Publications


The below are the publications related to System Protection and Exploitation Research Group:

 

http://www.soc.southalabama.edu/malware/images/dotpointerblue.jpg    J. Todd McDonald, Mila Dalla Preda+, editors, Proceedings of the 4th Program Protection and Reverse Engineering Workshop (PPREW-4), December 14, 2014, New Orleans, LA, ACM Publishing, ISBN: 978-1-4503-2649-0.



http://www.soc.southalabama.edu/malware/images/dotpointerblue.jpg    Mark Yampolskiy, Todd R. Andel, J. Todd McDonald, William B. Glisson, and Alec Yasinsac, “Towards Security of Additive Layer Manufacturing,” Work In Progress, Annual Computer Security Applications Conference (ACSAC 2014), New Orleans, LA, presented December 2014.



http://www.soc.southalabama.edu/malware/images/dotpointerblue.jpg    J. Todd McDonald and Todd R. Andel, “Program Partitioning and Polymorphic Functions: A Two-Pronged Approach for Program Protection Research,” Software Security and Protection Workshop (SSP’14), Phoenix, Arizona, November 7, 2014.



http://www.soc.southalabama.edu/malware/images/dotpointerblue.jpg    J. Todd McDonald and Lee M. Hively+, “Multidisciplinary Approaches for Cyber Security,” accepted for publication, National Cybersecurity Institute's Journal, vol. II, August 2014.



http://www.soc.southalabama.edu/malware/images/dotpointerblue.jpg    Joshua R. Cazalas*, Todd R. Andel, and J. Todd McDonald, “Analysis and Categorical Application of LSB Steganalysis Techniques,” accepted for publication, The Journal of Information Warfare, July 2014.



http://www.soc.southalabama.edu/malware/images/dotpointerblue.jpg    Todd R. Andel, John Barron*, J. Todd McDonald, and Jeffrey W. Humphries+, “RSA Power Analysis Obfuscation: A Dynamic Algorithmic Hardware Countermeasure,” International Journal of Computing & Digital Systems, May 2014, vol. 3, no. 2, pp. 69-78.



http://www.soc.southalabama.edu/malware/images/dotpointerblue.jpg    Todd R. Andel, Austin Fritzke*, Jeffrey W. Humphries+, and J. Todd McDonald, “Design and Implementation of Hiding Techniques to Obfuscate Against Side-Channel Attacks on AES,” International Journal of Computing & Network Technology, May 2014, vol. 2, no. 2, pp. 65-72.



http://www.soc.southalabama.edu/malware/images/dotpointerblue.jpg    Lindsey N. Whitehurst, Todd R. Andel, and J. Todd McDonald, “Exploring Security in ZigBee Networks,” In Proceedings of 2014 Cyber and Information Security Research Conference (CISR ’14), Oak Ridge, TN, 8-10 April 2014. ACM Publishing. doi: 10.1145/2602087.2602090 (Best Paper Award).



http://www.soc.southalabama.edu/malware/images/dotpointerblue.jpg    Joshua R. Cazalas*, Todd R. Andel, and J. Todd McDonald, “Analysis and Categorical Application of LSB Steganalysis Techniques,” accepted, 9th International Conference on Cyber Warfare and Security (ICCWS-2014), 24-25 March, 2014, Purdue University, West Lafayette, Indiana, USA.



http://www.soc.southalabama.edu/malware/images/dotpointerblue.jpg    J. Todd McDonald, Mila Dalla Preda+, Arun Lakhotia+, Roberto Giocabazzi+, editors, Proceedings of the 3rd ACM SIGPLAN Program Protection and Reverse Engineering Workshop (PPREW ’14), January 26, 2014, San Diego, CA, ACM Publishing, ISBN: 978-1-4503-2649-0.



http://www.soc.southalabama.edu/malware/images/dotpointerblue.jpg    Todd R. Andel, Lindsey N. Whitehurst, and J. Todd McDonald, “Software Security and Randomization through Program Partitioning and Circuit Variation,” In Proceedings of 1st Workshop on Moving Target Defense (MTD 2014), Scottsdale, Arizona, November 3, 2014. ACM Publishing.



http://www.soc.southalabama.edu/malware/images/dotpointerblue.jpg    William S. Ashbee*, Lee M. Hively+, J. Todd McDonald (2014), “Nonlinear Epilepsy Forewarning by Support Vector Machines,” Chapter 3 in Epilepsy Topics, M.D. Holmes ed. (InTech publ., Croatia) 2014 (ISBN 978-953-51-1630-1). Online: http://cdn.intechopen.com/ pdfs-wm/46250.pdf.



http://www.soc.southalabama.edu/malware/images/dotpointerblue.jpg    Todd R. Andel and J. Todd McDonald, “A Systems Approach to Cyber Assurance Education,” in Proceedings of the Information Security Curriculum Development Conference (INFOSECCD 2013), October 11-12, 2013, Kennesaw, GA, USA, ACM Publishing. doi: 10.145/ 2528908.2528920.



