Export 9 results:
Filters: Author is Joshua Mason  [Clear All Filters]
Kumar D, Kelley PGage, Consolvo S, Mason J, Bursztein E, Durumeric Z, Thomas K, Bailey M.  2021.  Designing Toxic Content Classification for a Diversity of Perspectives. Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021). :299--318.
Johnson E, Bland M, Zhu YF, Mason J, Checkoway S, Savage S, Levchenko K.  2021.  Jetset: Targeted Firmware Rehosting for Embedded Systems. 30th USENIX Security Symposium (USENIX Security 21). :321--338.
Ma Z, Mason J, Antonakakis M, Durumeric Z, Bailey M.  2021.  What's in a Name? Exploring CA Certificate Control 30th USENIX Security Symposium (USENIX Security 21). :4383--4400.
Reynolds J, Samarin N, Barnes J, Judd T, Mason J, Bailey M, Egelman S.  2020.  Empirical Measurement of Systemic 2FA Usability. 29th USENIX Security Symposium (USENIX Security 20). :127--143.
Ma Z, Reynolds J, Dickinson J, Wang K, Judd T, Barnes JD, Mason J, Bailey M.  2019.  The Impact of Secure Transport Protocols on Phishing Efficacy. 12th USENIX Workshop on Cyber Security Experimentation and Test (CSET 19).
Zhou Y, Kumar D, Bakshi S, Mason J, Miller A, Bailey M.  2018.  Erays: Reverse Engineering Ethereum's Opaque Smart Contracts. 27th USENIX Security Symposium (USENIX Security 18). :1371--1385.
Kumar D, Paccagnella R, Murley P, Hennenfent E, Mason J, Bates A, Bailey M.  2018.  Skill Squatting Attacks on Amazon Alexa. 27th USENIX Security Symposium (USENIX Security 18). :33--47.
Antonakakis M, April T, Bailey M, Bernhard M, Bursztein E, Cochran J, Durumeric Z, J. Halderman A, Invernizzi L, Kallitsis M et al..  2017.  Understanding the Mirai Botnet. 26th USENIX Security Symposium (USENIX Security 17). :1093--1110.