Joshua Mason
Title
Cited by
Cited by
Year
Understanding the mirai botnet
M Antonakakis, T April, M Bailey, M Bernhard, E Bursztein, J Cochran, ...
26th {USENIX} security symposium ({USENIX} Security 17), 1093-1110, 2017
10942017
Skill squatting attacks on Amazon Alexa
D Kumar, R Paccagnella, P Murley, E Hennenfent, J Mason, A Bates, ...
27th {USENIX} Security Symposium ({USENIX} Security 18), 33-47, 2018
922018
English shellcode
J Mason, S Small, F Monrose, G MacManus
Proceedings of the 16th ACM conference on Computer and communications …, 2009
892009
An internet-wide view of ics devices
A Mirian, Z Ma, D Adrian, M Tischer, T Chuenchujit, T Yardley, R Berthier, ...
2016 14th Annual Conference on Privacy, Security and Trust (PST), 96-103, 2016
762016
Measuring ethereum network peers
SK Kim, Z Ma, S Murali, J Mason, A Miller, M Bailey
Proceedings of the Internet Measurement Conference 2018, 91-104, 2018
742018
Erays: reverse engineering ethereum's opaque smart contracts
Y Zhou, D Kumar, S Bakshi, J Mason, A Miller, M Bailey
27th {USENIX} Security Symposium ({USENIX} Security 18), 1371-1385, 2018
602018
Tracking certificate misissuance in the wild
D Kumar, Z Wang, M Hyder, J Dickinson, G Beck, D Adrian, J Mason, ...
2018 IEEE Symposium on Security and Privacy (SP), 785-798, 2018
522018
Multi-stage replay with crosscut
J Chow, D Lucchetti, T Garfinkel, G Lefebvre, R Gardner, J Mason, ...
Proceedings of the 6th ACM SIGPLAN/SIGOPS international conference on …, 2010
472010
Security challenges in an increasingly tangled web
D Kumar, Z Ma, Z Durumeric, A Mirian, J Mason, JA Halderman, M Bailey
Proceedings of the 26th International Conference on World Wide Web, 677-684, 2017
382017
To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads.
S Small, J Mason, F Monrose, N Provos, A Stubblefield
USENIX Security Symposium, 171-184, 2008
372008
Outguard: Detecting in-browser covert cryptocurrency mining in the wild
A Kharraz, Z Ma, P Murley, C Lever, J Mason, A Miller, N Borisov, ...
The World Wide Web Conference, 840-852, 2019
342019
A natural language approach to automated cryptanalysis of two-time pads
J Mason, K Watkins, J Eisner, A Stubblefield
Proceedings of the 13th ACM conference on Computer and communications …, 2006
282006
Security evaluation of Apple’s iPhone
C Miller, J Honoroff, J Mason
Independent Security Evaluators 19, 2007
222007
The SEVerESt Of Them All: Inference Attacks Against Secure Virtual Enclaves
J Werner, J Mason, M Antonakakis, M Polychronakis, F Monrose
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
142019
Emerging threats in internet of things voice services
D Kumar, R Paccagnella, P Murley, E Hennenfent, J Mason, A Bates, ...
IEEE Security & Privacy 17 (4), 18-24, 2019
92019
Empirical Measurement of Systemic 2FA Usability
J Reynolds, N Samarin, J Barnes, T Judd, J Mason, M Bailey, S Egelman
29th {USENIX} Security Symposium ({USENIX} Security 20), 127-143, 2020
82020
Measuring Identity Confusion with Uniform Resource Locators
J Reynolds, D Kumar, Z Ma, R Subramanian, M Wu, M Shelton, J Mason, ...
Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems …, 2020
62020
The impact of secure transport protocols on phishing efficacy
Z Ma, J Reynolds, J Dickinson, K Wang, T Judd, JD Barnes, J Mason, ...
12th {USENIX} Workshop on Cyber Security Experimentation and Test ({CSET} 19), 2019
32019
To Catch a Predator: A Natural Language Approach for Eliciting Protocol Interaction
S Small, J Mason, F Monrose, N Provos, A Stubblefield
2008
Masquerade: simulating a thousand victims
S Small, J Mason, R MacArthur, F Monrose
; login:: the magazine of USENIX & SAGE 33 (6), 6-13, 2008
2008
The system can't perform the operation now. Try again later.
Articles 1–20