Joshua Mason

joshm [\x40] illinois [\x2e] edu
Information Trust Institute
University of Illinois Urbana-Champaign

I completed my Ph.D. at Johns Hopkins University in the Computer Science Department in 2009. My advisor was Fabian Monrose. I am now research faculty at the the University of Illinois Urbana-Champaign under Michael Bailey as of January, 2016.

Note: This page has only recently been created and is a work in progress. Listed below are my publications and presentations. More will probably be added in the coming weeks.


Deepak Kumar, Riccardo Paccagnella, Paul Murley, Eric Hennenfent, Joshua Mason, Adam Bates, Michael Bailey. Skill Squatting Attacks on Amazon Alexa. 27th USENIX Security Symposium (USENIX Security '18), Baltimore, Maryland, August 15-17, 2018.

Yi Zhou, Deepak Kumar , Surya Bakshi, Joshua Mason, Andrew Miller, Michael Bailey. Erays: Reverse Engineering Ethereum's Opaque Smart Contracts. 27th USENIX Security Symposium (USENIX Security '18), Baltimore, Maryland, August 15-17, 2018.

Deepak Kumar, Zhengping Wang, Matthew Hyder, Joseph Dickinson, Joshua Mason, Michael Bailey, Gabrielle Beck, David Adrian, Zakir Durumeric, J. Alex Halderman. Tracking Certificate Misissuance in the Wild. To appear in 39th IEEE Symposium on Security and Privacy (Oakland '18), San Francisco, CA. May 21-23, 2018. [Paper]

M. Antonakakis, T. April, M. Bailey, M. Bernhard, E. Bursztein, J. Cochran, Z. Durumeric, J. A. Halderman, L. Invernizzi, M. Kallitsis, D. Kumar, C. Lever, Z. Ma, J. Mason, D. Menscher, C. Seaman, N. Sullivan, K. Thomas, Y. Zhou. Understanding the Mirai Botnet. In 26th USENIX Security Symposium (USENIX Security '17), Vancouver, Canada, August 16-18, 2017. [Paper]

D. Kumar, Z. Ma, Z. Durumeric, A. Mirian, J. Mason, M. Bailey, and J. A. Halderman. Security Challenges in an Increasingly Tangled Web. In 26th World Wide Web Conference (WWW'17). Perth, Australia. April 3 - 7, 2017. [Paper]

A. Mirian, Z. Ma, D. Adrian, M. Tischer, T. Chuenchujit, T. Yardley, R. Berthier, J. Mason, Z. Durumeric, J A. Halderman, M. Bailey. "An internet-wide view of ICS devices." In Privacy, Security and Trust (PST), 2016 14th Annual Conference on, 96-103. [Paper]

J. Chow, D. Lucchetti, T. Garfinkel, G. Lefebvre, R. Gardner, J. Mason, S. Small, and P. Chen. "Multi-stage replay with crosscut." In ACM Sigplan Notices, vol. 45, no. 7, pp. 13-24. ACM, 2010. [Paper]

J. Mason, S. Small, F. Monrose, G. MacManus. English Shellcode. Proceedings of the 16th ACM Conference on Computer and Communications Security, Chicago, IL. November 2009. [Paper]

S. Small, J. Mason, F. Monrose, N. Provos, A. Stubblefield. To Catch a Predator: A Natural Language Approach for Eliciting Protocol Interaction. USENIX Security Symposium 2008. [Paper]

J. Mason, K. Watkins, J. Eisner, and A. Stubblefied. A Natural Language Approach to Automated Cryptanalysis of Two-time Pads. ACM CCS 2006. [Paper] [Slides]