


Остановите войну!
for scientists:


default search action
Damon McCoy
Person information

- affiliation: New York University, NY, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j18]Enze Liu
, Sumanth Rao
, Sam Havron, Grant Ho, Stefan Savage, Geoffrey M. Voelker, Damon McCoy:
No Privacy Among Spies: Assessing the Functionality and Insecurity of Consumer Android Spyware Apps. Proc. Priv. Enhancing Technol. 2023(1): 207-224 (2023) - [c92]Bruno Coelho
, Tobias Lauinger
, Laura Edelson
, Ian Goldstein
, Damon McCoy
:
Propaganda Política Pagada: Exploring U.S. Political Facebook Ads en Español. WWW 2023: 2742-2753 - [i15]Ian Goldstein, Laura Edelson, Damon McCoy, Tobias Lauinger:
Understanding the (In)Effectiveness of Content Moderation: A Case Study of Facebook in the Context of the U.S. Capitol Riot. CoRR abs/2301.02737 (2023) - [i14]Ian W. Gray, Jack Cable, Benjamin Brown, Vlad Cuiujuclu, Damon McCoy:
Money Over Morals: A Business Analysis of Conti Ransomware. CoRR abs/2304.11681 (2023) - 2022
- [j17]Rasika Bhalerao, Nora McDonald, Hanna Barakat, Vaughn Hamilton, Damon McCoy, Elissa M. Redmiles:
Ethics and Efficacy of Unsolicited Anti-Trafficking SMS Outreach. Proc. ACM Hum. Comput. Interact. 6(CSCW2): 1-39 (2022) - [j16]Kejsi Take, Kevin Gallagher
, Andrea Forte, Damon McCoy, Rachel Greenstadt:
"It Feels Like Whack-a-mole": User Experiences of Data Removal from People Search Websites. Proc. Priv. Enhancing Technol. 2022(3): 159-178 (2022) - [c91]ChangSeok Oh
, Chris Kanich, Damon McCoy, Paul Pearce:
Cart-ology: Intercepting Targeted Advertising via Ad Network Identity Entanglement. CCS 2022: 2401-2414 - [c90]Ian W. Gray, Jack Cable, Benjamin Brown, Vlad Cuiujuclu, Damon McCoy:
Money Over Morals: A Business Analysis of Conti Ransomware. eCrime 2022: 1-12 - [c89]Rasika Bhalerao, Damon McCoy:
Libel Inc: An Analysis of the Libel Site Ecosystem. EuroS&P Workshops 2022: 1-10 - [c88]Rasika Bhalerao, Damon McCoy:
An Analysis of Terms of Service and Official Policies with Respect to Sex Work. ISTAS 2022: 1-14 - [c87]Victor Le Pochat, Laura Edelson, Tom van Goethem, Wouter Joosen, Damon McCoy, Tobias Lauinger:
An Audit of Facebook's Political Ad Policy Enforcement. USENIX Security Symposium 2022: 607-624 - [c86]Cameron Ballard, Ian Goldstein, Pulak Mehta, Genesis Smothers, Kejsi Take, Victoria Zhong, Rachel Greenstadt, Tobias Lauinger, Damon McCoy:
Conspiracy Brokers: Understanding the Monetization of YouTube Conspiracy Theories. WWW 2022: 2707-2718 - [i13]Rasika Bhalerao, Nora McDonald, Hanna Barakat, Vaughn Hamilton, Damon McCoy, Elissa M. Redmiles:
Ethics and Efficacy of Unsolicited Anti-Trafficking SMS Outreach. CoRR abs/2202.09527 (2022) - [i12]Cameron Ballard, Ian Goldstein, Pulak Mehta, Genesis Smothers, Kejsi Take, Victoria Zhong, Rachel Greenstadt, Tobias Lauinger, Damon McCoy:
Conspiracy Brokers: Understanding the Monetization of YouTube Conspiracy Theories. CoRR abs/2205.15943 (2022) - 2021
- [j15]Alberto Bracci
, Matthieu Nadini
, Maxwell Aliapoulios
, Damon McCoy, Ian W. Gray
, Alexander Teytelboym
, Angela Gallo
, Andrea Baronchelli
:
Dark Web Marketplaces and COVID-19: before the vaccine. EPJ Data Sci. 10(1): 6 (2021) - [j14]Periwinkle Doerfler, Andrea Forte, Emiliano De Cristofaro, Gianluca Stringhini, Jeremy Blackburn, Damon McCoy:
