDonald, Eric D. Trias, and Alan C. Lin. (pdf) (slides)

Creating digital fingerprints on commercial field programmable gate arrays
Proceedings of the IEEE International Conference on Field Programmable Technology (ICFPT 2008), ICECE Technology, December 2008, Taipei, Taiwan, pp. 345-348.
James Crouch, Hiren Patel, Yong C Kim, J. Todd McDonald, Tony C. Kim. (pdf)

Practical Methods for Software Security Education
National Science Foundation Faculty Workshop on Secure Software Development, April 14-15, 2008, Orlando, FL.
J. Todd McDonald, Stuart H. Kurkowski, Richard A. Raines, Robert W. Bennington. (pdf)

Developing a Requirements Framework for Cybercraft Trust Evaluation
Proceedings of the 3rd International Conference on Information Warfare and Security, 24-25 April 2008, Peter Kiewit Institute, University of Nebraska Omaha, USA.
J. Todd McDonald and Shannon Hunt. (pdf) (slides)

Towards Working With Small Atomic Functions
Proceedings of the Fifteenth International Workshop on Security Protocols, (eds.) Christianson, B. et al., Springer Verlag, 18-20 April 2007, Brno, Czech Republic, pp. 191-200.
Alec Yasinsac and J. Todd McDonald. (pdf)

Applications for Provably Secure Intent Protection with Bounded Input-Size Programs
Proceedings of the International Conference on Availability, Reliability and Security (ARES 2007), April 10-13, 2007. (28% acceptance rate, 60/212).
J. Todd McDonald and Alec Yasinsac. (pdf)

Program Intent Protection Using Circuit Encryption
Proceedings of the 8th International Symposium on System and Information Security, Sao Jose dos Campos, Sao Paulo, Brazil, November 8-10, 2006. (29% acceptance rate, 40/140).
J. Todd McDonald and Alec Yasinsac. (pdf)

Foundations for Security Aware Software Development Education
Proceedings of the Hawaii International Conference on System Sciences (HICSS'05), January 4-7, 2006.
Alec Yasinsac and J. Todd McDonald. (pdf)

Of Unicorns and Random Programs
Proceedings of the 3rd IASTED International Conference on Communications and Computer Networks (IASTED/CCN), October 24-26, 2005, Marina del Rey, CA.
Alec Yasinsac and J. Todd McDonald,. (pdf)

Mobile Agent Data Integrity Using Multi-agent Architecture
Proceedings of the International Workshop on Security in Parallel and Distributed Systems (PDCS 2004), 14-17 September 2004, San Francisco, CA.
J. Todd McDonald, A. Yasinsac, W. Thompson. (pdf)

Semantic Encryption Transformation Scheme
Proceedings of the International Workshop on Security in Parallel and Distributed Systems (PDCS 2004), 14-17 September 2004, San Francisco, CA.
W. Thompson, A. Yasinsac, J. Todd McDonald. (pdf)

Agent-Based Architecture for Modeling and Simulation Integration
Proceedings of the National Aerospace & Electronics Conference (NAECON 2000), Oct 2000, Dayton, OH. (2nd Place Best Paper for NAECON 2000 in the Student Award Category).
J. Todd McDonald and M. Talbert. (pdf)

Heterogeneous Database Integration Using Agent-Oriented Information Systems
Proceedings of the International Conference on Artificial Intelligence (IC-AI-2000), Jun 2000, Las Vegas, NV.
J. Todd McDonald, M. Talbert, and S. Deloach. (pdf)

Editorials


Editor, Special Issue on Cyber Modeling and Simulation
Journal of Defense Modeling and Simulation: Applications, Methodology, Technology, vol. 14, no. 3, pp. 197-199, July 2017. SAGE Publishing, DOI: 10.1177/1548512917699729
J. Todd McDonald, Todd R. Andel, Mikel D. Petty

Editor, Proceedings of the 6th Software Security, Protection, and Reverse Engineering Workshop (SSPREW-6)
December 5-6, 2016, Los Angeles, California, USA, ACM Publishing, ISBN: 978-1-4503-4841-6
Mila Dalla Preda, Natalia Stakhanova, and Jeffrey Todd McDonald.

Editor, Proceedings of the 5th Program Protection and Reverse Engineering Workshop (PPREW-5)
December 8, 2015, Los Angeles, California, USA, ACM Publishing, ISBN: 978-1-4503-3642-0
Jeffrey Todd McDonald, Mila Dalla Preda, and Natalia Stakhanova.

Editor, Proceedings of the 4th Program Protection and Reverse Engineering Workshop (PPREW-4)
December 9, 2014, New Orleans, LA, USA, ACM Publishing, ISBN: 978-1-60558-637-3.
Mila Dalla Preda and Jeffrey Todd McDonald.

Editor, Proceedings of the 3rd ACM SIGPLAN Program Protection and Reverse Engineering Workshop (PPREW-2014)
January 26, 2014, San Diego, CA, USA, ACM Publishing, ISBN: 978-1-4503-2649-0.
J. Todd McDonald, Mila Dalla Preda, Arun Lakhotia, and Roberto Giacobazzi.

Introduction to the Special Issue on Cyber Security and Management
No. 4, Inf Syst E-Bus Manage (2012) 10: 429-431. doi: 10.1007/s10257-012-0204-x Springer.
Frederick T. Shelton and J. Todd McDonald

Editor, Proceedings of the 2nd ACM SIGPLAN Program Protection and Reverse Engineering Workshop (PPREW-2013)
January 25, 2013, Rome, Italy, ACM Publishing, ISBN: 978-1-4503-1857-0.
J. Todd McDonald and Mila Dalla Preda

Editor, Special Issue on Cyber Defense - Methodologies and Techniques for Evaluation
Journal of Defense Modeling and Simulation: Applications, Methodology, Technology, online: Oct 2011, in press: Oct 2012
J. Todd McDonald and Eric D. Trias (pdf)




bottom