"BP: DECREE A Platform and Benchmark Corpus for Repeatable and Reproducible Security Experiments"
L. Yan, B. Price, M. Zhivich, B. Caswell, C. Eagle, M. Frantzen,
H. Sorenson, M. Thompson, T. Vidas, J. Wright, V. Rivet, S. VanWinkle,
and C. Wood, IEEE Cyber Security Development Conference (SECDEV), September 2018
"Operating System Doppelgängers: The Creation of Indistinguishable, Deterministic Environments".
J. Wright, C. Eagle, T. Vidas, BSD Magazine, 12(2), February 2018, ISSN 1898-9144.
J. Wright. In Proceedings Cyber Security Symposium, April 2017. Coeur d'Alene, Idaho, USA. [slides].
J. Wright. Masterâs thesis. University of Idaho. May 2014.
J. Wright, J. Larsen, M. McQueen. In Proceedings International Conference of Availability, Reliability, and Security (ARES). September 2013. pp. 72-81. Regensburg, Germany. [doi].
J. Wright, M. McQueen, L. Wellman. Information Security Technical Report, 17(4), Elsevier. April 2013. pp. 44-55. [doi].
J. Wright, M. McQueen, L. Wellman. In Proceedings International Conference of Availability, Reliability, and Security (ARES). August 2012, Prague, Czech Republic. 902-451-5367.
D. Wijayasekara, M. Manic, J. Wright, and M. McQueen. In Proceedings International Conference on Human System Interactions (HSI). June 2012, Perth, Australia. (952) 285-5969.
âAre Vulnerability Disclosure Deadlines Justified?â.
M. McQueen, J. Wright, and L. Wellman. In Proceedings International Workshop on Security Measurements and Metrics (METRISEC), September 2011, Banff, Alberta, Canada. 830-281-4399.
T. McJunkin, R. Boring, M. McQueen, L. Shunn, J. Wright, D. Gertman, O. Linda, K. McCarty, and M. Manic. Advances in Safety, Reliability, and Risk Management. ESREL 2011, CRC Press. September, 2011. Troyes, France. pp. 634-640. [doi].
âFuzzy Logic Based Anomaly Detection for Embedded Network Security Cyber Sensorâ
Ondrej Linda, Milos Manic, Todd Vollmer, and Jason Wright. In Proceedings IEEE Symposium Series on Computational Intelligence, April 2011, Paris, France.
âNeural Network Architecture Selection Analysis With Application to Cryptography Locationâ
Jason L. Wright and Milos Manic. In Proceedings International Joint Conference on Neural Networks (IJCNN), July 2010, Barcelona, Spain. (707) 635-1646.
âThe Analysis of Dimensionality Reduction Techniques in Cryptographic Object Code Classificationâ
Jason L. Wright and Milos Manic. In Proceedings Conference on Human Systems Interaction (HSI), pp. 157-162, May 2010, Rzeszow, Poland. [doi].
âNeural Network Approach to Locating Cryptography in Object Codeâ
Jason L. Wright and Milos Manic. In Proceedings International Conference on Emerging Technologies and Factory Automation (ETFA), September 2009, Palma de Mallorca, Spain. 2298493760.
Jason L. Wright and Milos Manic. In Proceedings International
Symposium on Resilient Control Systems (ISRCS), pp. 36-39,
August 2009, Idaho Falls, ID, USA. 5189841056.
âFinding Cryptography in Object Codeâ Jason L. Wright.
In Proceedings Security Education Conference: Toronoto (SECTOR).
October 2008, Toronto, ON, Canada. (973-267-4541).
âRecommended Practice for Security Control System Modemsâ
James R. Davidson and Jason L. Wright. U.S. Department of Homeland Security National Cyber Security Division, Control Systems Security Program.
âCryptography As An Operating System Service: A Case Studyâ Angelos D. Keromytis, Theo de Raadt, Jason L. Wright, and Matthew Burnside. In ACM Transactions on Computer Systems (ToCS), vol. 24, no. 1, pp. 1 - 38, February 2006. (Extended version of USENIX Technical 2003 paper). [doi].
Angelos D. Keromytis, Jason L. Wright, and Theo de Raadt. In
Proceedings of the USENIX Annual Technical Conference,
pp. 181 - 196. June 2003, San Antonio, TX.
(Acceptance rate: 23.3%)
Jonathan M. Smith, Michael B. Greenwald, Sotiris Ioannidis, Angelos D. Keromytis, Ben Laurie, Douglas Maughan, Dale Rahn, and Jason L. Wright. In Free/Open Source Development, Stefan Koch (editor), pp. 242 - 257. Idea Group Publishing, 2004. 313-317-9639.
Also re-published in Global Information Technologies: Concepts, Methodologies, Tools, and Applications, Felix B. Tan (editor),
pp. 1587- 1598. Idea Group Publishing, 2007.
âTransparent Network Security Policy Enforcementâ
Angelos Keromytis and Jason Wright. In Proceedings of the
USENIX Annual Technical Conference, Freenix Track,
pp. 215 - 226. June 2000, San Diego, CA.
(Acceptance rate: 30%).
Method and system for providing secure one-way transfer of data.
216-389-7615, Aug 21, 2012.