Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Joshua Mason is active.

Publication


Featured researches published by Joshua Mason.


computer and communications security | 2009

English shellcode

Joshua Mason; Sam Small; Fabian Monrose; Greg MacManus

History indicates that the security community commonly takes a divide-and-conquer approach to battling malware threats: identify the essential and inalienable components of an attack, then develop detection and prevention techniques that directly target one or more of the essential components. This abstraction is evident in much of the literature for buffer overflow attacks including, for instance, stack protection and NOP sled detection. It comes as no surprise then that we approach shellcode detection and prevention in a similar fashion. However, the common belief that components of polymorphic shellcode (e.g., the decoder) cannot reliably be hidden suggests a more implicit and broader assumption that continues to drive contemporary research: namely, that valid and complete representations of shellcode are fundamentally different in structure than benign payloads. While the first tenet of this assumption is philosophically undeniable (i.e., a string of bytes is either shellcode or it is not), truth of the latter claim is less obvious if there exist encoding techniques capable of producing shellcode with features nearly indistinguishable from non-executable content. In this paper, we challenge the assumption that shellcode must conform to superficial and discernible representations. Specifically, we demonstrate a technique for automatically producing English Shellcode, transforming arbitrary shellcode into a representation that is superficially similar to English prose. The shellcode is completely self-contained---i.e., it does not require an external loader and executes as valid IA32 code)---and can typically be generated in under an hour on commodity hardware. Our primary objective in this paper is to promote discussion and stimulate new ideas for thinking ahead about preventive measures for tackling evolutions in code-injection attacks.


conference on privacy security and trust | 2016

An Internet-wide view of ICS devices

Ariana Mirian; Zane Ma; David Adrian; Matthew Tischer; Thasphon Chuenchujit; Tim Yardley; Robin Berthier; Joshua Mason; Zakir Durumeric; J. Alex Halderman; Michael Bailey

Industrial control systems have become ubiquitous, enabling the remote, electronic control of physical equipment and sensors. Originally designed to operate on closed networks, the protocols used by these devices have no built-in security. However, despite this, an alarming number of systems are connected to the public Internet and an attacker who finds a device often can cause catastrophic damage to physical infrastructure. We consider two aspects of ICS security in this work: (1) what devices have been inadvertently exposed on the public Internet, and (2) who is searching for vulnerable systems. First, we implement five common SCADA protocols in ZMap and conduct a survey of the public IPv4 address space finding more than 60K publicly accessible systems. Second, we use a large network telescope and high-interaction honeypots to find and profile actors searching for devices. We hope that our findings can both motivate and inform future work on securing industrial control systems.


international world wide web conferences | 2017

Security Challenges in an Increasingly Tangled Web

Deepak Kumar; Zane Ma; Zakir Durumeric; Ariana Mirian; Joshua Mason; J. Alex Halderman; Michael Bailey

Over the past 20 years, websites have grown increasingly complex and interconnected. In 2016, only a negligible number of sites are dependency free, and over 90% of sites rely on external content. In this paper, we investigate the current state of web dependencies and explore two security challenges associated with the increasing reliance on external services: (1) the expanded attack surface associated with serving unknown, implicitly trusted third-party content, and (2) how the increased set of external dependencies impacts HTTPS adoption. We hope that by shedding light on these issues, we can encourage developers to consider the security risks associated with serving third-party content and prompt service providers to more widely deploy HTTPS.


usenix security symposium | 2017

Understanding the Mirai Botnet

Manos Antonakakis; Tim April; Michael Bailey; Matt Bernhard; Elie Bursztein; Jaime Cochran; Zakir Durumeric; J. Alex Halderman; Luca Invernizzi; Michalis Kallitsis; Deepak Kumar; Chaz Lever; Zane Ma; Joshua Mason; Damian Menscher; Chad Seaman; Nick Sullivan; Kurt Thomas; Yi Zhou


virtual execution environments | 2010

Multi-stage replay with crosscut

Jim Chow; Dominic Lucchetti; Tal Garfinkel; Geoffrey Lefebvre; Ryan Gardner; Joshua Mason; Sam Small; Peter M. Chen


usenix security symposium | 2008

To catch a predator: a natural language approach for eliciting malicious payloads

Sam Small; Joshua Mason; Fabian Monrose; Niels Provos; Adam Stubblefield


computer and communications security | 2006

A natural language approach to automated cryptanalysis of two-time pads

Joshua Mason; Kathryn Watkins; Jason Eisner; Adam Stubblefield


usenix security symposium | 2018

Erays: Reverse Engineering Ethereum's Opaque Smart Contracts.

Yi Zhou; Deepak Kumar; Surya Bakshi; Joshua Mason; Andrew Miller; Michael Bailey


usenix security symposium | 2018

Skill Squatting Attacks on Amazon Alexa.

Deepak Kumar; Riccardo Paccagnella; Paul Murley; Eric Hennenfent; Joshua Mason; Adam M. Bates; Michael Bailey


ieee symposium on security and privacy | 2018

Tracking Certificate Misissuance in the Wild

Deepak Kumar; Zhengping Wang; Matthew Hyder; Joseph Dickinson; Gabrielle Beck; David Adrian; Joshua Mason; Zakir Durumeric; J. Alex Halderman; Michael Bailey

Collaboration


Dive into the Joshua Mason's collaboration.

Top Co-Authors

Avatar

Deepak Kumar

Indian Institute of Technology Delhi

View shared research outputs
Top Co-Authors

Avatar

Fabian Monrose

University of North Carolina at Chapel Hill

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Sam Small

Johns Hopkins University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Chaz Lever

Georgia Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge