Joshua Mason
Title
Cited by
Cited by
Year
Understanding the mirai botnet
M Antonakakis, T April, M Bailey, M Bernhard, E Bursztein, J Cochran, ...
26th {USENIX} security symposium ({USENIX} Security 17), 1093-1110, 2017
8572017
English shellcode
J Mason, S Small, F Monrose, G MacManus
Proceedings of the 16th ACM conference on Computer and communications …, 2009
912009
Skill squatting attacks on Amazon Alexa
D Kumar, R Paccagnella, P Murley, E Hennenfent, J Mason, A Bates, ...
27th {USENIX} Security Symposium ({USENIX} Security 18), 33-47, 2018
732018
An internet-wide view of ics devices
A Mirian, Z Ma, D Adrian, M Tischer, T Chuenchujit, T Yardley, R Berthier, ...
2016 14th Annual Conference on Privacy, Security and Trust (PST), 96-103, 2016
572016
Measuring ethereum network peers
SK Kim, Z Ma, S Murali, J Mason, A Miller, M Bailey
Proceedings of the Internet Measurement Conference 2018, 91-104, 2018
532018
Erays: reverse engineering ethereum's opaque smart contracts
Y Zhou, D Kumar, S Bakshi, J Mason, A Miller, M Bailey
27th {USENIX} Security Symposium ({USENIX} Security 18), 1371-1385, 2018
522018
Multi-stage replay with crosscut
J Chow, D Lucchetti, T Garfinkel, G Lefebvre, R Gardner, J Mason, ...
Proceedings of the 6th ACM SIGPLAN/SIGOPS international conference on …, 2010
412010
Tracking certificate misissuance in the wild
D Kumar, Z Wang, M Hyder, J Dickinson, G Beck, D Adrian, J Mason, ...
2018 IEEE Symposium on Security and Privacy (SP), 785-798, 2018
402018
To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads.
S Small, J Mason, F Monrose, N Provos, A Stubblefield
USENIX Security Symposium, 171-184, 2008
362008
Security challenges in an increasingly tangled web
D Kumar, Z Ma, Z Durumeric, A Mirian, J Mason, JA Halderman, M Bailey
Proceedings of the 26th International Conference on World Wide Web, 677-684, 2017
312017
A natural language approach to automated cryptanalysis of two-time pads
J Mason, K Watkins, J Eisner, A Stubblefield
Proceedings of the 13th ACM conference on Computer and communications …, 2006
252006
Security evaluation of Apple’s iPhone
C Miller, J Honoroff, J Mason
Independent Security Evaluators 19, 2007
222007
Outguard: Detecting in-browser covert cryptocurrency mining in the wild
A Kharraz, Z Ma, P Murley, C Lever, J Mason, A Miller, N Borisov, ...
The World Wide Web Conference, 840-852, 2019
202019
The SEVerESt Of Them All: Inference Attacks Against Secure Virtual Enclaves
J Werner, J Mason, M Antonakakis, M Polychronakis, F Monrose
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
102019
Emerging threats in internet of things voice services
D Kumar, R Paccagnella, P Murley, E Hennenfent, J Mason, A Bates, ...
IEEE Security & Privacy 17 (4), 18-24, 2019
52019
Measuring Identity Confusion with Uniform Resource Locators
J Reynolds, D Kumar, Z Ma, R Subramanian, M Wu, M Shelton, J Mason, ...
Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems …, 2020
22020
The impact of secure transport protocols on phishing efficacy
Z Ma, J Reynolds, J Dickinson, K Wang, T Judd, JD Barnes, J Mason, ...
12th {USENIX} Workshop on Cyber Security Experimentation and Test ({CSET} 19), 2019
22019
Empirical Measurement of Systemic 2FA Usability
J Reynolds, N Samarin, J Barnes, T Judd, J Mason, M Bailey, S Egelman
29th {USENIX} Security Symposium ({USENIX} Security 20), 127-143, 2020
2020
To Catch a Predator: A Natural Language Approach for Eliciting Protocol Interaction
S Small, J Mason, F Monrose, N Provos, A Stubblefield
2008
Masquerade: simulating a thousand victims
S Small, J Mason, R MacArthur, F Monrose
; login:: the magazine of USENIX & SAGE 33 (6), 6-13, 2008
2008
The system can't perform the operation now. Try again later.
Articles 1–20