Jason L. Wright, principal

Before forming Thought Networks LLC, Mr. Wright was a cyber security researcher at the Idaho National Laboratory, a kernal developer for NFR Security (now CheckPoint IPS-1), and a software engineer at the University of Pennsylvania. Jason was an active OpenBSD developer from 1998 - 2007 (3445 commits), where he was in charge of the port of OpenBSD to SPARC64 and wote many kernal device drivers (serial, parallel, ethernet, IDE, video, keyboard, etc.) for a wide range of busses: SBus, PCI, USB, IDE, etc. Jason has participated in the DefCon Capture The Flag contest on various teams.

» Feb 4, 2016

Logo Design Contest

Thought Networks is holding a design contest to design a new logo.
We're currently accepting new designs on 99designs.com. In a few days
we'll open a survey and solicit opinions about which logo to choose. Stay tuned!

» Apr 29, 2014

Thesis Defense

Looks like I'm on the schedule to defend my thesis on Thursday May 1, 2014 in the CAES auditorium at
2:00pm local. Wish me luck. Here's a copy if you want to play along.

» Jul 18, 2012

Lilliefors exponentiality test in R

Looks like I'm on the schedule to defend my thesis on Thursday May 1, 2014 in the CAES auditorium at
2:00pm local. Wish me luck. Here's a copy if you want to play along.

» Feb 9, 2012

IEEE and ACM library feeds

Looks like I'm on the schedule to defend my thesis on Thursday May 1, 2014 in the CAES auditorium at
2:00pm local. Wish me luck. Here's a copy if you want to play along. I am finally dragging my self out of the dark ages and starting to use RSS. My real reason for doing so is to try to keep up with publications from various groups. In particular, I really want a feed from various large publishers (eg. ACM and IEEE) that notifies me when an interesting (to me) journal or conference proceeding is available.

» Jun 6, 2011

New Telescope

I am an amateur astronomer (heavy emphasis on the amateur). My wife and I went shopping the other day at a local “variety” store (it’s more of a pawn or consignment shop). Anyway, while meandering through the junk piles, we spotted a Meade ETX-70AT with a $50 price tag.

Publications

“Software Vulnerabilities: Lifespans, Metrics, And Case Study”. J. Wright. Master’s thesis. University of Idaho. May 2014.


“Estimating Software Vulnerabilities: A Case Study Based on the Misclassification of Bugs in MySQL Server”. J. Wright, J. Larsen, M. McQueen. In Proceedings International Conference of Availability, Reliability, and Security (ARES). September 2013. pp. 72-81. Regensburg, Germany. [doi].


“Analyses of Two End-User Software Vulnerability Exposure Metrics (Extended Version)” J. Wright, M. McQueen, L. Wellman. Information Security Technical Report, 17(4), Elsevier. April 2013. pp. 44-55. [doi].


“Analyses of Two End-User Software Vulnerability Exposure Metrics”. J. Wright, M. McQueen, L. Wellman. In Proceedings International Conference of Availability, Reliability, and Security (ARES). August 2012, Prague, Czech Republic. [doi].


“Mining Bug Databases for Unidentified Software Vulnerabilities”. D. Wijayasekara, M. Manic, J. Wright, and M. McQueen. In Proceedings International Conference on Human System Interactions (HSI). June 2012, Perth, Australia. [doi].


“Are Vulnerability Disclosure Deadlines Justified?”. M. McQueen, J. Wright, and L. Wellman. In Proceedings International Workshop on Security Measurements and Metrics (METRISEC), September 2011, Banff, Alberta, Canada. [doi].


“Concept of operations for data fusion visualization” T. McJunkin, R. Boring, M. McQueen, L. Shunn, J. Wright, D. Gertman, O. Linda, K. McCarty, and M. Manic. Advances in Safety, Reliability, and Risk Management. ESREL 2011, CRC Press. September, 2011. Troyes, France. pp. 634-640. [doi].


“Fuzzy Logic Based Anomaly Detection for Embedded Network Security Cyber Sensor” Ondrej Linda, Milos Manic, Todd Vollmer, and Jason Wright. In Proceedings IEEE Symposium Series on Computational Intelligence, April 2011, Paris, France. [doi].


“Neural Network Architecture Selection Analysis With Application to Cryptography Location” Jason L. Wright and Milos Manic. In Proceedings International Joint Conference on Neural Networks (IJCNN), July 2010, Barcelona, Spain. [doi].


“The Analysis of Dimensionality Reduction Techniques in Cryptographic Object Code Classification” Jason L. Wright and Milos Manic. In Proceedings Conference on Human Systems Interaction (HSI), pp. 157-162, May 2010, Rzeszow, Poland. [doi].


“Neural Network Approach to Locating Cryptography in Object Code” Jason L. Wright and Milos Manic. In Proceedings International Conference on Emerging Technologies and Factory Automation (ETFA), September 2009, Palma de Mallorca, Spain. [doi].


“Time Synchronization in Heirarchical TESLA Wireless Sensor Networks” Jason L. Wright and Milos Manic. In Proceedings International Symposium on Resilient Control Systems (ISRCS), pp. 36-39, August 2009, Idaho Falls, ID, USA. [doi].


“Finding Cryptography in Object Code” Jason L. Wright. In Proceedings Security Education Conference: Toronoto (SECTOR). October 2008, Toronto, ON, Canada. (slides).


“Recommended Practice for Security Control System Modems” James R. Davidson and Jason L. Wright. U.S. Department of Homeland Security National Cyber Security Division, Control Systems Security Program. January 2008.


“Cryptography As An Operating System Service: A Case Study” Angelos D. Keromytis, Theo de Raadt, Jason L. Wright, and Matthew Burnside. In ACM Transactions on Computer Systems (ToCS), vol. 24, no. 1, pp. 1 - 38, February 2006. (Extended version of USENIX Technical 2003 paper). [doi].


“The Design of the OpenBSD Cryptographic Framework” Angelos D. Keromytis, Jason L. Wright, and Theo de Raadt. In Proceedings of the USENIX Annual Technical Conference, pp. 181 - 196. June 2003, San Antonio, TX. (Acceptance rate: 23.3%)


“Experiences Enhancing Open Source Security in the POSSE Project” Jonathan M. Smith, Michael B. Greenwald, Sotiris Ioannidis, Angelos D. Keromytis, Ben Laurie, Douglas Maughan, Dale Rahn, and Jason L. Wright. In Free/Open Source Development, Stefan Koch (editor), pp. 242 - 257. Idea Group Publishing, 2004. [doi]. Also re-published in Global Information Technologies: Concepts, Methodologies, Tools, and Applications, Felix B. Tan (editor), pp. 1587- 1598. Idea Group Publishing, 2007. [doi].


“Transparent Network Security Policy Enforcement” Angelos Keromytis and Jason Wright. In Proceedings of the USENIX Annual Technical Conference, Freenix Track, pp. 215 - 226. June 2000, San Diego, CA. (Acceptance rate: 30%).


Patent

    Method and system for providing secure one-way transfer of data. US Patent 8,250,235, Aug 21, 2012.


Presentations