Joshua Mason
Joshua Mason
Verified email at
Cited by
Cited by
Understanding the mirai botnet
M Antonakakis, T April, M Bailey, M Bernhard, E Bursztein, J Cochran, ...
26th USENIX security symposium (USENIX Security 17), 1093-1110, 2017
Skill squatting attacks on Amazon Alexa
D Kumar, R Paccagnella, P Murley, E Hennenfent, J Mason, A Bates, ...
27th USENIX security symposium (USENIX Security 18), 33-47, 2018
Measuring ethereum network peers
SK Kim, Z Ma, S Murali, J Mason, A Miller, M Bailey
Proceedings of the Internet Measurement Conference 2018, 91-104, 2018
An internet-wide view of ics devices
A Mirian, Z Ma, D Adrian, M Tischer, T Chuenchujit, T Yardley, R Berthier, ...
2016 14th Annual Conference on Privacy, Security and Trust (PST), 96-103, 2016
Erays: reverse engineering ethereum's opaque smart contracts
Y Zhou, D Kumar, S Bakshi, J Mason, A Miller, M Bailey
27th USENIX security symposium (USENIX Security 18), 1371-1385, 2018
Outguard: Detecting in-browser covert cryptocurrency mining in the wild
A Kharraz, Z Ma, P Murley, C Lever, J Mason, A Miller, N Borisov, ...
The World Wide Web Conference, 840-852, 2019
Tracking certificate misissuance in the wild
D Kumar, Z Wang, M Hyder, J Dickinson, G Beck, D Adrian, J Mason, ...
2018 IEEE Symposium on Security and Privacy (SP), 785-798, 2018
English shellcode
J Mason, S Small, F Monrose, G MacManus
Proceedings of the 16th ACM conference on Computer and communications …, 2009
Designing toxic content classification for a diversity of perspectives
D Kumar, PG Kelley, S Consolvo, J Mason, E Bursztein, Z Durumeric, ...
Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021), 299-318, 2021
Security challenges in an increasingly tangled web
D Kumar, Z Ma, Z Durumeric, A Mirian, J Mason, JA Halderman, M Bailey
Proceedings of the 26th International Conference on World Wide Web, 677-684, 2017
Jetset: Targeted firmware rehosting for embedded systems
E Johnson, M Bland, YF Zhu, J Mason, S Checkoway, S Savage, ...
30th USENIX Security Symposium (USENIX Security 21), 321-338, 2021
Multi-stage replay with crosscut
J Chow, D Lucchetti, T Garfinkel, G Lefebvre, R Gardner, J Mason, ...
Proceedings of the 6th ACM SIGPLAN/SIGOPS international conference on …, 2010
Empirical Measurement of Systemic {2FA} Usability
J Reynolds, N Samarin, J Barnes, T Judd, J Mason, M Bailey, S Egelman
29th USENIX Security Symposium (USENIX Security 20), 127-143, 2020
The severest of them all: Inference attacks against secure virtual enclaves
J Werner, J Mason, M Antonakakis, M Polychronakis, F Monrose
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads.
S Small, J Mason, F Monrose, N Provos, A Stubblefield
USENIX Security Symposium, 171-184, 2008
A natural language approach to automated cryptanalysis of two-time pads
J Mason, K Watkins, J Eisner, A Stubblefield
Proceedings of the 13th ACM conference on Computer and communications …, 2006
Websocket adoption and the landscape of the real-time web
P Murley, Z Ma, J Mason, M Bailey, A Kharraz
Proceedings of the Web Conference 2021, 1192-1203, 2021
University of Illinois at Urbana-Champaign
W Zhou, D Kumar, S Bakshi, J Mason, A Miller, M Bailey
United States, 2018
Measuring identity confusion with uniform resource locators
J Reynolds, D Kumar, Z Ma, R Subramanian, M Wu, M Shelton, J Mason, ...
Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems …, 2020
Security evaluation of Apple’s iPhone
C Miller, J Honoroff, J Mason
Independent Security Evaluators 19, 2007
The system can't perform the operation now. Try again later.
Articles 1–20