Joshua Mason
Joshua Mason
Verified email at
Cited by
Cited by
Understanding the mirai botnet
M Antonakakis, T April, M Bailey, M Bernhard, E Bursztein, J Cochran, ...
26th {USENIX} security symposium ({USENIX} Security 17), 1093-1110, 2017
Skill squatting attacks on Amazon Alexa
D Kumar, R Paccagnella, P Murley, E Hennenfent, J Mason, A Bates, ...
27th {USENIX} Security Symposium ({USENIX} Security 18), 33-47, 2018
Measuring ethereum network peers
SK Kim, Z Ma, S Murali, J Mason, A Miller, M Bailey
Proceedings of the Internet Measurement Conference 2018, 91-104, 2018
Erays: reverse engineering ethereum's opaque smart contracts
Y Zhou, D Kumar, S Bakshi, J Mason, A Miller, M Bailey
27th {USENIX} Security Symposium ({USENIX} Security 18), 1371-1385, 2018
An internet-wide view of ics devices
A Mirian, Z Ma, D Adrian, M Tischer, T Chuenchujit, T Yardley, R Berthier, ...
2016 14th Annual Conference on Privacy, Security and Trust (PST), 96-103, 2016
English shellcode
J Mason, S Small, F Monrose, G MacManus
Proceedings of the 16th ACM conference on Computer and communications …, 2009
Tracking certificate misissuance in the wild
D Kumar, Z Wang, M Hyder, J Dickinson, G Beck, D Adrian, J Mason, ...
2018 IEEE Symposium on Security and Privacy (SP), 785-798, 2018
Outguard: Detecting in-browser covert cryptocurrency mining in the wild
A Kharraz, Z Ma, P Murley, C Lever, J Mason, A Miller, N Borisov, ...
The World Wide Web Conference, 840-852, 2019
Security challenges in an increasingly tangled web
D Kumar, Z Ma, Z Durumeric, A Mirian, J Mason, JA Halderman, M Bailey
Proceedings of the 26th International Conference on World Wide Web, 677-684, 2017
Multi-stage replay with crosscut
J Chow, D Lucchetti, T Garfinkel, G Lefebvre, R Gardner, J Mason, ...
Proceedings of the 6th ACM SIGPLAN/SIGOPS international conference on …, 2010
Designing Toxic Content Classification for a Diversity of Perspectives.
D Kumar, PG Kelley, S Consolvo, J Mason, E Bursztein, Z Durumeric, ...
SOUPS@ USENIX Security Symposium, 299-318, 2021
To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads.
S Small, J Mason, F Monrose, N Provos, A Stubblefield
USENIX Security Symposium, 171-184, 2008
A natural language approach to automated cryptanalysis of two-time pads
J Mason, K Watkins, J Eisner, A Stubblefield
Proceedings of the 13th ACM conference on Computer and communications …, 2006
The severest of them all: Inference attacks against secure virtual enclaves
J Werner, J Mason, M Antonakakis, M Polychronakis, F Monrose
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
Jetset: Targeted Firmware Rehosting for Embedded Systems.
E Johnson, M Bland, YF Zhu, J Mason, S Checkoway, S Savage, ...
USENIX Security Symposium, 321-338, 2021
Empirical measurement of systemic 2fa usability
J Reynolds, N Samarin, J Barnes, T Judd, J Mason, M Bailey, S Egelman
Proceedings of the USENIX Conference, 2020
Security evaluation of Apple’s iPhone
C Miller, J Honoroff, J Mason
Independent Security Evaluators 19, 2007
Measuring identity confusion with uniform resource locators
J Reynolds, D Kumar, Z Ma, R Subramanian, M Wu, M Shelton, J Mason, ...
Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems …, 2020
Emerging threats in internet of things voice services
D Kumar, R Paccagnella, P Murley, E Hennenfent, J Mason, A Bates, ...
IEEE Security & Privacy 17 (4), 18-24, 2019
WebSocket adoption and the landscape of the real-time web
P Murley, Z Ma, J Mason, M Bailey, A Kharraz
Proceedings of the Web Conference 2021, 1192-1203, 2021
The system can't perform the operation now. Try again later.
Articles 1–20