http://www.soc.southalabama.edu/malware/images/dotpointerblue.jpg    Lee M. Hively+, J. Todd McDonald, Nancy Munro+, and Emily Cornelius+, “Forewarning of Epileptic Events from Scalp EEG,” in Proceedings of the ORNL Biomedical Science and Engineering Center Conference (BSEC 2013), May 21-23, 2013, Oak Ridge National Laboratory, pp. 1-4. doi: 10.1109/BSEC.2013.6618498.



http://www.soc.southalabama.edu/malware/images/dotpointerblue.jpg    Jarilyn M. Hernández*, Line Pouchard+, and J. Todd McDonald, “Developing a Power Measurement Framework for Cyber Defense,” in Proceedings of the 8th Cyber Security and Information Intelligence Workshop, January 2013, Oak Ridge National Laboratory, ACM Publishing. doi: 10.1145/2459976.2460008.



http://www.soc.southalabama.edu/malware/images/dotpointerblue.jpg    Lee M. Hively+ and J. Todd McDonald, “Theorem-Based, Data-Driven, Cyber Event Detection,” in Proceedings of the 8th Cyber Security and Information Intelligence Workshop, January 2013, Oak Ridge National Laboratory, ACM Publishing. doi: 10.1145/2459976.2460041.



http://www.soc.southalabama.edu/malware/images/dotpointerblue.jpg    J. Todd McDonald and Mila Dalla Preda+, editors, Proceedings of the 2nd ACM SIGPLAN Program Protection and Reverse Engineering Workshop (PPREW ’13), January 25, 2013, Rome, Italy, ACM Publishing, ISBN: 978-1-4503-1857-0.



http://www.soc.southalabama.edu/malware/images/dotpointerblue.jpg    J. Todd McDonald and Todd R. Andel, “Integrating Historical Security Jewels in Information Assurance Education,” IEEE Security & Privacy, Special Issue: Lost Treasures, vol. 10, no. 6, Nov/Dec. 2012, pp. 45-50. doi: 10.1109/MSP.2012.86.



http://www.soc.southalabama.edu/malware/images/dotpointerblue.jpg    J. Todd McDonald and Eric D. Trias, editors, Journal of Defense Modeling and Simulation: Applications, Methodology, Technology, Special Issue on Cyber Defense - Methodologies and Techniques for Evaluation, July 2012; 9 (3), pp. 193-194, Sage Publishers, doi: 10.1177/1548512911425125.



http://www.soc.southalabama.edu/malware/images/dotpointerblue.jpg    Frederick T. Shelton+ and J. Todd McDonald, “Introduction to the special issue on cyber security and management,” No. 4, Inf Syst E-Bus Manage (2012) 10: 429-431. doi: 10.1007/s10257-012-0204-x Springer.



http://www.soc.southalabama.edu/malware/images/dotpointerblue.jpg    J. Todd McDonald, “Capturing the Essence of Practical Obfuscation,” Proceedings of the 6th International Conference on Information Systems, Technology, and Management (ICISTM'12), Program Protection and Reverse Engineering Workshop (PPREW), (eds.) Dua, S. et al., pp. 451-456, Springer. doi: 10.1007/978-3-642-29166-1_44.



http://www.soc.southalabama.edu/malware/images/dotpointerblue.jpg    J. Todd McDonald, Yong C. Kim, Daniel Koranek*, and James D. Parham*, “Evaluating Component Hiding Techniques in Circuit Topologies,” in Proceedings of the International Conference on Communications, Communication and Information Systems Security Symposium (ICC-CISS-2012), June 10-15, 2012, Ottawa, Canada, pp. 1138-1143. doi: 10.1109/ICC.2012.6364542.



http://www.soc.southalabama.edu/malware/images/dotpointerblue.jpg    J. Todd McDonald and Yong C. Kim, “Examining Tradeoffs for Hardware-Based Intellectual Property Protection,” in Proceedings of the 7th International Conference on Information Warfare (ICIW-2012), March 22-23, 2012, University of Washington, Seattle, USA.



http://www.soc.southalabama.edu/malware/images/dotpointerblue.jpg    J. Todd McDonald, Yong C. Kim, and Daniel Koranek*, “Deterministic Circuit Variation for Anti-Tamper Applications,” in Proceedings of the Cyber Security and Information Intelligence Research Workshop (CSIIRW ’11), October 12-14, 2011, Oak Ridge, TN, USA. doi: 10.1145/2179298.2179376.



http://www.soc.southalabama.edu/malware/images/dotpointerblue.jpg    James D. Parham*, J. Todd McDonald, Michael R. Grimaila, and Yong C. Kim, “A Java based Component Identification Tool for Measuring the Strength of Circuit Protections,” in Proceedings of the of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research, (eds.) Sheldon, F.T. et al., Apr. 21-23, 2010, Oak Ridge, Tennessee, USA. doi: 10.1145/1852666.1852695.



