


default search action
Damon McCoy
Person information
- affiliation: New York University, NY, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j21]Andrés Zapata Rozo, Alejandra Campo-Archbold
, Daniel Díaz López
, Ian W. Gray, Javier Pastor-Galindo, Pantaleone Nespoli, Félix Gómez Mármol, Damon McCoy:
Cyber democracy in the digital age: Characterizing hate networks in the 2022 US midterm elections. Inf. Fusion 110: 102459 (2024) - [j20]Kejsi Take
, Victoria Zhong
, Chris Geeng
, Emmi Bevensee
, Damon McCoy
, Rachel Greenstadt
:
Stoking the Flames: Understanding Escalation in an Online Harassment Community. Proc. ACM Hum. Comput. Interact. 8(CSCW1): 1-23 (2024) - [j19]Kejsi Take, Jordyn Young, Rasika Bhalerao, Kevin Gallagher, Andrea Forte, Damon McCoy, Rachel Greenstadt:
What to Expect When You're Accessing: An Exploration of User Privacy Rights in People Search Websites. Proc. Priv. Enhancing Technol. 2024(4): 311-326 (2024) - [c93]Chris Geeng, Natalie Chen, Kieron Ivy Turk, Jevan A. Hutson, Damon McCoy:
"Say I'm in public...I don't want my nudes to pop up." User Threat Models for Using Vault Applications. SOUPS @ USENIX Security Symposium 2024: 433-451 - [i18]Shujaat Shujaat Mirza, Bruno Coelho, Yuyuan Cui, Christina Pöpper, Damon McCoy:
Global-Liar: Factuality of LLMs over Time and Geographic Regions. CoRR abs/2401.17839 (2024) - [i17]Periwinkle Doerfler, Kieron Ivy Turk
, Chris Geeng, Damon McCoy, Jeffrey Ackerman, Molly Dragiewicz:
Privacy or Transparency? Negotiated Smartphone Access as a Signifier of Trust in Romantic Relationships. CoRR abs/2407.04906 (2024) - [i16]Jack Cable, Ian W. Gray, Damon McCoy:
Showing the Receipts: Understanding the Modern Ransomware Ecosystem. CoRR abs/2408.15420 (2024) - 2023
- [j18]Enze Liu
, Sumanth Rao
, Sam Havron, Grant Ho, Stefan Savage, Geoffrey M. Voelker, Damon McCoy:
No Privacy Among Spies: Assessing the Functionality and Insecurity of Consumer Android Spyware Apps. Proc. Priv. Enhancing Technol. 2023(1): 207-224 (2023) - [c92]Bruno Coelho
, Tobias Lauinger
, Laura Edelson
, Ian Goldstein
, Damon McCoy
:
Propaganda Política Pagada: Exploring U.S. Political Facebook Ads en Español. WWW 2023: 2742-2753 - [i15]Ian Goldstein, Laura Edelson, Damon McCoy, Tobias Lauinger:
Understanding the (In)Effectiveness of Content Moderation: A Case Study of Facebook in the Context of the U.S. Capitol Riot. CoRR abs/2301.02737 (2023) - [i14]Ian W. Gray, Jack Cable, Benjamin Brown, Vlad Cuiujuclu, Damon McCoy:
Money Over Morals: A Business Analysis of Conti Ransomware. CoRR abs/2304.11681 (2023) - 2022
- [j17]Rasika Bhalerao, Nora McDonald, Hanna Barakat, Vaughn Hamilton, Damon McCoy, Elissa M. Redmiles:
Ethics and Efficacy of Unsolicited Anti-Trafficking SMS Outreach. Proc. ACM Hum. Comput. Interact. 6(CSCW2): 1-39 (2022) - [j16]Kejsi Take, Kevin Gallagher
, Andrea Forte, Damon McCoy, Rachel Greenstadt:
"It Feels Like Whack-a-mole": User Experiences of Data Removal from People Search Websites. Proc. Priv. Enhancing Technol. 2022(3): 159-178 (2022) - [c91]ChangSeok Oh
, Chris Kanich, Damon McCoy, Paul Pearce:
