Understanding the mirai botnet M Antonakakis, T April, M Bailey, M Bernhard, E Bursztein, J Cochran, ... 26th USENIX security symposium (USENIX Security 17), 1093-1110, 2017 | 2473 | 2017 |
Skill squatting attacks on Amazon Alexa D Kumar, R Paccagnella, P Murley, E Hennenfent, J Mason, A Bates, ... 27th USENIX security symposium (USENIX Security 18), 33-47, 2018 | 218 | 2018 |
Measuring ethereum network peers SK Kim, Z Ma, S Murali, J Mason, A Miller, M Bailey Proceedings of the Internet Measurement Conference 2018, 91-104, 2018 | 195 | 2018 |
An internet-wide view of ics devices A Mirian, Z Ma, D Adrian, M Tischer, T Chuenchujit, T Yardley, R Berthier, ... 2016 14th Annual Conference on Privacy, Security and Trust (PST), 96-103, 2016 | 128 | 2016 |
Erays: reverse engineering ethereum's opaque smart contracts Y Zhou, D Kumar, S Bakshi, J Mason, A Miller, M Bailey 27th USENIX security symposium (USENIX Security 18), 1371-1385, 2018 | 120 | 2018 |
Tracking certificate misissuance in the wild D Kumar, Z Wang, M Hyder, J Dickinson, G Beck, D Adrian, J Mason, ... 2018 IEEE Symposium on Security and Privacy (SP), 785-798, 2018 | 110 | 2018 |
Outguard: Detecting in-browser covert cryptocurrency mining in the wild A Kharraz, Z Ma, P Murley, C Lever, J Mason, A Miller, N Borisov, ... The World Wide Web Conference, 840-852, 2019 | 108 | 2019 |
English shellcode J Mason, S Small, F Monrose, G MacManus Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 102 | 2009 |
Designing toxic content classification for a diversity of perspectives D Kumar, PG Kelley, S Consolvo, J Mason, E Bursztein, Z Durumeric, ... Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021), 299-318, 2021 | 85 | 2021 |
Security challenges in an increasingly tangled web D Kumar, Z Ma, Z Durumeric, A Mirian, J Mason, JA Halderman, M Bailey Proceedings of the 26th International Conference on World Wide Web, 677-684, 2017 | 79 | 2017 |
Jetset: Targeted firmware rehosting for embedded systems E Johnson, M Bland, YF Zhu, J Mason, S Checkoway, S Savage, ... 30th USENIX Security Symposium (USENIX Security 21), 321-338, 2021 | 63 | 2021 |
Multi-stage replay with crosscut J Chow, D Lucchetti, T Garfinkel, G Lefebvre, R Gardner, J Mason, ... Proceedings of the 6th ACM SIGPLAN/SIGOPS international conference on …, 2010 | 56 | 2010 |
The severest of them all: Inference attacks against secure virtual enclaves J Werner, J Mason, M Antonakakis, M Polychronakis, F Monrose Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019 | 45 | 2019 |
Empirical Measurement of Systemic {2FA} Usability J Reynolds, N Samarin, J Barnes, T Judd, J Mason, M Bailey, S Egelman 29th USENIX Security Symposium (USENIX Security 20), 127-143, 2020 | 43 | 2020 |
To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads. S Small, J Mason, F Monrose, N Provos, A Stubblefield USENIX Security Symposium, 171-184, 2008 | 41 | 2008 |
A natural language approach to automated cryptanalysis of two-time pads J Mason, K Watkins, J Eisner, A Stubblefield Proceedings of the 13th ACM conference on Computer and communications …, 2006 | 39 | 2006 |
University of Illinois at Urbana-Champaign W Zhou, D Kumar, S Bakshi, J Mason, A Miller, M Bailey United States, 2018 | 30 | 2018 |
Measuring identity confusion with uniform resource locators J Reynolds, D Kumar, Z Ma, R Subramanian, M Wu, M Shelton, J Mason, ... Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems …, 2020 | 29 | 2020 |
Websocket adoption and the landscape of the real-time web P Murley, Z Ma, J Mason, M Bailey, A Kharraz Proceedings of the Web Conference 2021, 1192-1203, 2021 | 28 | 2021 |
Security evaluation of Apple’s iPhone C Miller, J Honoroff, J Mason Independent Security Evaluators 19, 2007 | 24 | 2007 |