


default search action
Damon McCoy
Person information
- affiliation: New York University, NY, USA
SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Andrés Zapata Rozo, Alejandra Campo-Archbold
, Daniel Díaz López
, Ian W. Gray, Javier Pastor-Galindo, Pantaleone Nespoli, Félix Gómez Mármol, Damon McCoy:
Cyber democracy in the digital age: Characterizing hate networks in the 2022 US midterm elections. Inf. Fusion 110: 102459 (2024) - [j20]Kejsi Take
, Victoria Zhong
, Chris Geeng
, Emmi Bevensee
, Damon McCoy
, Rachel Greenstadt
:
Stoking the Flames: Understanding Escalation in an Online Harassment Community. Proc. ACM Hum. Comput. Interact. 8(CSCW1): 1-23 (2024) - [j19]Kejsi Take, Jordyn Young, Rasika Bhalerao, Kevin Gallagher, Andrea Forte, Damon McCoy, Rachel Greenstadt:
What to Expect When You're Accessing: An Exploration of User Privacy Rights in People Search Websites. Proc. Priv. Enhancing Technol. 2024(4): 311-326 (2024) - [c93]Chris Geeng, Natalie Chen, Kieron Ivy Turk, Jevan A. Hutson, Damon McCoy:
"Say I'm in public...I don't want my nudes to pop up." User Threat Models for Using Vault Applications. SOUPS @ USENIX Security Symposium 2024: 433-451 - [i18]Shujaat Shujaat Mirza, Bruno Coelho, Yuyuan Cui, Christina Pöpper, Damon McCoy:
Global-Liar: Factuality of LLMs over Time and Geographic Regions. CoRR abs/2401.17839 (2024) - [i17]Periwinkle Doerfler, Kieron Ivy Turk
, Chris Geeng, Damon McCoy, Jeffrey Ackerman, Molly Dragiewicz:
Privacy or Transparency? Negotiated Smartphone Access as a Signifier of Trust in Romantic Relationships. CoRR abs/2407.04906 (2024) - [i16]Jack Cable, Ian W. Gray, Damon McCoy:
Showing the Receipts: Understanding the Modern Ransomware Ecosystem. CoRR abs/2408.15420 (2024) - 2023
- [j18]Enze Liu
, Sumanth Rao
, Sam Havron, Grant Ho, Stefan Savage, Geoffrey M. Voelker, Damon McCoy:
No Privacy Among Spies: Assessing the Functionality and Insecurity of Consumer Android Spyware Apps. Proc. Priv. Enhancing Technol. 2023(1): 207-224 (2023) - [c92]Bruno Coelho
, Tobias Lauinger
, Laura Edelson
, Ian Goldstein
, Damon McCoy
:
Propaganda Política Pagada: Exploring U.S. Political Facebook Ads en Español. WWW 2023: 2742-2753 - [i15]Ian Goldstein, Laura Edelson, Damon McCoy, Tobias Lauinger:
Understanding the (In)Effectiveness of Content Moderation: A Case Study of Facebook in the Context of the U.S. Capitol Riot. CoRR abs/2301.02737 (2023) - [i14]Ian W. Gray, Jack Cable, Benjamin Brown, Vlad Cuiujuclu, Damon McCoy:
Money Over Morals: A Business Analysis of Conti Ransomware. CoRR abs/2304.11681 (2023) - 2022
- [j17]Rasika Bhalerao, Nora McDonald, Hanna Barakat, Vaughn Hamilton, Damon McCoy, Elissa M. Redmiles:
Ethics and Efficacy of Unsolicited Anti-Trafficking SMS Outreach. Proc. ACM Hum. Comput. Interact. 6(CSCW2): 1-39 (2022) - [j16]Kejsi Take, Kevin Gallagher
, Andrea Forte, Damon McCoy, Rachel Greenstadt:
"It Feels Like Whack-a-mole": User Experiences of Data Removal from People Search Websites. Proc. Priv. Enhancing Technol. 2022(3): 159-178 (2022) - [c91]ChangSeok Oh
, Chris Kanich, Damon McCoy, Paul Pearce:
Cart-ology: Intercepting Targeted Advertising via Ad Network Identity Entanglement. CCS 2022: 2401-2414 - [c90]Ian W. Gray, Jack Cable, Benjamin Brown, Vlad Cuiujuclu, Damon McCoy:
