Joshua Mason

josh [\x40] jhu [\x2e] edu
Information Trust Institute
CSL
University of Illinois Urbana-Champaign


I completed my Ph.D. at Johns Hopkins University in the Computer Science Department in 2009. My advisor was Fabian Monrose. I was research faculty at the the University of Illinois Urbana-Champaign under Michael Bailey from January, 2016 to August of 2021.


Publications (More accurate Google scholar)


Zane Ma, Joshua Reynolds, Joseph Dickinson, Kaishen Wang, Taylor Judd, Joseph D. Barnes, Joshua Mason, and Michael Bailey. The Impact of Secure Transport Protocols on Phishing Efficacy. USENIX Workshop on Cyber Security Experimentation and Test (CSET) 2019, Santa Clara, CA, August 12, 2019. [Paper]

Jan Werner, Joshua Mason, Manos Antonakakis, Michalis Polychronakis, Fabian Monrose. The SEVerESt Of Them All: Inference Attacks Against Secure Virtual Enclaves. ACM Asia CCS 2019. Auckland, NZ. July 7-12, 2019. [Paper]

Kharraz, Amin, Zane Ma, Paul Murley, Charles Lever, Joshua Mason, Andrew Miller, Nikita Borisov, Manos Antonakakis, and Michael Bailey. "Outguard: Detecting In-Browser Covert Cryptocurrency Mining in the Wild." (2019). WWW '19 The World Wide Web Conference. San Francisco, CA. May 13 - 17, 2019. (Best Paper). [Paper]

Deepak Kumar, Riccardo Paccagnella, Paul Murley, Eric Hennenfent, Joshua Mason, Adam Bates, Michael Bailey. Skill Squatting Attacks on Amazon Alexa. 27th USENIX Security Symposium (USENIX Security '18), Baltimore, Maryland, August 15-17, 2018. [Paper]

Seoung Kim, Zane Ma, Siddharth Murali, Joshua Mason, Andrew Miller, and Michael Bailey. Measuring Ethereum Network Peers. In the 2018 ACM Internet Measurement Conference (IMC '18), Boston, MA, October 31 - November 2, 2018. [Paper]

Yi Zhou, Deepak Kumar , Surya Bakshi, Joshua Mason, Andrew Miller, Michael Bailey. Erays: Reverse Engineering Ethereum's Opaque Smart Contracts. 27th USENIX Security Symposium (USENIX Security '18), Baltimore, Maryland, August 15-17, 2018. [Paper]

Deepak Kumar, Zhengping Wang, Matthew Hyder, Joseph Dickinson, Joshua Mason, Michael Bailey, Gabrielle Beck, David Adrian, Zakir Durumeric, J. Alex Halderman. Tracking Certificate Misissuance in the Wild. To appear in 39th IEEE Symposium on Security and Privacy (Oakland '18), San Francisco, CA. May 21-23, 2018. [Paper]

M. Antonakakis, T. April, M. Bailey, M. Bernhard, E. Bursztein, J. Cochran, Z. Durumeric, J. A. Halderman, L. Invernizzi, M. Kallitsis, D. Kumar, C. Lever, Z. Ma, J. Mason, D. Menscher, C. Seaman, N. Sullivan, K. Thomas, Y. Zhou. Understanding the Mirai Botnet. In 26th USENIX Security Symposium (USENIX Security '17), Vancouver, Canada, August 16-18, 2017. [Paper]

D. Kumar, Z. Ma, Z. Durumeric, A. Mirian, J. Mason, M. Bailey, and J. A. Halderman. Security Challenges in an Increasingly Tangled Web. In 26th World Wide Web Conference (WWW'17). Perth, Australia. April 3 - 7, 2017. [Paper]

A. Mirian, Z. Ma, D. Adrian, M. Tischer, T. Chuenchujit, T. Yardley, R. Berthier, J. Mason, Z. Durumeric, J A. Halderman, M. Bailey. "An internet-wide view of ICS devices." In Privacy, Security and Trust (PST), 2016 14th Annual Conference on, 96-103. [Paper]

J. Chow, D. Lucchetti, T. Garfinkel, G. Lefebvre, R. Gardner, J. Mason, S. Small, and P. Chen. "Multi-stage replay with crosscut." In ACM Sigplan Notices, vol. 45, no. 7, pp. 13-24. ACM, 2010. [Paper]

J. Mason, S. Small, F. Monrose, G. MacManus. English Shellcode. Proceedings of the 16th ACM Conference on Computer and Communications Security, Chicago, IL. November 2009. [Paper]

S. Small, J. Mason, F. Monrose, N. Provos, A. Stubblefield. To Catch a Predator: A Natural Language Approach for Eliciting Protocol Interaction. USENIX Security Symposium 2008. [Paper]

J. Mason, K. Watkins, J. Eisner, and A. Stubblefied. A Natural Language Approach to Automated Cryptanalysis of Two-time Pads. ACM CCS 2006. [Paper] [Slides]