Cart-ology: Intercepting Targeted Advertising via Ad Network Identity Entanglement. CCS 2022: 2401-2414 - [c90]Ian W. Gray, Jack Cable, Benjamin Brown, Vlad Cuiujuclu, Damon McCoy:
Money Over Morals: A Business Analysis of Conti Ransomware. eCrime 2022: 1-12 - [c89]Rasika Bhalerao, Damon McCoy:
Libel Inc: An Analysis of the Libel Site Ecosystem. EuroS&P Workshops 2022: 1-10 - [c88]Rasika Bhalerao, Damon McCoy:
An Analysis of Terms of Service and Official Policies with Respect to Sex Work. ISTAS 2022: 1-14 - [c87]Victor Le Pochat, Laura Edelson, Tom van Goethem, Wouter Joosen, Damon McCoy, Tobias Lauinger:
An Audit of Facebook's Political Ad Policy Enforcement. USENIX Security Symposium 2022: 607-624 - [c86]Cameron Ballard, Ian Goldstein, Pulak Mehta, Genesis Smothers, Kejsi Take, Victoria Zhong
, Rachel Greenstadt, Tobias Lauinger, Damon McCoy:
Conspiracy Brokers: Understanding the Monetization of YouTube Conspiracy Theories. WWW 2022: 2707-2718 - [i13]Rasika Bhalerao, Nora McDonald, Hanna Barakat, Vaughn Hamilton, Damon McCoy, Elissa M. Redmiles:
Ethics and Efficacy of Unsolicited Anti-Trafficking SMS Outreach. CoRR abs/2202.09527 (2022) - [i12]Cameron Ballard, Ian Goldstein, Pulak Mehta, Genesis Smothers, Kejsi Take, Victoria Zhong, Rachel Greenstadt, Tobias Lauinger, Damon McCoy:
Conspiracy Brokers: Understanding the Monetization of YouTube Conspiracy Theories. CoRR abs/2205.15943 (2022) - 2021
- [j15]Alberto Bracci
, Matthieu Nadini
, Maxwell Aliapoulios
, Damon McCoy, Ian W. Gray
, Alexander Teytelboym
, Angela Gallo
, Andrea Baronchelli
:
Dark Web Marketplaces and COVID-19: before the vaccine. EPJ Data Sci. 10(1): 6 (2021) - [j14]Periwinkle Doerfler, Andrea Forte, Emiliano De Cristofaro, Gianluca Stringhini, Jeremy Blackburn, Damon McCoy:
"I'm a Professor, which isn't usually a dangerous job": Internet-facilitated Harassment and Its Impact on Researchers. Proc. ACM Hum. Comput. Interact. 5(CSCW2): 341:1-341:32 (2021) - [c85]Laura Edelson
, Minh-Kha Nguyen, Ian Goldstein, Oana Goga, Damon McCoy, Tobias Lauinger:
Understanding engagement with U.S. (mis)information news sources on Facebook. Internet Measurement Conference 2021: 444-463 - [c84]Maxwell Aliapoulios, Kejsi Take, Prashanth Ramakrishna, Daniel Borkan, Beth Goldberg, Jeffrey Sorensen, Anna Turner, Rachel Greenstadt, Tobias Lauinger, Damon McCoy:
A large-scale characterization of online incitements to harassment across platforms. Internet Measurement Conference 2021: 621-638 - [c83]Kurt Thomas, Devdatta Akhawe, Michael D. Bailey, Dan Boneh, Elie Bursztein, Sunny Consolvo, Nicola Dell, Zakir Durumeric, Patrick Gage Kelley, Deepak Kumar, Damon McCoy, Sarah Meiklejohn, Thomas Ristenpart, Gianluca Stringhini:
SoK: Hate, Harassment, and the Changing Landscape of Online Abuse. SP 2021: 247-267 - [c82]Maxwell Aliapoulios, Cameron Ballard, Rasika Bhalerao, Tobias Lauinger, Damon McCoy:
Swiped: Analyzing Ground-truth Data of a Marketplace for Stolen Debit and Credit Cards. USENIX Security Symposium 2021: 4151-4168 - [i11]Alberto Bracci
, Matthieu Nadini, Maxwell Aliapoulios, Damon McCoy, Ian W. Gray, Alexander Teytelboym, Angela Gallo, Andrea Baronchelli:
Dark Web Marketplaces and COVID-19: The vaccines. CoRR abs/2102.05470 (2021) - [i10]Periwinkle Doerfler, Andrea Forte, Emiliano De Cristofaro, Gianluca Stringhini, Jeremy Blackburn, Damon McCoy:
"I'm a Professor, which isn't usually a dangerous job": Internet-Facilitated Harassment and its Impact on Researchers. CoRR abs/2104.11145 (2021) - 2020
- [j13]Rosanna Bellini, Emily Tseng, Nora McDonald
, Rachel Greenstadt, Damon McCoy, Thomas Ristenpart, Nicola Dell:
"So-called privacy breeds evil": Narrative Justifications for Intimate Partner Surveillance in Online Forums. Proc. ACM Hum. Comput. Interact. 4(CSCW3): 1-27 (2020) - [c81]Emmi Bevensee, Maxwell Aliapoulios, Quinn Dougherty, Jason Baumgartner, Damon McCoy, Jeremy Blackburn:
SMAT: The Social Media Analysis Toolkit. ICWSM Workshops 2020 - [c80]Shehroze Farooqi, Álvaro Feal, Tobias Lauinger, Damon McCoy, Zubair Shafiq, Narseo Vallina-Rodriguez
:
Understanding Incentivized Mobile App Installs on Google Play Store. Internet Measurement Conference 2020: 696-709 - [c79]Kevin A. Roundy
, Paula Barmaimon Mendelberg, Nicola Dell, Damon McCoy, Daniel Nissani, Thomas Ristenpart, Acar Tamersoy:
The Many Kinds of Creepware Used for Interpersonal Attacks. SP 2020: 626-643 - [c78]Laura Edelson
, Tobias Lauinger, Damon McCoy:
A Security Analysis of the Facebook Ad Library. SP 2020: 661-678 - [c77]Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, Thomas Ristenpart:
The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums. USENIX Security Symposium 2020: 1893-1909 - [c76]Janith Weerasinghe, Bailey Flanigan, Aviel J. Stein, Damon McCoy, Rachel Greenstadt:
The Pod People: Understanding Manipulation of Social Media Popularity via Reciprocity Abuse. WWW 2020: 1874-1884 - [c75]Brown Farinholt, Mohammad Rezaeirad, Damon McCoy, Kirill Levchenko:
Dark Matter: Uncovering the DarkComet RAT Ecosystem. WWW 2020: 2109-2120 - [i9]Paz Grimberg, Tobias Lauinger, Damon McCoy:
Empirical Analysis of Indirect Internal Conversions in Cryptocurrency Exchanges. CoRR abs/2002.12274 (2020) - [i8]Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, Thomas Ristenpart:
The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums. CoRR abs/2005.14341 (2020) - [i7]Alberto Bracci
, Matthieu Nadini, Maxwell Aliapoulios, Damon McCoy, Ian W. Gray, Alexander Teytelboym, Angela Gallo, Andrea Baronchelli:
The COVID-19 online shadow economy. CoRR abs/2008.01585 (2020) - [i6]Shehroze Farooqi, Álvaro Feal, Tobias Lauinger, Damon McCoy, Zubair Shafiq, Narseo Vallina-Rodriguez:
Understanding Incentivized Mobile App Installs on Google Play Store. CoRR abs/2010.01497 (2020)
2010 – 2019
- 2019
- [c74]Rasika Bhalerao, Maxwell Aliapoulios, Ilia Shumailov, Sadia Afroz, Damon McCoy:
Mapping the Underground: Supervised Discovery of Cybercrime Supply Chains. eCrime 2019: 1-16 - [c73]Prakhar Pandey, Maxwell Aliapoulios, Damon McCoy:
Iniquitous Cord-Cutting: An Analysis of Infringing IPTV Services. EuroS&P Workshops 2019: 423-432 - [c72]Sam Havron, Diana Freed, Rahul Chatterjee, Damon McCoy, Nicola Dell, Thomas Ristenpart:
Clinical Computer Security for Victims of Intimate Partner Violence. USENIX Security Symposium 2019: 105-122 - [c71]Vector Guo Li, Matthew Dunn, Paul Pearce, Damon McCoy, Geoffrey M. Voelker, Stefan Savage:
Reading the Tea leaves: A Comparative Analysis of Threat Intelligence. USENIX Security Symposium 2019: 851-867 - [c70]Arman Noroozian, Jan Koenders, Eelco van Veldhuizen, Carlos Hernandez Gañán, Sumayah A. Alrwais, Damon McCoy, Michel van Eeten:
Platforms in Everything: Analyzing Ground-Truth Data on the Anatomy and Economics of Bullet-Proof Hosting. USENIX Security Symposium 2019: 1341-1356 - [c69]Periwinkle Doerfler, Kurt Thomas, Maija Marincenko, Juri Ranieri, Yu Jiang, Angelika Moscicki, Damon McCoy:
Evaluating Login Challenges as aDefense Against Account Takeover. WWW 2019: 372-382 - [i5]Laura Edelson, Shikhar Sakhuja, Ratan Dey, Damon McCoy:
An Analysis of United States Online Political Advertising Transparency. CoRR abs/1902.04385 (2019) - 2018
- [j12]Rachel Greenstadt, Damon McCoy, Carmela Troncoso:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2018(1): 1-4 (2018) - [j11]Rachel Greenstadt, Damon McCoy, Carmela Troncoso:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2018(2): 1-3 (2018) - [j10]Rachel Greenstadt, Damon McCoy, Carmela Troncoso:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2018(3): 1-4 (2018) - [j9]Rachel Greenstadt, Damon McCoy, Carmela Troncoso:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2018(4): 1-4 (2018) - [c68]Kevin Gallagher
, Sameer Patil
, Brendan Dolan-Gavitt, Damon McCoy, Nasir D. Memon
:
Peeling the Onion's User Experience Layer: Examining Naturalistic Use of the Tor Browser. CCS 2018: 1290-1305 - [c67]Hongwei Tian, Stephen M. Gaffigan, D. Sean West, Damon McCoy:
Bullet-proof payment processors. eCrime 2018: 1-11 - [c66]Rahul Chatterjee, Periwinkle Doerfler, Hadas Orgad, Sam Havron, Jackeline Palmer, Diana Freed, Karen Levy
, Nicola Dell, Damon McCoy, Thomas Ristenpart:
The Spyware Used in Intimate Partner Violence. IEEE Symposium on Security and Privacy 2018: 441-458 - [c65]Danny Yuxing Huang, Maxwell Matthaios Aliapoulios, Vector Guo Li, Luca Invernizzi, Elie Bursztein, Kylie McRoberts, Jonathan Levin, Kirill Levchenko, Alex C. Snoeren, Damon McCoy:
Tracking Ransomware End-to-end. IEEE Symposium on Security and Privacy 2018: 618-631 - [c64]Mohammad Rezaeirad, Brown Farinholt, Hitesh Dharmdasani, Paul Pearce, Kirill Levchenko, Damon McCoy:
Schrödinger's RAT: Profiling the Stakeholders in the Remote Access Trojan Ecosystem. USENIX Security Symposium 2018: 1043-1060 - [i4]Rebekah Overdorf, Carmela Troncoso, Rachel Greenstadt, Damon McCoy:
Under the Underground: Predicting Private Interactions in Underground Forums. CoRR abs/1805.04494 (2018) - [i3]Rasika Bhalerao, Maxwell Aliapoulios, Ilia Shumailov, Sadia Afroz, Damon McCoy:
Towards Automatic Discovery of Cybercrime Supply Chains. CoRR abs/1812.00381 (2018) - 2017
- [j8]Claudia Díaz, Rachel Greenstadt, Damon McCoy:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2017(1): 1-3 (2017) - [j7]Claudia Díaz, Rachel Greenstadt, Damon McCoy:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2017(2): 1-3 (2017) - [j6]Claudia Díaz, Rachel Greenstadt, Damon McCoy:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2017(3): 1 (2017) - [j5]Claudia Díaz, Rachel Greenstadt, Damon McCoy:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2017(4): 1-4 (2017) - [c63]Greg Durrett, Jonathan K. Kummerfeld
, Taylor Berg-Kirkpatrick, Rebecca S. Portnoff, Sadia Afroz, Damon McCoy, Kirill Levchenko, Vern Paxson:
Identifying Products in Online Cybercrime Marketplaces: A Dataset for Fine-grained Domain Adaptation. EMNLP 2017: 2598-2607 - [c62]Peter Snyder, Periwinkle Doerfler, Chris Kanich, Damon McCoy:
Fifteen minutes of unwanted fame: detecting and characterizing doxing. Internet Measurement Conference 2017: 432-444 - [c61]Rebecca S. Portnoff, Danny Yuxing Huang, Periwinkle Doerfler, Sadia Afroz, Damon McCoy:
Backpage and Bitcoin: Uncovering Human Traffickers. KDD 2017: 1595-1604 - [c60]Johannes Krupp, Mohammad Karami, Christian Rossow, Damon McCoy, Michael Backes:
Linking Amplification DDoS Attacks to Booter Services. RAID 2017: 427-449 - [c59]Brown Farinholt, Mohammad Rezaeirad, Paul Pearce, Hitesh Dharmdasani, Haikuo Yin, Stevens Le Blond, Damon McCoy, Kirill Levchenko:
To Catch a Ratter: Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild. IEEE Symposium on Security and Privacy 2017: 770-787 - [c58]Sumayah A. Alrwais, Xiaojing Liao, Xianghang Mi
, Peng Wang, Xiaofeng Wang, Feng Qian, Raheem A. Beyah
, Damon McCoy:
Under the Shadow of Sunshine: Understanding and Detecting Bulletproof Hosting on Legitimate Service Provider Networks. IEEE Symposium on Security and Privacy 2017: 805-823 - [c57]Hossein Siadati, Sean Palka, Avi Siegel, Damon McCoy:
Measuring the Effectiveness of Embedded Phishing Exercises. CSET @ USENIX Security Symposium 2017 - [c56]Rebecca S. Portnoff, Sadia Afroz, Greg Durrett, Jonathan K. Kummerfeld, Taylor Berg-Kirkpatrick, Damon McCoy, Kirill Levchenko, Vern Paxson:
Tools for Automated Analysis of Cybercriminal Markets. WWW 2017: 657-666 - [i2]Greg Durrett, Jonathan K. Kummerfeld, Taylor Berg-Kirkpatrick, Rebecca S. Portnoff, Sadia Afroz, Damon McCoy, Kirill Levchenko, Vern Paxson:
Identifying Products in Online Cybercrime Marketplaces: A Dataset for Fine-grained Domain Adaptation. CoRR abs/1708.09609 (2017) - 2016
- [j4]Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, Stefan Savage:
A fistful of Bitcoins: characterizing payments among men with no names. Commun. ACM 59(4): 86-93 (2016) - [c55]Srikanth Sundaresan, Damon McCoy, Sadia Afroz, Vern Paxson:
Profiling underground merchants based on network behavior. eCrime 2016: 62-70 - [c54]Khaled Baqer, Danny Yuxing Huang, Damon McCoy, Nicholas Weaver:
Stressing Out: Bitcoin "Stress Testing". Financial Cryptography Workshops 2016: 3-18 - [c53]Youngsam Park, Damon McCoy, Elaine Shi:
Understanding Craigslist Rental Scams. Financial Cryptography 2016: 3-21 - [c52]Sheharbano Khattak, David Fifield, Sadia Afroz, Mobin Javed, Srikanth Sundaresan, Damon McCoy, Vern Paxson, Steven J. Murdoch:
Do You See What I See? Differential Treatment of Anonymous Users. NDSS 2016 - [c51]Kurt Thomas, Juan A. Elices Crespo, Ryan Rasti, Jean-Michel Picod, Cait Phillips, Marc-André Decoste, Chris Sharp, Fabio Tirelo, Ali Tofigh, Marc-Antoine Courteau, Lucas Ballard, Robert Shield, Nav Jagpal, Moheeb Abu Rajab, Panayiotis Mavrommatis, Niels Provos, Elie Bursztein, Damon McCoy:
Investigating Commercial Pay-Per-Install and the Distribution of Unwanted Software. USENIX Security Symposium 2016: 721-739 - [c50]Frank Li, Zakir Durumeric, Jakub Czyz, Mohammad Karami, Michael D. Bailey, Damon McCoy, Stefan Savage, Vern Paxson:
You've Got Vulnerability: Exploring Effective Vulnerability Notifications. USENIX Security Symposium 2016: 1033-1050 - [c49]Sahar Mazloom, Mohammad Rezaeirad, Aaron Hunter, Damon McCoy:
A Security Analysis of an In-Vehicle Infotainment and App Platform. WOOT 2016 - [c48]Xiaojing Liao, Chang Liu, Damon McCoy, Elaine Shi, Shuang Hao, Raheem A. Beyah
:
Characterizing Long-tail SEO Spam on Cloud Web Hosting Services. WWW 2016: 321-332 - [c47]Mohammad Karami, Youngsam Park, Damon McCoy:
Stress Testing the Booters: Understanding and Undermining the Business of DDoS Services. WWW 2016: 1033-1043 - [p3]Damon McCoy, Youngsam Park, Elaine Shi, Markus Jakobsson:
Identifying Scams and Trends. Understanding Social Engineering Based Scams 2016: 7-19 - [p2]Damon McCoy, Youngsam Park, Elaine Shi, Markus Jakobsson:
Case Study: Sales Scams. Understanding Social Engineering Based Scams 2016: 77-87 - [p1]Damon McCoy, Youngsam Park, Elaine Shi, Markus Jakobsson:
Case Study: Rental Scams. Understanding Social Engineering Based Scams 2016: 89-102 - 2015
- [c46]Jason W. Clark, Peter Snyder, Damon McCoy, Chris Kanich:
"I Saw Images I Didn't Even Know I Had": Understanding User Perceptions of Cloud Storage Privacy. CHI 2015: 1641-1644 - [c45]Sean Palka, Damon McCoy:
Dynamic phishing content using generative grammars. ICST Workshops 2015: 1-8 - [c44]Kurt Thomas, Elie Bursztein, Chris Grier, Grant Ho, Nav Jagpal, Alexandros Kapravelos, Damon McCoy, Antonio Nappa
, Vern Paxson, Paul Pearce, Niels Provos, Moheeb Abu Rajab:
Ad Injection at Scale: Assessing Deceptive Advertisement Modifications. IEEE Symposium on Security and Privacy 2015: 151-167 - [c43]Kurt Thomas, Danny Yuxing Huang, David Y. Wang, Elie Bursztein, Chris Grier, Tom Holt, Christopher Kruegel, Damon McCoy, Stefan Savage, Giovanni Vigna:
Framing Dependencies Introduced by Underground Commoditization. WEIS 2015 - [c42]Sean Palka, Damon McCoy:
Fuzzing E-mail Filters with Generative Grammars and N-Gram Analysis. WOOT 2015 - [i1]Mohammad Karami, Youngsam Park, Damon McCoy:
Stress Testing the Booters: Understanding and Undermining the Business of DDoS Services. CoRR abs/1508.03410 (2015) - 2014
- [c41]Paul Pearce, Vacha Dave, Chris Grier, Kirill Levchenko, Saikat Guha, Damon McCoy, Vern Paxson, Stefan Savage, Geoffrey M. Voelker:
Characterizing Large-Scale Click Fraud in ZeroAccess. CCS 2014: 141-152 - [c40]Kurt Thomas, Dmytro Iatskiv, Elie Bursztein, Tadek Pietraszek, Chris Grier, Damon McCoy:
Dialing Back Abuse on Phone Verified Accounts. CCS 2014: 465-476 - [c39]Jackie Jones, Damon McCoy:
The check is in the mail: Monetization of Craigslist buyer scams. eCrime 2014: 25-35 - [c38]David Y. Wang, Matthew F. Der, Mohammad Karami, Lawrence K. Saul, Damon McCoy, Stefan Savage, Geoffrey M. Voelker:
Search + Seizure: The Effectiveness of Interventions on SEO Campaigns. Internet Measurement Conference 2014: 359-372 - [c37]Danny Yuxing Huang, Hitesh Dharmdasani, Sarah Meiklejohn, Vacha Dave, Chris Grier, Damon McCoy, Stefan Savage, Nicholas Weaver, Alex C. Snoeren, Kirill Levchenko:
Botcoin: Monetizing Stolen Cycles. NDSS 2014 - [c36]Youngsam Park, Jackie Jones, Damon McCoy, Elaine Shi, Markus Jakobsson:
Scambaiter: Understanding Targeted Nigerian Scams on Craigslist. NDSS 2014 - [c35]Hamed Sarvari, Ehab Atif Abozinadah
, Alex Mbaziira, Damon McCoy:
Constructing and Analyzing Criminal Networks. IEEE Symposium on Security and Privacy Workshops 2014: 84-91 - [c34]Sadia Afroz, Aylin Caliskan Islam, Ariel Stolerman, Rachel Greenstadt, Damon McCoy:
Doppelgänger Finder: Taking Stylometry to the Underground. IEEE Symposium on Security and Privacy 2014: 212-226 - 2013
- [j3]Mohammad Karami, Damon McCoy:
Rent to Pwn: Analyzing Commodity Booter DDoS Services. login Usenix Mag. 38(6) (2013) - [j2]Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, Stefan Savage:
A Fistful of Bitcoins: Characterizing Payments Among Men with No Names. login Usenix Mag. 38(6) (2013) - [c33]Sadia Afroz, Vaibhav Garg, Damon McCoy, Rachel Greenstadt:
Honor among thieves: A common's analysis of cybercrime economies. eCrime 2013: 1-11 - [c32]Mohammad Karami, Shiva Ghaemi, Damon McCoy:
Folex: An analysis of an herbal and counterfeit luxury goods affiliate program. eCrime 2013: 1-9 - [c31]Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, Stefan Savage:
A fistful of bitcoins: characterizing payments among men with no names. Internet Measurement Conference 2013: 127-140 - [c30]Jason W. Clark, Damon McCoy:
There Are No Free iPads: An Analysis of Survey Scams as a Business. LEET 2013 - [c29]Mohammad Karami, Damon McCoy:
Understanding the Emerging Threat of DDoS-as-a-Service. LEET 2013 - [c28]Christopher E. Everett, Damon McCoy:
OCTANE (Open Car Testbed and Network Experiments): Bringing Cyber-Physical Security Research to Researchers and Students. CSET 2013 - [c27]Kurt Thomas, Damon McCoy, Chris Grier, Alek Kolcz, Vern Paxson:
Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse. USENIX Security Symposium 2013: 195-210 - 2012
- [c26]Chris Grier, Lucas Ballard, Juan Caballero, Neha Chachra, Christian J. Dietrich, Kirill Levchenko, Panayiotis Mavrommatis, Damon McCoy, Antonio Nappa
, Andreas Pitsillidis, Niels Provos, M. Zubair Rafique, Moheeb Abu Rajab, Christian Rossow, Kurt Thomas, Vern Paxson, Stefan Savage, Geoffrey M. Voelker:
Manufacturing compromise: the emergence of exploit-as-a-service. CCS 2012: 821-832 - [c25]Damon McCoy, Hitesh Dharmdasani, Christian Kreibich, Geoffrey M. Voelker, Stefan Savage:
Priceless: the role of payments in abuse-advertised goods. CCS 2012: 845-856 - [c24]Damon McCoy, Andreas Pitsillidis, Grant Jordan, Nicholas Weaver, Christian Kreibich, Brian Krebs, Geoffrey M. Voelker, Stefan Savage, Kirill Levchenko:
PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs. USENIX Security Symposium 2012: 1-16 - 2011
- [c23]