Money Over Morals: A Business Analysis of Conti Ransomware. eCrime 2022: 1-12 - [c89]Rasika Bhalerao, Damon McCoy:
Libel Inc: An Analysis of the Libel Site Ecosystem. EuroS&P Workshops 2022: 1-10 - [c88]Rasika Bhalerao, Damon McCoy:
An Analysis of Terms of Service and Official Policies with Respect to Sex Work. ISTAS 2022: 1-14 - [c87]Victor Le Pochat, Laura Edelson, Tom van Goethem, Wouter Joosen, Damon McCoy, Tobias Lauinger:
An Audit of Facebook's Political Ad Policy Enforcement. USENIX Security Symposium 2022: 607-624 - [c86]Cameron Ballard, Ian Goldstein, Pulak Mehta, Genesis Smothers, Kejsi Take, Victoria Zhong
, Rachel Greenstadt, Tobias Lauinger, Damon McCoy:
Conspiracy Brokers: Understanding the Monetization of YouTube Conspiracy Theories. WWW 2022: 2707-2718 - [i13]Rasika Bhalerao, Nora McDonald, Hanna Barakat, Vaughn Hamilton, Damon McCoy, Elissa M. Redmiles:
Ethics and Efficacy of Unsolicited Anti-Trafficking SMS Outreach. CoRR abs/2202.09527 (2022) - [i12]Cameron Ballard, Ian Goldstein, Pulak Mehta, Genesis Smothers, Kejsi Take, Victoria Zhong, Rachel Greenstadt, Tobias Lauinger, Damon McCoy:
Conspiracy Brokers: Understanding the Monetization of YouTube Conspiracy Theories. CoRR abs/2205.15943 (2022) - 2021
- [j15]Alberto Bracci
, Matthieu Nadini
, Maxwell Aliapoulios
, Damon McCoy, Ian W. Gray
, Alexander Teytelboym
, Angela Gallo
, Andrea Baronchelli
:
Dark Web Marketplaces and COVID-19: before the vaccine. EPJ Data Sci. 10(1): 6 (2021) - [j14]Periwinkle Doerfler, Andrea Forte, Emiliano De Cristofaro, Gianluca Stringhini, Jeremy Blackburn, Damon McCoy:
"I'm a Professor, which isn't usually a dangerous job": Internet-facilitated Harassment and Its Impact on Researchers. Proc. ACM Hum. Comput. Interact. 5(CSCW2): 341:1-341:32 (2021) - [c85]Laura Edelson
, Minh-Kha Nguyen, Ian Goldstein, Oana Goga
, Damon McCoy, Tobias Lauinger:
Understanding engagement with U.S. (mis)information news sources on Facebook. Internet Measurement Conference 2021: 444-463 - [c84]Maxwell Aliapoulios, Kejsi Take, Prashanth Ramakrishna, Daniel Borkan, Beth Goldberg, Jeffrey Sorensen, Anna Turner, Rachel Greenstadt, Tobias Lauinger, Damon McCoy:
A large-scale characterization of online incitements to harassment across platforms. Internet Measurement Conference 2021: 621-638 - [c83]Kurt Thomas, Devdatta Akhawe, Michael D. Bailey, Dan Boneh, Elie Bursztein, Sunny Consolvo, Nicola Dell, Zakir Durumeric, Patrick Gage Kelley, Deepak Kumar, Damon McCoy, Sarah Meiklejohn, Thomas Ristenpart, Gianluca Stringhini:
SoK: Hate, Harassment, and the Changing Landscape of Online Abuse. SP 2021: 247-267 - [c82]Maxwell Aliapoulios, Cameron Ballard, Rasika Bhalerao, Tobias Lauinger, Damon McCoy:
Swiped: Analyzing Ground-truth Data of a Marketplace for Stolen Debit and Credit Cards. USENIX Security Symposium 2021: 4151-4168 - [i11]Alberto Bracci
, Matthieu Nadini, Maxwell Aliapoulios, Damon McCoy, Ian W. Gray, Alexander Teytelboym, Angela Gallo, Andrea Baronchelli:
Dark Web Marketplaces and COVID-19: The vaccines. CoRR abs/2102.05470 (2021) - [i10]Periwinkle Doerfler, Andrea Forte, Emiliano De Cristofaro, Gianluca Stringhini, Jeremy Blackburn, Damon McCoy:
"I'm a Professor, which isn't usually a dangerous job": Internet-Facilitated Harassment and its Impact on Researchers. CoRR abs/2104.11145 (2021) - 2020
- [j13]Rosanna Bellini, Emily Tseng, Nora McDonald
