Biblio

Export 9 results:
Filters: Author is Joshua Mason  [Clear All Filters]
2021
Kumar D, Kelley PGage, Consolvo S, Mason J, Bursztein E, Durumeric Z, Thomas K, Bailey M.  2021.  Designing Toxic Content Classification for a Diversity of Perspectives. Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021). :299--318.
Johnson E, Bland M, Zhu YF, Mason J, Checkoway S, Savage S, Levchenko K.  2021.  Jetset: Targeted Firmware Rehosting for Embedded Systems. 30th USENIX Security Symposium (USENIX Security 21). :321--338.
Ma Z, Mason J, Antonakakis M, Durumeric Z, Bailey M.  2021.  What's in a Name? Exploring CA Certificate Control 30th USENIX Security Symposium (USENIX Security 21). :4383--4400.
2020
Reynolds J, Samarin N, Barnes J, Judd T, Mason J, Bailey M, Egelman S.  2020.  Empirical Measurement of Systemic 2FA Usability. 29th USENIX Security Symposium (USENIX Security 20). :127--143.
2019
Ma Z, Reynolds J, Dickinson J, Wang K, Judd T, Barnes JD, Mason J, Bailey M.  2019.  The Impact of Secure Transport Protocols on Phishing Efficacy. 12th USENIX Workshop on Cyber Security Experimentation and Test (CSET 19).
2018
Zhou Y, Kumar D, Bakshi S, Mason J, Miller A, Bailey M.  2018.  Erays: Reverse Engineering Ethereum's Opaque Smart Contracts. 27th USENIX Security Symposium (USENIX Security 18). :1371--1385.
Kumar D, Paccagnella R, Murley P, Hennenfent E, Mason J, Bates A, Bailey M.  2018.  Skill Squatting Attacks on Amazon Alexa. 27th USENIX Security Symposium (USENIX Security 18). :33--47.
2017
Antonakakis M, April T, Bailey M, Bernhard M, Bursztein E, Cochran J, Durumeric Z, J. Halderman A, Invernizzi L, Kallitsis M et al..  2017.  Understanding the Mirai Botnet. 26th USENIX Security Symposium (USENIX Security 17). :1093--1110.