"BP: DECREE A Platform and Benchmark Corpus for Repeatable and Reproducible Security Experiments"
L. Yan, B. Price, M. Zhivich, B. Caswell, C. Eagle, M. Frantzen,
H. Sorenson, M. Thompson, T. Vidas, J. Wright, V. Rivet, S. VanWinkle,
and C. Wood, IEEE Cyber Security Development Conference (SECDEV), September 2018 [doi].
"Operating System Doppelgängers: The Creation of Indistinguishable, Deterministic Environments".
J. Wright, C. Eagle, T. Vidas, BSD Magazine, 12(2), February 2018, ISSN 1898-9144.
"Where am I? Operating System and Virtualization Identification Without System Calls".
J. Wright. In Proceedings Cyber Security Symposium, April 2017. Coeur d'Alene, Idaho, USA. [slides].
“Software Vulnerabilities: Lifespans, Metrics, And Case Study”.
J. Wright. Master’s thesis. University of Idaho. May 2014.
“Estimating Software Vulnerabilities: A Case Study Based on the Misclassification of Bugs in MySQL Server”.
J. Wright, J. Larsen, M. McQueen. In Proceedings International Conference of Availability, Reliability, and Security (ARES). September 2013. pp. 72-81. Regensburg, Germany. [doi].
“Analyses of Two End-User Software Vulnerability Exposure Metrics (Extended Version)”
J. Wright, M. McQueen, L. Wellman. Information Security Technical Report, 17(4), Elsevier. April 2013. pp. 44-55. [doi].
“Analyses of Two End-User Software Vulnerability Exposure Metrics”.
J. Wright, M. McQueen, L. Wellman. In Proceedings International Conference of Availability, Reliability, and Security (ARES). August 2012, Prague, Czech Republic. [doi].
“Mining Bug Databases for Unidentified Software Vulnerabilities”.
D. Wijayasekara, M. Manic, J. Wright, and M. McQueen. In Proceedings International Conference on Human System Interactions (HSI). June 2012, Perth, Australia. [doi].
“Are Vulnerability Disclosure Deadlines Justified?”.
M. McQueen, J. Wright, and L. Wellman. In Proceedings International Workshop on Security Measurements and Metrics (METRISEC), September 2011, Banff, Alberta, Canada. [doi].
“Concept of operations for data fusion visualization”
T. McJunkin, R. Boring, M. McQueen, L. Shunn, J. Wright, D. Gertman, O. Linda, K. McCarty, and M. Manic. Advances in Safety, Reliability, and Risk Management. ESREL 2011, CRC Press. September, 2011. Troyes, France. pp. 634-640. [doi].
“Fuzzy Logic Based Anomaly Detection for Embedded Network Security Cyber Sensor”
Ondrej Linda, Milos Manic, Todd Vollmer, and Jason Wright. In Proceedings IEEE Symposium Series on Computational Intelligence, April 2011, Paris, France.
“Neural Network Architecture Selection Analysis With Application to Cryptography Location”
Jason L. Wright and Milos Manic. In Proceedings International Joint Conference on Neural Networks (IJCNN), July 2010, Barcelona, Spain. [doi].
“The Analysis of Dimensionality Reduction Techniques in Cryptographic Object Code Classification”
Jason L. Wright and Milos Manic. In Proceedings Conference on Human Systems Interaction (HSI), pp. 157-162, May 2010, Rzeszow, Poland. [doi].
“Neural Network Approach to Locating Cryptography in Object Code”
Jason L. Wright and Milos Manic. In Proceedings International Conference on Emerging Technologies and Factory Automation (ETFA), September 2009, Palma de Mallorca, Spain. [doi].
“Time Synchronization in Heirarchical TESLA Wireless Sensor Networks”
Jason L. Wright and Milos Manic. In Proceedings International
Symposium on Resilient Control Systems (ISRCS), pp. 36-39,
August 2009, Idaho Falls, ID, USA. [doi].
“Finding Cryptography in Object Code” Jason L. Wright.
In Proceedings Security Education Conference: Toronoto (SECTOR).
October 2008, Toronto, ON, Canada. (slides).
“Recommended Practice for Security Control System Modems”
James R. Davidson and Jason L. Wright. U.S. Department of Homeland Security National Cyber Security Division, Control Systems Security Program.
“Cryptography As An Operating System Service: A Case Study” Angelos D. Keromytis, Theo de Raadt, Jason L. Wright, and Matthew Burnside. In ACM Transactions on Computer Systems (ToCS), vol. 24, no. 1, pp. 1 - 38, February 2006. (Extended version of USENIX Technical 2003 paper). [doi].
“The Design of the OpenBSD Cryptographic Framework”
Angelos D. Keromytis, Jason L. Wright, and Theo de Raadt. In
Proceedings of the USENIX Annual Technical Conference,
pp. 181 - 196. June 2003, San Antonio, TX.
(Acceptance rate: 23.3%)
“Experiences Enhancing Open Source Security in the POSSE Project”
Jonathan M. Smith, Michael B. Greenwald, Sotiris Ioannidis, Angelos D. Keromytis, Ben Laurie, Douglas Maughan, Dale Rahn, and Jason L. Wright. In Free/Open Source Development, Stefan Koch (editor), pp. 242 - 257. Idea Group Publishing, 2004. [doi].
Also re-published in Global Information Technologies: Concepts, Methodologies, Tools, and Applications, Felix B. Tan (editor),
pp. 1587- 1598. Idea Group Publishing, 2007.
“Transparent Network Security Policy Enforcement”
Angelos Keromytis and Jason Wright. In Proceedings of the
USENIX Annual Technical Conference, Freenix Track,
pp. 215 - 226. June 2000, San Diego, CA.
(Acceptance rate: 30%).
Method and system for providing secure one-way transfer of data.
US Patent 8,250,235, Aug 21, 2012.