
views: 54
Joshua Mason
Sign in to view more

Ego Network
D-Core
Research Interests
Author Statistics
Experience
Sign in to view more
Education
Sign in to view more
Bio
None
Papers18 papers
Sort
By YearBy Citation
Zane Ma, Joshua Reynolds, Joseph Dickinson, Kaishen Wang, Taylor Judd, Joseph D. Barnes,Joshua Mason, Michael Bailey
CSET @ USENIX Security Symposium, (2019)
AsiaCCS, pp.73-85, (2019)
Deepak Kumar, Riccardo Paccagnella, Paul Murley, Eric Hennenfent,Joshua Mason,Adam Bates,Michael Bailey
ieee symposium on security and privacy, pp.1-1, (2019)
Amin Kharraz, Zane Ma, Paul Murley,Charles Lever,Joshua Mason,Andrew Miller,Nikita Borisov,Manos Antonakakis,Michael Bailey
WWW '19: The Web Conference on The World Wide Web Conference WWW 2019, pp.840-852, (2019)
IMC, pp.91-104, (2018)
Deepak Kumar,Zhengping Wang, Matthew Hyder, Joseph Dickinson,Gabrielle Beck,David Adrian,Joshua Mason,Zakir Durumeric,J. Alex Halderman,Michael Bailey
IEEE Symposium on Security and Privacy, pp.785-798, (2018)
Deepak Kumar, Riccardo Paccagnella, Paul Murley, Eric Hennenfent,Joshua Mason,Adam M. Bates,Michael Bailey
USENIX Security Symposium, pp.33-47, (2018)
USENIX Security Symposium, pp.1371-1385, (2018)
WWW, pp.677-684, (2017)
Manos Antonakakis, Tim April,Michael Bailey, Matt Bernhard,Elie Bursztein, Jaime Cochran,Zakir Durumeric,J. Alex Halderman,Luca Invernizzi, Michalis Kallitsis,Deepak Kumar, Chaz Lever
USENIX Security Symposium, pp.1093-1110, (2017)
Ariana Mirian, Zane Ma,David Adrian, Matthew Tischer, Thasphon Chuenchujit,Tim Yardley,Robin Berthier,Joshua Mason,Zakir Durumeric,J. Alex Halderman,Michael Bailey
2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), pp.96-103, (2016)
Special Interest Group on Programming Languages, no. 7 (2010): 13-24
Jim Chow, Dominic G. Lucchetti,Tal Garfinkel,Geoffrey Lefebvre, Ryan Gardner,Joshua Mason,Sam Small,Peter M. Chen
VEE, pp.13-24, (2010)
ACM Conference on Computer and Communications Security, pp.524-533, (2009)
;login:, no. 6 (2008)
USENIX Security Symposium, pp.171-183, (2008)
ACM Conference on Computer and Communications Security, pp.235-244, (2006)
View All