, Rachel Greenstadt, Damon McCoy, Thomas Ristenpart, Nicola Dell:
"So-called privacy breeds evil": Narrative Justifications for Intimate Partner Surveillance in Online Forums. Proc. ACM Hum. Comput. Interact. 4(CSCW3): 1-27 (2020) - [c81]Emmi Bevensee, Maxwell Aliapoulios, Quinn Dougherty, Jason Baumgartner, Damon McCoy, Jeremy Blackburn:
SMAT: The Social Media Analysis Toolkit. ICWSM Workshops 2020 - [c80]Shehroze Farooqi, Álvaro Feal, Tobias Lauinger, Damon McCoy, Zubair Shafiq, Narseo Vallina-Rodriguez
:
Understanding Incentivized Mobile App Installs on Google Play Store. Internet Measurement Conference 2020: 696-709 - [c79]Kevin A. Roundy
, Paula Barmaimon Mendelberg, Nicola Dell, Damon McCoy, Daniel Nissani, Thomas Ristenpart, Acar Tamersoy:
The Many Kinds of Creepware Used for Interpersonal Attacks. SP 2020: 626-643 - [c78]Laura Edelson
, Tobias Lauinger, Damon McCoy:
A Security Analysis of the Facebook Ad Library. SP 2020: 661-678 - [c77]Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, Thomas Ristenpart:
The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums. USENIX Security Symposium 2020: 1893-1909 - [c76]Janith Weerasinghe, Bailey Flanigan, Aviel J. Stein, Damon McCoy, Rachel Greenstadt:
The Pod People: Understanding Manipulation of Social Media Popularity via Reciprocity Abuse. WWW 2020: 1874-1884 - [c75]Brown Farinholt, Mohammad Rezaeirad, Damon McCoy, Kirill Levchenko:
Dark Matter: Uncovering the DarkComet RAT Ecosystem. WWW 2020: 2109-2120 - [i9]Paz Grimberg, Tobias Lauinger, Damon McCoy:
Empirical Analysis of Indirect Internal Conversions in Cryptocurrency Exchanges. CoRR abs/2002.12274 (2020) - [i8]Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, Thomas Ristenpart:
The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums. CoRR abs/2005.14341 (2020) - [i7]Alberto Bracci
, Matthieu Nadini, Maxwell Aliapoulios, Damon McCoy, Ian W. Gray, Alexander Teytelboym, Angela Gallo, Andrea Baronchelli:
The COVID-19 online shadow economy. CoRR abs/2008.01585 (2020) - [i6]Shehroze Farooqi, Álvaro Feal, Tobias Lauinger, Damon McCoy, Zubair Shafiq, Narseo Vallina-Rodriguez:
Understanding Incentivized Mobile App Installs on Google Play Store. CoRR abs/2010.01497 (2020)
2010 – 2019
- 2019
- [c74]Rasika Bhalerao, Maxwell Aliapoulios, Ilia Shumailov, Sadia Afroz, Damon McCoy:
Mapping the Underground: Supervised Discovery of Cybercrime Supply Chains. eCrime 2019: 1-16 - [c73]Prakhar Pandey, Maxwell Aliapoulios, Damon McCoy:
Iniquitous Cord-Cutting: An Analysis of Infringing IPTV Services. EuroS&P Workshops 2019: 423-432 - [c72]Sam Havron, Diana Freed, Rahul Chatterjee, Damon McCoy, Nicola Dell, Thomas Ristenpart:
Clinical Computer Security for Victims of Intimate Partner Violence. USENIX Security Symposium 2019: 105-122 - [c71]Vector Guo Li, Matthew Dunn, Paul Pearce, Damon McCoy, Geoffrey M. Voelker, Stefan Savage:
Reading the Tea leaves: A Comparative Analysis of Threat Intelligence. USENIX Security Symposium 2019: 851-867 - [c70]Arman Noroozian, Jan Koenders, Eelco van Veldhuizen, Carlos Hernandez Gañán, Sumayah A. Alrwais, Damon McCoy, Michel van Eeten:
Platforms in Everything: Analyzing Ground-Truth Data on the Anatomy and Economics of Bullet-Proof Hosting. USENIX Security Symposium 2019: 1341-1356 - [c69]Periwinkle Doerfler, Kurt Thomas, Maija Marincenko, Juri Ranieri, Yu Jiang, Angelika Moscicki, Damon McCoy:
Evaluating Login Challenges as aDefense Against Account Takeover. WWW 2019: 372-382 - [i5]Laura Edelson, Shikhar Sakhuja, Ratan Dey, Damon McCoy:
An Analysis of United States Online Political Advertising Transparency. CoRR abs/1902.04385 (2019) - 2018
- [j12]Rachel Greenstadt, Damon McCoy, Carmela Troncoso:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2018(1): 1-4 (2018) - [j11]Rachel Greenstadt, Damon McCoy, Carmela Troncoso:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2018(2): 1-3 (2018) - [j10]Rachel Greenstadt, Damon McCoy, Carmela Troncoso:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2018(3): 1-4 (2018) - [j9]Rachel Greenstadt, Damon McCoy, Carmela Troncoso:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2018(4): 1-4 (2018) - [c68]Kevin Gallagher
, Sameer Patil
, Brendan Dolan-Gavitt, Damon McCoy, Nasir D. Memon
:
Peeling the Onion's User Experience Layer: Examining Naturalistic Use of the Tor Browser. CCS 2018: 1290-1305 - [c67]Hongwei Tian, Stephen M. Gaffigan, D. Sean West, Damon McCoy:
Bullet-proof payment processors. eCrime 2018: 1-11 - [c66]Rahul Chatterjee, Periwinkle Doerfler, Hadas Orgad, Sam Havron, Jackeline Palmer, Diana Freed, Karen Levy
, Nicola Dell, Damon McCoy, Thomas Ristenpart:
The Spyware Used in Intimate Partner Violence. IEEE Symposium on Security and Privacy 2018: 441-458 - [c65]Danny Yuxing Huang, Maxwell Matthaios Aliapoulios, Vector Guo Li, Luca Invernizzi, Elie Bursztein, Kylie McRoberts, Jonathan Levin, Kirill Levchenko, Alex C. Snoeren, Damon McCoy:
Tracking Ransomware End-to-end. IEEE Symposium on Security and Privacy 2018: 618-631 - [c64]Mohammad Rezaeirad, Brown Farinholt, Hitesh Dharmdasani, Paul Pearce, Kirill Levchenko, Damon McCoy:
Schrödinger's RAT: Profiling the Stakeholders in the Remote Access Trojan Ecosystem. USENIX Security Symposium 2018: 1043-1060 - [i4]Rebekah Overdorf, Carmela Troncoso, Rachel Greenstadt, Damon McCoy:
Under the Underground: Predicting Private Interactions in Underground Forums. CoRR abs/1805.04494 (2018) - [i3]Rasika Bhalerao, Maxwell Aliapoulios, Ilia Shumailov, Sadia Afroz, Damon McCoy:
Towards Automatic Discovery of Cybercrime Supply Chains. CoRR abs/1812.00381 (2018) - 2017
- [j8]Claudia Díaz, Rachel Greenstadt, Damon McCoy:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2017(1): 1-3 (2017) - [j7]Claudia Díaz, Rachel Greenstadt, Damon McCoy:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2017(2): 1-3 (2017) - [j6]Claudia Díaz, Rachel Greenstadt, Damon McCoy:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2017(3): 1 (2017) - [j5]Claudia Díaz, Rachel Greenstadt, Damon McCoy:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2017(4): 1-4 (2017) - [c63]Greg Durrett, Jonathan K. Kummerfeld
, Taylor Berg-Kirkpatrick, Rebecca S. Portnoff, Sadia Afroz, Damon McCoy, Kirill Levchenko, Vern Paxson:
Identifying Products in Online Cybercrime Marketplaces: A Dataset for Fine-grained Domain Adaptation. EMNLP 2017: 2598-2607 - [c62]Peter Snyder, Periwinkle Doerfler, Chris Kanich, Damon McCoy:
Fifteen minutes of unwanted fame: detecting and characterizing doxing. Internet Measurement Conference 2017: 432-444 - [c61]Rebecca S. Portnoff, Danny Yuxing Huang, Periwinkle Doerfler, Sadia Afroz, Damon McCoy:
Backpage and Bitcoin: Uncovering Human Traffickers. KDD 2017: 1595-1604 - [c60]Johannes Krupp, Mohammad Karami, Christian Rossow, Damon McCoy, Michael Backes:
Linking Amplification DDoS Attacks to Booter Services. RAID 2017: 427-449 - [c59]Brown Farinholt, Mohammad Rezaeirad, Paul Pearce, Hitesh Dharmdasani, Haikuo Yin, Stevens Le Blond, Damon McCoy, Kirill Levchenko:
To Catch a Ratter: Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild. IEEE Symposium on Security and Privacy 2017: 770-787 - [c58]Sumayah A. Alrwais, Xiaojing Liao, Xianghang Mi
, Peng Wang, Xiaofeng Wang, Feng Qian, Raheem A. Beyah
, Damon McCoy:
Under the Shadow of Sunshine: Understanding and Detecting Bulletproof Hosting on Legitimate Service Provider Networks. IEEE Symposium on Security and Privacy 2017: 805-823 - [c57]Hossein Siadati, Sean Palka, Avi Siegel, Damon McCoy:
Measuring the Effectiveness of Embedded Phishing Exercises. CSET @ USENIX Security Symposium 2017 - [c56]Rebecca S. Portnoff, Sadia Afroz, Greg Durrett, Jonathan K. Kummerfeld, Taylor Berg-Kirkpatrick, Damon McCoy, Kirill Levchenko, Vern Paxson:
Tools for Automated Analysis of Cybercriminal Markets. WWW 2017: 657-666 - [i2]Greg Durrett, Jonathan K. Kummerfeld, Taylor Berg-Kirkpatrick, Rebecca S. Portnoff, Sadia Afroz, Damon McCoy, Kirill Levchenko, Vern Paxson:
Identifying Products in Online Cybercrime Marketplaces: A Dataset for Fine-grained Domain Adaptation. CoRR abs/1708.09609 (2017) - 2016
- [j4]Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, Stefan Savage:
A fistful of Bitcoins: characterizing payments among men with no names. Commun. ACM 59(4): 86-93 (2016) - [c55]Srikanth Sundaresan, Damon McCoy, Sadia Afroz, Vern Paxson:
Profiling underground merchants based on network behavior. eCrime 2016: 62-70 - [c54]Khaled Baqer, Danny Yuxing Huang, Damon McCoy, Nicholas Weaver:
Stressing Out: Bitcoin "Stress Testing". Financial Cryptography Workshops 2016: 3-18 - [c53]Youngsam Park, Damon McCoy, Elaine Shi:
Understanding Craigslist Rental Scams. Financial Cryptography 2016: 3-21 - [c52]Sheharbano Khattak, David Fifield, Sadia Afroz, Mobin Javed, Srikanth Sundaresan, Damon McCoy, Vern Paxson, Steven J. Murdoch:
Do You See What I See? Differential Treatment of Anonymous Users. NDSS 2016 - [c51]Kurt Thomas, Juan A. Elices Crespo, Ryan Rasti, Jean-Michel Picod, Cait Phillips, Marc-André Decoste, Chris Sharp, Fabio Tirelo, Ali Tofigh, Marc-Antoine Courteau, Lucas Ballard, Robert Shield, Nav Jagpal, Moheeb Abu Rajab, Panayiotis Mavrommatis, Niels Provos, Elie Bursztein, Damon McCoy:
Investigating Commercial Pay-Per-Install and the Distribution of Unwanted Software. USENIX Security Symposium 2016: 721-739 - [c50]Frank Li, Zakir Durumeric, Jakub Czyz, Mohammad Karami, Michael D. Bailey, Damon McCoy, Stefan Savage, Vern Paxson:
You've Got Vulnerability: Exploring Effective Vulnerability Notifications. USENIX Security Symposium 2016: 1033-1050 - [c49]Sahar Mazloom, Mohammad Rezaeirad, Aaron Hunter, Damon McCoy:
A Security Analysis of an In-Vehicle Infotainment and App Platform. WOOT 2016 - [c48]Xiaojing Liao, Chang Liu, Damon McCoy, Elaine Shi, Shuang Hao, Raheem A. Beyah
:
Characterizing Long-tail SEO Spam on Cloud Web Hosting Services. WWW 2016: 321-332 - [c47]Mohammad Karami, Youngsam Park, Damon McCoy:
