default search action
Joshua Mason
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c21]Zane Ma, James Austgen, Joshua Mason, Zakir Durumeric, Michael D. Bailey:
Tracing your roots: exploring the TLS trust anchor ecosystem. Internet Measurement Conference 2021: 179-194 - [c20]Deepak Kumar, Patrick Gage Kelley, Sunny Consolvo, Joshua Mason, Elie Bursztein, Zakir Durumeric, Kurt Thomas, Michael D. Bailey:
Designing Toxic Content Classification for a Diversity of Perspectives. SOUPS @ USENIX Security Symposium 2021: 299-318 - [c19]Evan Johnson, Maxwell Bland, Yifei Zhu, Joshua Mason, Stephen Checkoway, Stefan Savage, Kirill Levchenko:
Jetset: Targeted Firmware Rehosting for Embedded Systems. USENIX Security Symposium 2021: 321-338 - [c18]Zane Ma, Joshua Mason, Manos Antonakakis, Zakir Durumeric, Michael D. Bailey:
What's in a Name? Exploring CA Certificate Control. USENIX Security Symposium 2021: 4383-4400 - [c17]Paul Murley, Zane Ma, Joshua Mason, Michael D. Bailey, Amin Kharraz:
WebSocket Adoption and the Landscape of the Real-Time Web. WWW 2021: 1192-1203 - [i1]Deepak Kumar, Patrick Gage Kelley, Sunny Consolvo, Joshua Mason, Elie Bursztein, Zakir Durumeric, Kurt Thomas, Michael D. Bailey:
Designing Toxic Content Classification for a Diversity of Perspectives. CoRR abs/2106.04511 (2021) - 2020
- [c16]Joshua Reynolds, Deepak Kumar, Zane Ma, Rohan Subramanian, Meishan Wu, Martin Shelton, Joshua Mason, Emily Stark, Michael D. Bailey:
Measuring Identity Confusion with Uniform Resource Locators. CHI 2020: 1-12 - [c15]Joshua Reynolds, Nikita Samarin, Joseph D. Barnes, Taylor Judd, Joshua Mason, Michael D. Bailey, Serge Egelman:
Empirical Measurement of Systemic 2FA Usability. USENIX Security Symposium 2020: 127-143
2010 – 2019
- 2019
- [j2]Deepak Kumar, Riccardo Paccagnella, Paul Murley, Eric Hennenfent, Joshua Mason, Adam Bates, Michael D. Bailey:
Emerging Threats in Internet of Things Voice Services. IEEE Secur. Priv. 17(4): 18-24 (2019) - [c14]Jan Werner, Joshua Mason, Manos Antonakakis, Michalis Polychronakis, Fabian Monrose:
The SEVerESt Of Them All: Inference Attacks Against Secure Virtual Enclaves. AsiaCCS 2019: 73-85 - [c13]Zane Ma, Joshua Reynolds, Joseph Dickinson, Kaishen Wang, Taylor Judd, Joseph D. Barnes, Joshua Mason, Michael D. Bailey:
The Impact of Secure Transport Protocols on Phishing Efficacy. CSET @ USENIX Security Symposium 2019 - [c12]Amin Kharraz, Zane Ma, Paul Murley, Charles Lever, Joshua Mason, Andrew Miller, Nikita Borisov, Manos Antonakakis, Michael D. Bailey:
Outguard: Detecting In-Browser Covert Cryptocurrency Mining in the Wild. WWW 2019: 840-852 - 2018
- [c11]Seoung Kyun Kim, Zane Ma, Siddharth Murali, Joshua Mason, Andrew Miller, Michael D. Bailey:
Measuring Ethereum Network Peers. Internet Measurement Conference 2018: 91-104 - [c10]Deepak Kumar, Zhengping Wang, Matthew Hyder, Joseph Dickinson, Gabrielle Beck, David Adrian, Joshua Mason, Zakir Durumeric, J. Alex Halderman, Michael D. Bailey:
Tracking Certificate Misissuance in the Wild. IEEE Symposium on Security and Privacy 2018: 785-798 - [c9]Deepak Kumar, Riccardo Paccagnella, Paul Murley, Eric Hennenfent, Joshua Mason, Adam Bates, Michael D. Bailey:
Skill Squatting Attacks on Amazon Alexa. USENIX Security Symposium 2018: 33-47 - [c8]Yi Zhou, Deepak Kumar, Surya Bakshi, Joshua Mason, Andrew Miller, Michael D. Bailey:
Erays: Reverse Engineering Ethereum's Opaque Smart Contracts. USENIX Security Symposium 2018: 1371-1385 - 2017
- [c7]Manos Antonakakis, Tim April, Michael D. Bailey, Matt Bernhard, Elie Bursztein, Jaime Cochran, Zakir Durumeric, J. Alex Halderman, Luca Invernizzi, Michalis Kallitsis, Deepak Kumar, Chaz Lever, Zane Ma, Joshua Mason, Damian Menscher, Chad Seaman, Nick Sullivan, Kurt Thomas, Yi Zhou:
Understanding the Mirai Botnet. USENIX Security Symposium 2017: 1093-1110 - [c6]Deepak Kumar, Zane Ma, Zakir Durumeric, Ariana Mirian, Joshua Mason, J. Alex Halderman, Michael D. Bailey:
Security Challenges in an Increasingly Tangled Web. WWW 2017: 677-684 - 2016
- [c5]Ariana Mirian, Zane Ma, David Adrian, Matthew Tischer, Thasphon Chuenchujit, Tim Yardley, Robin Berthier, Joshua Mason, Zakir Durumeric, J. Alex Halderman, Michael D. Bailey:
An Internet-wide view of ICS devices. PST 2016: 96-103 - 2010
- [c4]Jim Chow, Dominic G. Lucchetti, Tal Garfinkel, Geoffrey Lefebvre, Ryan Gardner, Joshua Mason, Sam Small, Peter M. Chen:
Multi-stage replay with crosscut. VEE 2010: 13-24
2000 – 2009
- 2009
- [c3]Joshua Mason, Sam Small, Fabian Monrose, Greg MacManus:
English shellcode. CCS 2009: 524-533 - 2008
- [j1]Sam Small, Joshua Mason, Ryan MacArthur, Fabian Monrose:
Masquerade: Simulating a Thousand Victims. login Usenix Mag. 33(6) (2008) - [c2]Sam Small, Joshua Mason, Fabian Monrose, Niels Provos, Adam Stubblefield:
To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads. USENIX Security Symposium 2008: 171-184 - 2006
- [c1]Joshua Mason, Kathryn Watkins, Jason Eisner, Adam Stubblefield:
A natural language approach to automated cryptanalysis of two-time pads. CCS 2006: 235-244
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:59 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint