Joshua Mason

According to our database1, Joshua Mason authored at least 23 papers between 2006 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
WebSocket Adoption and the Landscape of the Real-Time Web.
Proceedings of the WWW '21: The Web Conference 2021, 2021

What's in a Name? Exploring CA Certificate Control.
Proceedings of the 30th USENIX Security Symposium, 2021

Jetset: Targeted Firmware Rehosting for Embedded Systems.
Proceedings of the 30th USENIX Security Symposium, 2021

Designing Toxic Content Classification for a Diversity of Perspectives.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021

Tracing your roots: exploring the TLS trust anchor ecosystem.
Proceedings of the IMC '21: ACM Internet Measurement Conference, 2021

2020
Empirical Measurement of Systemic 2FA Usability.
Proceedings of the 29th USENIX Security Symposium, 2020

Measuring Identity Confusion with Uniform Resource Locators.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020

2019
Emerging Threats in Internet of Things Voice Services.
IEEE Secur. Priv., 2019

Outguard: Detecting In-Browser Covert Cryptocurrency Mining in the Wild.
Proceedings of the World Wide Web Conference, 2019

The Impact of Secure Transport Protocols on Phishing Efficacy.
Proceedings of the 12th USENIX Workshop on Cyber Security Experimentation and Test, 2019

The SEVerESt Of Them All: Inference Attacks Against Secure Virtual Enclaves.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Erays: Reverse Engineering Ethereum's Opaque Smart Contracts.
Proceedings of the 27th USENIX Security Symposium, 2018

Skill Squatting Attacks on Amazon Alexa.
Proceedings of the 27th USENIX Security Symposium, 2018

Tracking Certificate Misissuance in the Wild.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Measuring Ethereum Network Peers.
Proceedings of the Internet Measurement Conference 2018, 2018

2017
Security Challenges in an Increasingly Tangled Web.
Proceedings of the 26th International Conference on World Wide Web, 2017


2016
An Internet-wide view of ICS devices.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

2010
Multi-stage replay with crosscut.
Proceedings of the 6th International Conference on Virtual Execution Environments, 2010

2009
English shellcode.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Masquerade: Simulating a Thousand Victims.
login Usenix Mag., 2008

To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads.
Proceedings of the 17th USENIX Security Symposium, 2008

2006
A natural language approach to automated cryptanalysis of two-time pads.
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006


  Loading...