http://www.soc.southalabama.edu/malware/images/dotpointerblue.jpg    Sherry B. Murphy*, J. Todd McDonald, and Robert F. Mills. “An Application of Deception in Cyberspace: Operating System Obfuscation,” in Proceedings of the 5th International Conference on Information Warfare and Security, 8-9 April 2010, The Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, USA, pp. 241-250. Academic Publishing Limited, ISBN: 1906638608.



http://www.soc.southalabama.edu/malware/images/dotpointerblue.jpg    J. Todd McDonald, Eric D. Trias, Yong C. Kim, and Michael R. Grimaila. “Using Logic-Based Reduction for Adversarial Component Recovery,” in Proceedings of the 25th ACM Symposium on Applied Computing, March 2010, Sierre, Switzerland, pp. 1993-2000. doi: 10.1145/1774088.1774508.



http://www.soc.southalabama.edu/malware/images/dotpointerblue.jpg    Yong C. Kim and J. Todd McDonald. “Considering Software Protection for Embedded Systems,” Crosstalk: The Journal of Defense Software Engineering, vol. 22, no. 6, Sept/Oct 2009, pp. 4-8.



http://www.soc.southalabama.edu/malware/images/dotpointerblue.jpg    Hiren Patel*, Yong C. Kim, J. Todd McDonald, LaVern Starman. “Increasing Stability and Distinguishability of the Digital Fingerprint in FPGAs Through Inputword Analysis,” in Proceedings of the IEEE International Conference on Field Programmable Logic and Applications (FPL 09), Aug 31-Sep 2, 2009, Prague, Czech Republic, pp. 391-396. doi: 10.1109/FPL.2009.5272253.



http://www.soc.southalabama.edu/malware/images/dotpointerblue.jpg    Roy Porter*, Samuel J. Stone*, Yong C. Kim, J. Todd McDonald, LaVern A. Starman. “Dynamic polymorphic reconfiguration for anti-tamper circuits,” in Proceedings of the IEEE International Conference on Field Programmable Logic and Applications (FPL 09), Aug 31-Sep 2, 2009, Prague, Czech Republic, pp. 493 – 497. doi: 10.1109/FPL.2009.5272469.



http://www.soc.southalabama.edu/malware/images/dotpointerblue.jpg    J. Todd McDonald, Yong C. Kim, and Michael R. Grimaila. “Protecting Reprogrammable Hardware with Polymorphic Circuit Variation,” in Proceedings of the 2nd Cyberspace Research Workshop, June 2009, Shreveport, Louisiana, USA.


http://www.soc.southalabama.edu/malware/images/dotpointerblue.jpg    James S. Okolica*, J. Todd McDonald, Gilbert L. Peterson, Robert F. Mills, and Michael W. Haas+. “Developing Systems for Cyber Situational Awareness,” in Proceedings of the 2nd Cyberspace Research Workshop 2009, June 2009, Shreveport, Louisiana, USA.



http://www.soc.southalabama.edu/malware/images/dotpointerblue.jpg    J. Todd McDonald, Eric D. Trias, and Alan C. Lin*. “Analyzing Functional Entropy of Software-Based Intent Protection Schemes,” in Proceedings of the 4th International Conference on Information Warfare and Security, 26-27 March 2009, University of Cape Town, South Africa, pp. 60-68. Academic Publishing Limited, ISBN: 978-1-906638-27-6.



http://www.soc.southalabama.edu/malware/images/dotpointerblue.jpg    James Crouch*, Hiren Patel*, Yong C Kim, J. Todd McDonald, Tony C. Kim. “Creating digital fingerprints on commercial field programmable gate arrays,” in Proceedings of the IEEE International Conference on Field Programmable Technology (ICFPT 2008), December 2008, Taipei, Taiwan, pp. 345-348. doi: 10.1109/FPT.2008.4762414.



http://www.soc.southalabama.edu/malware/images/dotpointerblue.jpg    Alec Yasinsac and J. Todd McDonald, “Tamper Resistant Software Through Intent Protection,” International Journal of Network Security, vol. 7, no. 3, Nov 2008, pp. 370-382.


http://www.soc.southalabama.edu/malware/images/dotpointerblue.jpg    J. Todd McDonald, Yong Kim, and Alec Yasinsac+. “Software Issues in Digital Forensics,” ACM SIGOPS OS Review, Special Issue on Forensics, vol. 42, no. 3, April 2008, pp. 29-40. doi: 10.1145/1368506.1368512.




Thursday the 23rd. QualityJoomlaTemplates
Copyright © 2014
USA School of Computing

School of Computing,
Shelby Hall, Room 1121,
3150 Jaguar Drive,
Mobile, AL 36688.

1 (251) 460-7555
University of South Alabama Homepage
ACM
USA Online
Paws
Discovering Web.com
Give to USA
Jag Mail
SOC RSS Feed