Follow
Joshua Mason
Joshua Mason
Mandiant
Verified email at ejosh.net
Title
Cited by
Cited by
Year
Understanding the mirai botnet
M Antonakakis, T April, M Bailey, M Bernhard, E Bursztein, J Cochran, ...
26th USENIX security symposium (USENIX Security 17), 1093-1110, 2017
16132017
Skill squatting attacks on Amazon Alexa
D Kumar, R Paccagnella, P Murley, E Hennenfent, J Mason, A Bates, ...
27th USENIX security symposium (USENIX Security 18), 33-47, 2018
1442018
Measuring ethereum network peers
SK Kim, Z Ma, S Murali, J Mason, A Miller, M Bailey
Proceedings of the Internet Measurement Conference 2018, 91-104, 2018
1222018
An internet-wide view of ics devices
A Mirian, Z Ma, D Adrian, M Tischer, T Chuenchujit, T Yardley, R Berthier, ...
2016 14th Annual Conference on Privacy, Security and Trust (PST), 96-103, 2016
922016
English shellcode
J Mason, S Small, F Monrose, G MacManus
Proceedings of the 16th ACM conference on Computer and communications …, 2009
922009
Erays: reverse engineering ethereum's opaque smart contracts
Y Zhou, D Kumar, S Bakshi, J Mason, A Miller, M Bailey
27th USENIX Security Symposium (USENIX Security 18), 1371-1385, 2018
842018
Tracking certificate misissuance in the wild
D Kumar, Z Wang, M Hyder, J Dickinson, G Beck, D Adrian, J Mason, ...
2018 IEEE Symposium on Security and Privacy (SP), 785-798, 2018
752018
Security challenges in an increasingly tangled web
D Kumar, Z Ma, Z Durumeric, A Mirian, J Mason, JA Halderman, M Bailey
Proceedings of the 26th International Conference on World Wide Web, 677-684, 2017
562017
Outguard: Detecting in-browser covert cryptocurrency mining in the wild
A Kharraz, Z Ma, P Murley, C Lever, J Mason, A Miller, N Borisov, ...
The World Wide Web Conference, 840-852, 2019
552019
Multi-stage replay with crosscut
J Chow, D Lucchetti, T Garfinkel, G Lefebvre, R Gardner, J Mason, ...
Proceedings of the 6th ACM SIGPLAN/SIGOPS international conference on …, 2010
492010
To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads.
S Small, J Mason, F Monrose, N Provos, A Stubblefield
USENIX Security Symposium, 171-184, 2008
382008
A natural language approach to automated cryptanalysis of two-time pads
J Mason, K Watkins, J Eisner, A Stubblefield
Proceedings of the 13th ACM conference on Computer and communications …, 2006
352006
The SEVerESt Of Them All: Inference Attacks Against Secure Virtual Enclaves
J Werner, J Mason, M Antonakakis, M Polychronakis, F Monrose
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
232019
Security evaluation of Apple’s iPhone
C Miller, J Honoroff, J Mason
Independent Security Evaluators 19, 2007
222007
Empirical Measurement of Systemic {2FA} Usability
J Reynolds, N Samarin, J Barnes, T Judd, J Mason, M Bailey, S Egelman
29th USENIX Security Symposium (USENIX Security 20), 127-143, 2020
172020
Jetset: Targeted firmware rehosting for embedded systems
E Johnson, M Bland, YF Zhu, J Mason, S Checkoway, S Savage, ...
30th USENIX Security Symposium (USENIX Security 21), 321-338, 2021
162021
Designing toxic content classification for a diversity of perspectives
D Kumar, PG Kelley, S Consolvo, J Mason, E Bursztein, Z Durumeric, ...
Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021), 299-318, 2021
142021
Measuring identity confusion with uniform resource locators
J Reynolds, D Kumar, Z Ma, R Subramanian, M Wu, M Shelton, J Mason, ...
Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems …, 2020
132020
Emerging threats in internet of things voice services
D Kumar, R Paccagnella, P Murley, E Hennenfent, J Mason, A Bates, ...
IEEE Security & Privacy 17 (4), 18-24, 2019
132019
Engaging faculty in online education: Rightsizing incentives and optimizing support
J Mason, C Hickman, A Dyer, C Koproske, G Fry, M Taha
Washington, DC: University Leadership Council of The Advisory Board Company …, 2010
92010
The system can't perform the operation now. Try again later.
Articles 1–20