§ Education

PhD (Computer Science)
Dissertation: Protection and Detection of Memory Compromise
Advisors: Dr. William Enck and Dr. Peng Ning
North Carolina State University May 2015
Masters of Science (Computer Science) North Carolina State University May 2012
B.S. Computer Science (Major) Physics (Minor) The College of New Jersey Dec. 2006

§ Publications

  • Gionta, Jason, William Enck, and Per Larsen. "Preventing Kernel Code-Reuse Attacks Through Disclosure Resistant Code Diversification." Proceedings of the 4th IEEE Conference on Communications and Network Security (CNS). October 2016. (to appear)
  • Gionta, Jason, William Enck, and Peng Ning. "HideM: Protecting the Contents of Userspace Memory in the Face of Disclosure Vulnerabilities." Proceedings of the 5th ACM Conference on Data and Application Security and Privacy (CODASPY). March 2015.
  • Gionta, Jason, Ahmed Azab, William Enck, Peng Ning, and Xiaolan Zhang. "SEER: Practical Memory Virus Scanning as a Service." Proceedings of the 30th Annual Computer Security Applications Conference (ACSAC). December 2014.
  • Gionta, Jason, Ahmed Azab, William Enck, Peng Ning, and Xiaolan Zhang. "DACSA: A Decoupled Architecture for Cloud Security Analysis." 7th Workshop on Cyber Security Experimentation and Test. August 2014.
  • Gionta, Jason, Peng Ning, and Xiaolan Zhang. "iHTTP: efficient authentication of non-confidential HTTP traffic." Applied Cryptography and Network Security. Springer Berlin Heidelberg, 2012.

§ Reviews

  • JoCCASA 2016 - Reviewer (Journal of Cloud Computing: Advances, Systems and Applications)
  • TrustED 2015 - IProgram Committee Member (International Workshop on Trustworthy Embedded Devices)
  • ICPADS 2014 - Program Committee Member (Security and Trustworthy Computing)
  • CODASPY 2014 - Conference on Data and Applications Security
  • TrustED 2013 - International Workshop on Trustworthy Embedded Devices
  • ICPADS 2013 - IEEE International Conference on Parallel and Distributed Systems
  • NDSS 2011 - Network and Distributed System Security Symposium
  • ACSAC 2010 - Annual Computer Security Applications Conference

§ Teaching

  • CSC 474 (Fall 2014) - Network Security - Wireless Network Security - Guest Lecturer
  • CSC 474 (Fall 2014) - Network Security - Digital Signatures - Guest Lecturer
  • CSC 705 (Spring 2014) - Operating System Security - Control-Flow and Data Flow Integrity - Guest Lecturer
  • CSC 474 (Fall 2013) - Network Security - Securing Email through SMIME and PGP - Guest Lecturer

§ Work Experience

U.S. Government

Researcher
  May '15 to Current

NC State

Research Assistant
  May '10 to May '15

DoD

Researcher
  May '14 to Aug '14

DoD

Security Analyst
  May '13 to Aug '13

Bank of America

Developer/Analyst
  July '07 to Aug '09


§ Technical Skills

  • Microsoft Certified #E122-7652 - Programming in HTML5 with JavaScript and CSS, Jan 2013
  • Environments: Linux, Unix, Windows, UEFI, KVM
  • Languages: C, C++, C#, Java, Python, Perl, EFI Driver Development, Javascript, CSS, HTML, T-SQL, XML, Windows Installer Xml (WiX)
  • Tools: Nmap, Wireshark, TCPDump, Aircrack-ng, Cain, Netcat, SSH tunnels, VPN, TOR, Web Scarab, Metasploit, IDA Pro, WinDBG, PEBrowser, BackTrack 5r3, Volatility