Deepak Kumar, Riccardo Paccagnella, Paul Murley, Eric Hennenfent, Joshua Mason, Adam Bates, Michael Bailey. Skill Squatting Attacks on Amazon Alexa. To appear in 27th USENIX Security Symposium (USENIX Security '18), Baltimore, Maryland, August 15-17, 2018.
Yi Zhou, Deepak Kumar , Surya Bakshi, Joshua Mason, Andrew Miller, Michael Bailey. Erays: Reverse Engineering Ethereum's Opaque Smart Contracts. To appear in 27th USENIX Security Symposium (USENIX Security '18), Baltimore, Maryland, August 15-17, 2018.
Deepak Kumar, Zhengping Wang, Matthew Hyder, Joseph Dickinson, Joshua Mason, Michael Bailey, Gabrielle Beck, David Adrian, Zakir Durumeric, J. Alex Halderman. Tracking Certificate Misissuance in the Wild. To appear in 39th IEEE Symposium on Security and Privacy (Oakland '18), San Francisco, CA. May 21-23, 2018. [Paper]
M. Antonakakis, T. April, M. Bailey, M. Bernhard, E. Bursztein, J. Cochran, Z. Durumeric, J. A. Halderman, L. Invernizzi, M. Kallitsis, D. Kumar, C. Lever, Z. Ma, J. Mason, D. Menscher, C. Seaman, N. Sullivan, K. Thomas, Y. Zhou. Understanding the Mirai Botnet. In 26th USENIX Security Symposium (USENIX Security '17), Vancouver, Canada, August 16-18, 2017. [Paper]
D. Kumar, Z. Ma, Z. Durumeric, A. Mirian, J. Mason, M. Bailey, and J. A. Halderman. Security Challenges in an Increasingly Tangled Web. In 26th World Wide Web Conference (WWW'17). Perth, Australia. April 3 - 7, 2017. [Paper]
A. Mirian, Z. Ma, D. Adrian, M. Tischer, T. Chuenchujit, T. Yardley, R. Berthier, J. Mason, Z. Durumeric, J A. Halderman, M. Bailey. "An internet-wide view of ICS devices." In Privacy, Security and Trust (PST), 2016 14th Annual Conference on, 96-103. [Paper]
J. Chow, D. Lucchetti, T. Garfinkel, G. Lefebvre, R. Gardner, J. Mason, S. Small, and P. Chen. "Multi-stage replay with crosscut." In ACM Sigplan Notices, vol. 45, no. 7, pp. 13-24. ACM, 2010. [Paper]
J. Mason, S. Small, F. Monrose, G. MacManus. English Shellcode. Proceedings of the 16th ACM Conference on Computer and Communications Security, Chicago, IL. November 2009. [Paper]
S. Small, J. Mason, F. Monrose, N. Provos, A. Stubblefield. To Catch a Predator: A Natural Language Approach for Eliciting Protocol Interaction. USENIX Security Symposium 2008. [Paper]
J. Mason, K. Watkins, J. Eisner, and A. Stubblefied. A Natural Language Approach to Automated Cryptanalysis of Two-time Pads. ACM CCS 2006. [Paper] [Slides]