Stress Testing the Booters: Understanding and Undermining the Business of DDoS Services. WWW 2016: 1033-1043 - [p3]Damon McCoy, Youngsam Park, Elaine Shi, Markus Jakobsson:
Identifying Scams and Trends. Understanding Social Engineering Based Scams 2016: 7-19 - [p2]Damon McCoy, Youngsam Park, Elaine Shi, Markus Jakobsson:
Case Study: Sales Scams. Understanding Social Engineering Based Scams 2016: 77-87 - [p1]Damon McCoy, Youngsam Park, Elaine Shi, Markus Jakobsson:
Case Study: Rental Scams. Understanding Social Engineering Based Scams 2016: 89-102 - 2015
- [c46]Jason W. Clark, Peter Snyder, Damon McCoy, Chris Kanich:
"I Saw Images I Didn't Even Know I Had": Understanding User Perceptions of Cloud Storage Privacy. CHI 2015: 1641-1644 - [c45]Sean Palka, Damon McCoy:
Dynamic phishing content using generative grammars. ICST Workshops 2015: 1-8 - [c44]Kurt Thomas, Elie Bursztein, Chris Grier, Grant Ho, Nav Jagpal, Alexandros Kapravelos, Damon McCoy, Antonio Nappa
, Vern Paxson, Paul Pearce, Niels Provos, Moheeb Abu Rajab:
Ad Injection at Scale: Assessing Deceptive Advertisement Modifications. IEEE Symposium on Security and Privacy 2015: 151-167 - [c43]Kurt Thomas, Danny Yuxing Huang, David Y. Wang, Elie Bursztein, Chris Grier, Tom Holt, Christopher Kruegel, Damon McCoy, Stefan Savage, Giovanni Vigna:
Framing Dependencies Introduced by Underground Commoditization. WEIS 2015 - [c42]Sean Palka, Damon McCoy:
Fuzzing E-mail Filters with Generative Grammars and N-Gram Analysis. WOOT 2015 - [i1]Mohammad Karami, Youngsam Park, Damon McCoy:
Stress Testing the Booters: Understanding and Undermining the Business of DDoS Services. CoRR abs/1508.03410 (2015) - 2014
- [c41]Paul Pearce, Vacha Dave, Chris Grier, Kirill Levchenko, Saikat Guha, Damon McCoy, Vern Paxson, Stefan Savage, Geoffrey M. Voelker:
Characterizing Large-Scale Click Fraud in ZeroAccess. CCS 2014: 141-152 - [c40]Kurt Thomas, Dmytro Iatskiv, Elie Bursztein, Tadek Pietraszek, Chris Grier, Damon McCoy:
Dialing Back Abuse on Phone Verified Accounts. CCS 2014: 465-476 - [c39]Jackie Jones, Damon McCoy:
The check is in the mail: Monetization of Craigslist buyer scams. eCrime 2014: 25-35 - [c38]David Y. Wang, Matthew F. Der, Mohammad Karami, Lawrence K. Saul, Damon McCoy, Stefan Savage, Geoffrey M. Voelker:
Search + Seizure: The Effectiveness of Interventions on SEO Campaigns. Internet Measurement Conference 2014: 359-372 - [c37]Danny Yuxing Huang, Hitesh Dharmdasani, Sarah Meiklejohn, Vacha Dave, Chris Grier, Damon McCoy, Stefan Savage, Nicholas Weaver, Alex C. Snoeren, Kirill Levchenko:
Botcoin: Monetizing Stolen Cycles. NDSS 2014 - [c36]Youngsam Park, Jackie Jones, Damon McCoy, Elaine Shi, Markus Jakobsson:
Scambaiter: Understanding Targeted Nigerian Scams on Craigslist. NDSS 2014 - [c35]Hamed Sarvari, Ehab Atif Abozinadah
, Alex Mbaziira, Damon McCoy:
Constructing and Analyzing Criminal Networks. IEEE Symposium on Security and Privacy Workshops 2014: 84-91 - [c34]Sadia Afroz, Aylin Caliskan Islam, Ariel Stolerman, Rachel Greenstadt, Damon McCoy:
Doppelgänger Finder: Taking Stylometry to the Underground. IEEE Symposium on Security and Privacy 2014: 212-226 - 2013
- [j3]Mohammad Karami, Damon McCoy:
Rent to Pwn: Analyzing Commodity Booter DDoS Services. login Usenix Mag. 38(6) (2013) - [j2]Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, Stefan Savage:
A Fistful of Bitcoins: Characterizing Payments Among Men with No Names. login Usenix Mag. 38(6) (2013) - [c33]Sadia Afroz, Vaibhav Garg, Damon McCoy, Rachel Greenstadt:
Honor among thieves: A common's analysis of cybercrime economies. eCrime 2013: 1-11 - [c32]Mohammad Karami, Shiva Ghaemi, Damon McCoy:
Folex: An analysis of an herbal and counterfeit luxury goods affiliate program. eCrime 2013: 1-9 - [c31]Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, Stefan Savage:
A fistful of bitcoins: characterizing payments among men with no names. Internet Measurement Conference 2013: 127-140 - [c30]Jason W. Clark, Damon McCoy:
There Are No Free iPads: An Analysis of Survey Scams as a Business. LEET 2013 - [c29]Mohammad Karami, Damon McCoy:
Understanding the Emerging Threat of DDoS-as-a-Service. LEET 2013 - [c28]Christopher E. Everett, Damon McCoy:
OCTANE (Open Car Testbed and Network Experiments): Bringing Cyber-Physical Security Research to Researchers and Students. CSET 2013 - [c27]Kurt Thomas, Damon McCoy, Chris Grier, Alek Kolcz, Vern Paxson:
Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse. USENIX Security Symposium 2013: 195-210 - 2012
- [c26]Chris Grier, Lucas Ballard, Juan Caballero, Neha Chachra, Christian J. Dietrich, Kirill Levchenko, Panayiotis Mavrommatis, Damon McCoy, Antonio Nappa
, Andreas Pitsillidis, Niels Provos, M. Zubair Rafique, Moheeb Abu Rajab, Christian Rossow, Kurt Thomas, Vern Paxson, Stefan Savage, Geoffrey M. Voelker:
Manufacturing compromise: the emergence of exploit-as-a-service. CCS 2012: 821-832 - [c25]Damon McCoy, Hitesh Dharmdasani, Christian Kreibich, Geoffrey M. Voelker, Stefan Savage:
Priceless: the role of payments in abuse-advertised goods. CCS 2012: 845-856 - [c24]Damon McCoy, Andreas Pitsillidis, Grant Jordan, Nicholas Weaver, Christian Kreibich, Brian Krebs, Geoffrey M. Voelker, Stefan Savage, Kirill Levchenko:
PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs. USENIX Security Symposium 2012: 1-16 - 2011
- [c23]Damon McCoy, Jose Andre Morales
, Kirill Levchenko:
Proximax: Measurement-Driven Proxy Dissemination (Short Paper). Financial Cryptography 2011: 260-267 - [c22]Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker:
An analysis of underground forums. Internet Measurement Conference 2011: 71-80 - [c21]Mashael AlSabah, Kevin S. Bauer, Ian Goldberg, Dirk Grunwald, Damon McCoy, Stefan Savage, Geoffrey M. Voelker:
DefenestraTor: Throwing Out Windows in Tor. PETS 2011: 134-154 - [c20]Kirill Levchenko, Andreas Pitsillidis, Neha Chachra, Brandon Enright, Márk Félegyházi, Chris Grier, Tristan Halvorson, Chris Kanich, Christian Kreibich, He Liu, Damon McCoy, Nicholas Weaver, Vern Paxson, Geoffrey M. Voelker, Stefan Savage:
Click Trajectories: End-to-End Analysis of the Spam Value Chain. IEEE Symposium on Security and Privacy 2011: 431-446 - [c19]Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, Tadayoshi Kohno:
Comprehensive Experimental Analyses of Automotive Attack Surfaces. USENIX Security Symposium 2011 - [c18]Chris Kanich, Neha Chachra, Damon McCoy, Chris Grier, David Y. Wang, Marti Motoyama, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker:
No Plan Survives Contact: Experience with Cybercrime Measurement. CSET 2011 - [c17]Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorson, Christian Kreibich, Kirill Levchenko, Vern Paxson, Geoffrey M. Voelker, Stefan Savage:
Show Me the Money: Characterizing Spam-advertised Revenue. USENIX Security Symposium 2011 - [c16]Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker:
Dirty Jobs: The Role of Freelance Labor in Web Service Abuse. USENIX Security Symposium 2011 - 2010
- [j1]Jeffrey Pang, Ben Greenstein, Michael Kaminsky, Damon McCoy, Srinivasan Seshan
:
Wifi-Reports: Improving Wireless Network Selection with Collaboration. IEEE Trans. Mob. Comput. 9(12): 1713-1731 (2010) - [c15]Harold Gonzales, Kevin S. Bauer, Janne Lindqvist, Damon McCoy, Douglas C. Sicker
:
Practical Defenses for Evil Twin Attacks in 802.11. GLOBECOM 2010: 1-6 - [c14]Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak N. Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage:
Experimental Security Analysis of a Modern Automobile. IEEE Symposium on Security and Privacy 2010: 447-462 - [c13]Marti Motoyama, Kirill Levchenko, Chris Kanich, Damon McCoy, Geoffrey M. Voelker, Stefan Savage:
Re: CAPTCHAs-Understanding CAPTCHA-Solving Services in an Economic Context. USENIX Security Symposium 2010: 435-462
2000 – 2009
- 2009
- [c12]Kevin S. Bauer, Damon McCoy, Eric W. Anderson
, Markus Breitenbach, Gregory Z. Grudic, Dirk Grunwald, Douglas C. Sicker
:
The Directional Attack on Wireless Localization -or- How to Spoof Your Location with a Tin Can. GLOBECOM 2009: 1-6 - [c11]Jeffrey Pang, Ben Greenstein, Michael Kaminsky, Damon McCoy, Srinivasan Seshan
:
Wifi-reports: improving wireless network selection with collaboration. MobiSys 2009: 123-136 - [c10]Kevin S. Bauer, Damon McCoy, Ben Greenstein, Dirk Grunwald, Douglas C. Sicker
:
Physical Layer Attacks on Unlinkability in Wireless LANs. Privacy Enhancing Technologies 2009: 108-127 - [c9]Kevin S. Bauer, Damon McCoy, Ben Greenstein, Dirk Grunwald, Douglas C. Sicker
:
Performing traffic analysis on a wireless identifier-free link layer. Richard Tapia Celebration of Diversity in Computing Conference 2009: 18-23 - [c8]Kevin S. Bauer, Damon McCoy, Dirk Grunwald, Douglas C. Sicker
:
BitStalker: Accurately and efficiently monitoring bittorrent traffic. WIFS 2009: 181-185 - 2008
- [c7]Kevin S. Bauer, Harold Gonzales, Damon McCoy:
Mitigating Evil Twin Attacks in 802.11. IPCCC 2008: 513-516 - [c6]Ben Greenstein, Damon McCoy, Jeffrey Pang, Tadayoshi Kohno, Srinivasan Seshan
, David Wetherall:
Improving wireless privacy with an identifier-free link layer protocol. MobiSys 2008: 40-53 - [c5]Damon McCoy, Kevin S. Bauer, Dirk Grunwald, Tadayoshi Kohno, Douglas C. Sicker
:
Shining Light in Dark Places: Understanding the Tor Network. Privacy Enhancing Technologies 2008: 63-76 - [c4]Kevin S. Bauer, Damon McCoy, Dirk Grunwald, Douglas C. Sicker
:
BitBlender: Light-Weight Anonymity for BitTorrent. SecureComm 2008 - 2007
- [c3]Damon McCoy, Douglas C. Sicker
, Dirk Grunwald:
A Mechanism for Detecting and Responding to Misbehaving Nodes in Wireless Networks. SECON 2007: 678-684 - [c2]Kevin S. Bauer, Damon McCoy, Dirk Grunwald, Tadayoshi Kohno, Douglas C. Sicker
:
Low-resource routing attacks against tor. WPES 2007: 11-20 - 2006
- [c1]Jason Franklin, Damon McCoy:
Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting. USENIX Security Symposium 2006
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-04 21:21 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint