SPERG Publications
The below are the publications related to System Protection and Exploitation Research Group:
J. Todd McDonald, Mila Dalla Preda+, editors, Proceedings of the 4th Program Protection and Reverse Engineering Workshop (PPREW-4), December 14, 2014, New Orleans, LA, ACM Publishing, ISBN: 978-1-4503-2649-0.
Mark Yampolskiy, Todd R. Andel, J. Todd McDonald, William B. Glisson, and Alec Yasinsac, 鈥淭owards Security of Additive Layer Manufacturing,鈥 Work In Progress, Annual Computer Security Applications Conference (ACSAC 2014), New Orleans, LA, presented December 2014.
J. Todd McDonald and Todd R. Andel, 鈥淧rogram Partitioning and Polymorphic Functions: A Two-Pronged Approach for Program Protection Research,鈥 Software Security and Protection Workshop (SSP鈥14), Phoenix, Arizona, November 7, 2014.
J. Todd McDonald and Lee M. Hively+, 鈥淢ultidisciplinary Approaches for Cyber Security,鈥 accepted for publication, National Cybersecurity Institute's Journal, vol. II, August 2014.
Joshua R. Cazalas*, Todd R. Andel, and J. Todd McDonald, 鈥淎nalysis and Categorical Application of LSB Steganalysis Techniques,鈥 accepted for publication, The Journal of Information Warfare, July 2014.
Todd R. Andel, John Barron*, J. Todd McDonald, and Jeffrey W. Humphries+, 鈥淩SA Power Analysis Obfuscation: A Dynamic Algorithmic Hardware Countermeasure,鈥 International Journal of 成人快播 & Digital Systems, May 2014, vol. 3, no. 2, pp. 69-78.
Todd R. Andel, Austin Fritzke*, Jeffrey W. Humphries+, and J. Todd McDonald, 鈥淒esign and Implementation of Hiding Techniques to Obfuscate Against Side-Channel Attacks on AES,鈥 International Journal of 成人快播 & Network Technology, May 2014, vol. 2, no. 2, pp. 65-72.
Lindsey N. Whitehurst, Todd R. Andel, and J. Todd McDonald, 鈥淓xploring Security in ZigBee Networks,鈥 In Proceedings of 2014 Cyber and Information Security Research Conference (CISR 鈥14), Oak Ridge, TN, 8-10 April 2014. ACM Publishing. doi: 10.1145/2602087.2602090 (Best Paper Award).
Joshua R. Cazalas*, Todd R. Andel, and J. Todd McDonald, 鈥淎nalysis and Categorical Application of LSB Steganalysis Techniques,鈥 accepted, 9th International Conference on Cyber Warfare and Security (ICCWS-2014), 24-25 March, 2014, Purdue University, West Lafayette, Indiana, USA.
J. Todd McDonald, Mila Dalla Preda+, Arun Lakhotia+, Roberto Giocabazzi+, editors, Proceedings of the 3rd ACM SIGPLAN Program Protection and Reverse Engineering Workshop (PPREW 鈥14), January 26, 2014, San Diego, CA, ACM Publishing, ISBN: 978-1-4503-2649-0.
Todd R. Andel, Lindsey N. Whitehurst, and J. Todd McDonald, 鈥淪oftware Security and Randomization through Program Partitioning and Circuit Variation,鈥 In Proceedings of 1st Workshop on Moving Target Defense (MTD 2014), Scottsdale, Arizona, November 3, 2014. ACM Publishing.
William S. Ashbee*, Lee M. Hively+, J. Todd McDonald (2014), 鈥淣onlinear Epilepsy Forewarning by Support Vector Machines,鈥 Chapter 3 in Epilepsy Topics, M.D. Holmes ed. (InTech publ., Croatia) 2014 (ISBN 978-953-51-1630-1). Online: http://cdn.intechopen.com/pdfs-wm/46250.pdf.
Todd R. Andel and J. Todd McDonald, 鈥淎 Systems Approach to Cyber Assurance Education,鈥 in Proceedings of the Information Security Curriculum Development Conference (INFOSECCD 2013), October 11-12, 2013, Kennesaw, GA, USA, ACM Publishing. doi: 10.145/ 2528908.2528920.
Lee M. Hively+, J. Todd McDonald, Nancy Munro+, and Emily Cornelius+, 鈥淔orewarning of Epileptic Events from Scalp EEG,鈥 in Proceedings of the ORNL Biomedical Science and Engineering Center Conference (BSEC 2013), May 21-23, 2013, Oak Ridge National Laboratory, pp. 1-4. doi: 10.1109/BSEC.2013.6618498.
Jarilyn M. Hern谩ndez*, Line Pouchard+, and J. Todd McDonald, 鈥淒eveloping a Power Measurement Framework for Cyber Defense,鈥 in Proceedings of the 8th Cyber Security and Information Intelligence Workshop, January 2013, Oak Ridge National Laboratory, ACM Publishing. doi: 10.1145/2459976.2460008.
Lee M. Hively+ and J. Todd McDonald, 鈥淭heorem-Based, Data-Driven, Cyber Event Detection,鈥 in Proceedings of the 8th Cyber Security and Information Intelligence Workshop, January 2013, Oak Ridge National Laboratory, ACM Publishing. doi: 10.1145/2459976.2460041.
J. Todd McDonald and Mila Dalla Preda+, editors, Proceedings of the 2nd ACM SIGPLAN Program Protection and Reverse Engineering Workshop (PPREW 鈥13), January 25, 2013, Rome, Italy, ACM Publishing, ISBN: 978-1-4503-1857-0.
J. Todd McDonald and Todd R. Andel, 鈥淚ntegrating Historical Security Jewels in Information Assurance Education,鈥 IEEE Security & Privacy, Special Issue: Lost Treasures, vol. 10, no. 6, Nov/Dec. 2012, pp. 45-50. doi: 10.1109/MSP.2012.86.
J. Todd McDonald and Eric D. Trias, editors, Journal of Defense Modeling and Simulation: Applications, Methodology, Technology, Special Issue on Cyber Defense - Methodologies and Techniques for Evaluation, July 2012; 9 (3), pp. 193-194, Sage Publishers, doi: 10.1177/1548512911425125.
Frederick T. Shelton+ and J. Todd McDonald, 鈥淚ntroduction to the special issue on cyber security and management,鈥 No. 4, Inf Syst E-Bus Manage (2012) 10: 429-431. doi: 10.1007/s10257-012-0204-x Springer.
J. Todd McDonald, 鈥淐apturing the Essence of Practical Obfuscation,鈥 Proceedings of the 6th International Conference on Information Systems, Technology, and Management (ICISTM'12), Program Protection and Reverse Engineering Workshop (PPREW), (eds.) Dua, S. et al., pp. 451-456, Springer. doi: 10.1007/978-3-642-29166-1_44.
J. Todd McDonald, Yong C. Kim, Daniel Koranek*, and James D. Parham*, 鈥淓valuating Component Hiding Techniques in Circuit Topologies,鈥 in Proceedings of the International Conference on Communications, Communication and Information Systems Security Symposium (ICC-CISS-2012), June 10-15, 2012, Ottawa, Canada, pp. 1138-1143. doi: 10.1109/ICC.2012.6364542.
J. Todd McDonald and Yong C. Kim, 鈥淓xamining Tradeoffs for Hardware-Based Intellectual Property Protection,鈥 in Proceedings of the 7th International Conference on Information Warfare (ICIW-2012), March 22-23, 2012, University of Washington, Seattle, USA.
J. Todd McDonald, Yong C. Kim, and Daniel Koranek*, 鈥淒eterministic Circuit Variation for Anti-Tamper Applications,鈥 in Proceedings of the Cyber Security and Information Intelligence Research Workshop (CSIIRW 鈥11), October 12-14, 2011, Oak Ridge, TN, USA. doi: 10.1145/2179298.2179376.
James D. Parham*, J. Todd McDonald, Michael R. Grimaila, and Yong C. Kim, 鈥淎 Java based Component Identification Tool for Measuring the Strength of Circuit Protections,鈥 in Proceedings of the of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research, (eds.) Sheldon, F.T. et al., Apr. 21-23, 2010, Oak Ridge, Tennessee, USA. doi: 10.1145/1852666.1852695.
Sherry B. Murphy*, J. Todd McDonald, and Robert F. Mills. 鈥淎n Application of Deception in Cyberspace: Operating System Obfuscation,鈥 in Proceedings of the 5th International Conference on Information Warfare and Security, 8-9 April 2010, The Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, USA, pp. 241-250. Academic Publishing Limited, ISBN: 1906638608.
J. Todd McDonald, Eric D. Trias, Yong C. Kim, and Michael R. Grimaila. 鈥淯sing Logic-Based Reduction for Adversarial Component Recovery,鈥 in Proceedings of the 25th ACM Symposium on Applied 成人快播, March 2010, Sierre, Switzerland, pp. 1993-2000. doi: 10.1145/1774088.1774508.
Yong C. Kim and J. Todd McDonald. 鈥淐onsidering Software Protection for Embedded Systems,鈥 Crosstalk: The Journal of Defense Software Engineering, vol. 22, no. 6, Sept/Oct 2009, pp. 4-8.
Hiren Patel*, Yong C. Kim, J. Todd McDonald, LaVern Starman. 鈥淚ncreasing Stability and Distinguishability of the Digital Fingerprint in FPGAs Through Input word Analysis,鈥 in Proceedings of the IEEE International Conference on Field Programmable Logic and Applications (FPL 09), Aug 31-Sep 2, 2009, Prague, Czech Republic, pp. 391-396. doi: 10.1109/FPL.2009.5272253.
Roy Porter*, Samuel J. Stone*, Yong C. Kim, J. Todd McDonald, LaVern A. Starman. 鈥淒ynamic polymorphic reconfiguration for anti-tamper circuits,鈥 in Proceedings of the IEEE International Conference on Field Programmable Logic and Applications (FPL 09), Aug 31-Sep 2, 2009, Prague, Czech Republic, pp. 493 鈥 497. doi: 10.1109/FPL.2009.5272469.
J. Todd McDonald, Yong C. Kim, and Michael R. Grimaila. 鈥淧rotecting Reprogrammable Hardware with Polymorphic Circuit Variation,鈥 in Proceedings of the 2nd Cyberspace Research Workshop, June 2009, Shreveport, Louisiana, USA.
James S. Okolica*, J. Todd McDonald, Gilbert L. Peterson, Robert F. Mills, and Michael W. Haas+. 鈥淒eveloping Systems for Cyber Situational Awareness,鈥 in Proceedings of the 2nd Cyberspace Research Workshop 2009, June 2009, Shreveport, Louisiana, USA.
J. Todd McDonald, Eric D. Trias, and Alan C. Lin*. 鈥淎nalyzing Functional Entropy of Software-Based Intent Protection Schemes,鈥 in Proceedings of the 4th International Conference on Information Warfare and Security, 26-27 March 2009, University of Cape Town, South Africa, pp. 60-68. Academic Publishing Limited, ISBN: 978-1-906638-27-6.
James Crouch*, Hiren Patel*, Yong C Kim, J. Todd McDonald, Tony C. Kim. 鈥淐reating digital fingerprints on commercial field programmable gate arrays,鈥 in Proceedings of the IEEE International Conference on Field Programmable Technology (ICFPT 2008), December 2008, Taipei, Taiwan, pp. 345-348. doi: 10.1109/FPT.2008.4762414.
Alec Yasinsac and J. Todd McDonald, 鈥淭amper Resistant Software Through Intent Protection,鈥 International Journal of Network Security, vol. 7, no. 3, Nov 2008, pp. 370-382.
J. Todd McDonald, Yong Kim, and Alec Yasinsac+. 鈥淪oftware Issues in Digital Forensics,鈥 ACM SIGOPS OS Review, Special Issue on Forensics, vol. 42, no. 3, April 2008, pp. 29-40. doi: 10.1145/1368506.1368512.