Joshua Mason

joshm [\x40] illinois [\x2e] edu
Information Trust Institute
University of Illinois Urbana-Champaign

I completed my Ph.D. at Johns Hopkins University in the Computer Science Department in 2009. My advisor was Fabian Monrose. I am now research faculty at the the University of Illinois Urbana-Champaign under Michael Bailey as of January, 2016.

Note: This page has only recently been created and is a work in progress. Listed below are my publications and presentations. More will probably be added in the coming weeks.


M. Antonakakis, T. April, M. Bailey, M. Bernhard, E. Bursztein, J. Cochran, Z. Durumeric, J. A. Halderman, L. Invernizzi, M. Kallitsis, D. Kumar, C. Lever, Z. Ma, J. Mason, D. Menscher, C. Seaman, N. Sullivan, K. Thomas, Y. Zhou. Understanding the Mirai Botnet. In 26th USENIX Security Symposium (USENIX Security '17), Vancouver, Canada, August 16-18, 2017. [Paper]

D. Kumar, Z. Ma, Z. Durumeric, A. Mirian, J. Mason, M. Bailey, and J. A. Halderman. Security Challenges in an Increasingly Tangled Web. In 26th World Wide Web Conference (WWW'17). Perth, Australia. April 3 - 7, 2017. [Paper]

A. Mirian, Z. Ma, D. Adrian, M. Tischer, T. Chuenchujit, T. Yardley, R. Berthier, J. Mason, Z. Durumeric, J A. Halderman, M. Bailey. "An internet-wide view of ICS devices." In Privacy, Security and Trust (PST), 2016 14th Annual Conference on, 96-103. [Paper]

J. Chow, D. Lucchetti, T. Garfinkel, G. Lefebvre, R. Gardner, J. Mason, S. Small, and P. Chen. "Multi-stage replay with crosscut." In ACM Sigplan Notices, vol. 45, no. 7, pp. 13-24. ACM, 2010. [Paper]

J. Mason, S. Small, F. Monrose, G. MacManus. English Shellcode. Proceedings of the 16th ACM Conference on Computer and Communications Security, Chicago, IL. November 2009. [Paper]

S. Small, J. Mason, F. Monrose, N. Provos, A. Stubblefield. To Catch a Predator: A Natural Language Approach for Eliciting Protocol Interaction. USENIX Security Symposium 2008. [Paper]

J. Mason, K. Watkins, J. Eisner, and A. Stubblefied. A Natural Language Approach to Automated Cryptanalysis of Two-time Pads. ACM CCS 2006. [Paper] [Slides]