"I'm a Professor, which isn't usually a dangerous job": Internet-facilitated Harassment and Its Impact on Researchers. Proc. ACM Hum. Comput. Interact. 5(CSCW2): 341:1-341:32 (2021) - [c85]Laura Edelson, Minh-Kha Nguyen, Ian Goldstein, Oana Goga, Damon McCoy, Tobias Lauinger:
Understanding engagement with U.S. (mis)information news sources on Facebook. Internet Measurement Conference 2021: 444-463 - [c84]Maxwell Aliapoulios, Kejsi Take, Prashanth Ramakrishna, Daniel Borkan, Beth Goldberg, Jeffrey Sorensen, Anna Turner, Rachel Greenstadt, Tobias Lauinger, Damon McCoy:
A large-scale characterization of online incitements to harassment across platforms. Internet Measurement Conference 2021: 621-638 - [c83]Kurt Thomas, Devdatta Akhawe, Michael D. Bailey, Dan Boneh, Elie Bursztein, Sunny Consolvo, Nicola Dell, Zakir Durumeric, Patrick Gage Kelley, Deepak Kumar, Damon McCoy, Sarah Meiklejohn, Thomas Ristenpart, Gianluca Stringhini:
SoK: Hate, Harassment, and the Changing Landscape of Online Abuse. SP 2021: 247-267 - [c82]Maxwell Aliapoulios, Cameron Ballard, Rasika Bhalerao, Tobias Lauinger, Damon McCoy:
Swiped: Analyzing Ground-truth Data of a Marketplace for Stolen Debit and Credit Cards. USENIX Security Symposium 2021: 4151-4168 - [i11]Alberto Bracci
, Matthieu Nadini, Maxwell Aliapoulios, Damon McCoy, Ian W. Gray, Alexander Teytelboym, Angela Gallo, Andrea Baronchelli:
Dark Web Marketplaces and COVID-19: The vaccines. CoRR abs/2102.05470 (2021) - [i10]Periwinkle Doerfler, Andrea Forte, Emiliano De Cristofaro, Gianluca Stringhini, Jeremy Blackburn, Damon McCoy:
"I'm a Professor, which isn't usually a dangerous job": Internet-Facilitated Harassment and its Impact on Researchers. CoRR abs/2104.11145 (2021) - 2020
- [j13]Rosanna Bellini, Emily Tseng, Nora McDonald
, Rachel Greenstadt, Damon McCoy, Thomas Ristenpart, Nicola Dell:
"So-called privacy breeds evil": Narrative Justifications for Intimate Partner Surveillance in Online Forums. Proc. ACM Hum. Comput. Interact. 4(CSCW3): 1-27 (2020) - [c81]Emmi Bevensee, Maxwell Aliapoulios, Quinn Dougherty, Jason Baumgartner, Damon McCoy, Jeremy Blackburn:
SMAT: The Social Media Analysis Toolkit. ICWSM Workshops 2020 - [c80]Shehroze Farooqi, Álvaro Feal, Tobias Lauinger, Damon McCoy, Zubair Shafiq, Narseo Vallina-Rodriguez
:
Understanding Incentivized Mobile App Installs on Google Play Store. Internet Measurement Conference 2020: 696-709 - [c79]Kevin A. Roundy
, Paula Barmaimon Mendelberg, Nicola Dell, Damon McCoy, Daniel Nissani, Thomas Ristenpart, Acar Tamersoy:
The Many Kinds of Creepware Used for Interpersonal Attacks. SP 2020: 626-643 - [c78]Laura Edelson, Tobias Lauinger, Damon McCoy:
A Security Analysis of the Facebook Ad Library. SP 2020: 661-678 - [c77]Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, Thomas Ristenpart:
The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums. USENIX Security Symposium 2020: 1893-1909 - [c76]Janith Weerasinghe, Bailey Flanigan, Aviel J. Stein, Damon McCoy, Rachel Greenstadt:
The Pod People: Understanding Manipulation of Social Media Popularity via Reciprocity Abuse. WWW 2020: 1874-1884 - [c75]Brown Farinholt, Mohammad Rezaeirad, Damon McCoy, Kirill Levchenko:
Dark Matter: Uncovering the DarkComet RAT Ecosystem. WWW 2020: 2109-2120 - [i9]Paz Grimberg, Tobias Lauinger, Damon McCoy:
Empirical Analysis of Indirect Internal Conversions in Cryptocurrency Exchanges. CoRR abs/2002.12274 (2020) - [i8]Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, Thomas Ristenpart:
The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums. CoRR abs/2005.14341 (2020) - [i7]Alberto Bracci
, Matthieu Nadini, Maxwell Aliapoulios, Damon McCoy, Ian W. Gray, Alexander Teytelboym, Angela Gallo, Andrea Baronchelli:
The COVID-19 online shadow economy. CoRR abs/2008.01585 (2020) - [i6]Shehroze Farooqi, Álvaro Feal, Tobias Lauinger, Damon McCoy, Zubair Shafiq, Narseo Vallina-Rodriguez:
Understanding Incentivized Mobile App Installs on Google Play Store. CoRR abs/2010.01497 (2020)
2010 – 2019
- 2019
- [c74]Rasika Bhalerao, Maxwell Aliapoulios, Ilia Shumailov, Sadia Afroz, Damon McCoy:
Mapping the Underground: Supervised Discovery of Cybercrime Supply Chains. eCrime 2019: 1-16 - [c73]Prakhar Pandey, Maxwell Aliapoulios, Damon McCoy:
Iniquitous Cord-Cutting: An Analysis of Infringing IPTV Services. EuroS&P Workshops 2019: 423-432 - [c72]Sam Havron, Diana Freed, Rahul Chatterjee, Damon McCoy, Nicola Dell, Thomas Ristenpart:
Clinical Computer Security for Victims of Intimate Partner Violence. USENIX Security Symposium 2019: 105-122 - [c71]Vector Guo Li, Matthew Dunn, Paul Pearce, Damon McCoy, Geoffrey M. Voelker, Stefan Savage:
Reading the Tea leaves: A Comparative Analysis of Threat Intelligence. USENIX Security Symposium 2019: 851-867 - [c70]Arman Noroozian, Jan Koenders, Eelco van Veldhuizen, Carlos Hernandez Gañán, Sumayah A. Alrwais, Damon McCoy, Michel van Eeten:
Platforms in Everything: Analyzing Ground-Truth Data on the Anatomy and Economics of Bullet-Proof Hosting. USENIX Security Symposium 2019: 1341-1356 - [c69]Periwinkle Doerfler, Kurt Thomas, Maija Marincenko, Juri Ranieri, Yu Jiang, Angelika Moscicki, Damon McCoy:
Evaluating Login Challenges as aDefense Against Account Takeover. WWW 2019: 372-382 - [i5]Laura Edelson, Shikhar Sakhuja, Ratan Dey, Damon McCoy:
An Analysis of United States Online Political Advertising Transparency. CoRR abs/1902.04385 (2019) - 2018
- [j12]Rachel Greenstadt, Damon McCoy, Carmela Troncoso:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2018(1): 1-4 (2018) - [j11]Rachel Greenstadt, Damon McCoy, Carmela Troncoso:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2018(2): 1-3 (2018) - [j10]Rachel Greenstadt, Damon McCoy, Carmela Troncoso:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2018(3): 1-4 (2018) - [j9]Rachel Greenstadt, Damon McCoy, Carmela Troncoso:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2018(4): 1-4 (2018) - [c68]Kevin Gallagher
, Sameer Patil, Brendan Dolan-Gavitt, Damon McCoy, Nasir D. Memon:
Peeling the Onion's User Experience Layer: Examining Naturalistic Use of the Tor Browser. CCS 2018: 1290-1305 - [c67]Hongwei Tian, Stephen M. Gaffigan, D. Sean West, Damon McCoy:
Bullet-proof payment processors. eCrime 2018: 1-11 - [c66]Rahul Chatterjee, Periwinkle Doerfler, Hadas Orgad, Sam Havron, Jackeline Palmer, Diana Freed, Karen Levy
, Nicola Dell, Damon McCoy, Thomas Ristenpart:
The Spyware Used in Intimate Partner Violence. IEEE Symposium on Security and Privacy 2018: 441-458 - [c65]Danny Yuxing Huang, Maxwell Matthaios Aliapoulios, Vector Guo Li, Luca Invernizzi, Elie Bursztein, Kylie McRoberts, Jonathan Levin, Kirill Levchenko, Alex C. Snoeren, Damon McCoy:
Tracking Ransomware End-to-end. IEEE Symposium on Security and Privacy 2018: 618-631 - [c64]Mohammad Rezaeirad, Brown Farinholt, Hitesh Dharmdasani, Paul Pearce, Kirill Levchenko, Damon McCoy:
Schrödinger's RAT: Profiling the Stakeholders in the Remote Access Trojan Ecosystem. USENIX Security Symposium 2018: 1043-1060 - [i4]Rebekah Overdorf, Carmela Troncoso, Rachel Greenstadt, Damon McCoy:
Under the Underground: Predicting Private Interactions in Underground Forums. CoRR abs/1805.04494 (2018) - [i3]Rasika Bhalerao, Maxwell Aliapoulios, Ilia Shumailov, Sadia Afroz, Damon McCoy:
Towards Automatic Discovery of Cybercrime Supply Chains. CoRR abs/1812.00381 (2018) - 2017
- [j8]Claudia Díaz, Rachel Greenstadt, Damon McCoy:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2017(1): 1-3 (2017) - [j7]Claudia Díaz, Rachel Greenstadt, Damon McCoy:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2017(2): 1-3 (2017) - [j6]Claudia Díaz, Rachel Greenstadt, Damon McCoy:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2017(3): 1 (2017) - [j5]Claudia Díaz, Rachel Greenstadt, Damon McCoy:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2017(4): 1-4 (2017) - [c63]Greg Durrett, Jonathan K. Kummerfeld
, Taylor Berg-Kirkpatrick, Rebecca S. Portnoff, Sadia Afroz, Damon McCoy, Kirill Levchenko, Vern Paxson:
Identifying Products in Online Cybercrime Marketplaces: A Dataset for Fine-grained Domain Adaptation. EMNLP 2017: 2598-2607 - [c62]Peter Snyder, Periwinkle Doerfler, Chris Kanich, Damon McCoy:
Fifteen minutes of unwanted fame: detecting and characterizing doxing. Internet Measurement Conference 2017: 432-444 - [c61]Rebecca S. Portnoff, Danny Yuxing Huang, Periwinkle Doerfler, Sadia Afroz, Damon McCoy:
Backpage and Bitcoin: Uncovering Human Traffickers. KDD 2017: 1595-1604 - [c60]Johannes Krupp, Mohammad Karami, Christian Rossow, Damon McCoy, Michael Backes:
Linking Amplification DDoS Attacks to Booter Services. RAID 2017: 427-449 - [c59]Brown Farinholt, Mohammad Rezaeirad, Paul Pearce, Hitesh Dharmdasani, Haikuo Yin, Stevens Le Blond, Damon McCoy, Kirill Levchenko:
To Catch a Ratter: Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild. IEEE Symposium on Security and Privacy 2017: 770-787 - [c58]Sumayah A. Alrwais, Xiaojing Liao, Xianghang Mi
, Peng Wang, Xiaofeng Wang, Feng Qian, Raheem A. Beyah
, Damon McCoy:
Under the Shadow of Sunshine: Understanding and Detecting Bulletproof Hosting on Legitimate Service Provider Networks. IEEE Symposium on Security and Privacy 2017: 805-823 - [c57]Hossein Siadati, Sean Palka, Avi Siegel, Damon McCoy:
Measuring the Effectiveness of Embedded Phishing Exercises. CSET @ USENIX Security Symposium 2017 - [c56]Rebecca S. Portnoff, Sadia Afroz, Greg Durrett, Jonathan K. Kummerfeld, Taylor Berg-Kirkpatrick, Damon McCoy, Kirill Levchenko, Vern Paxson:
Tools for Automated Analysis of Cybercriminal Markets. WWW 2017: 657-666 - [i2]Greg Durrett, Jonathan K. Kummerfeld, Taylor Berg-Kirkpatrick, Rebecca S. Portnoff, Sadia Afroz, Damon McCoy, Kirill Levchenko, Vern Paxson:
Identifying Products in Online Cybercrime Marketplaces: A Dataset for Fine-grained Domain Adaptation. CoRR abs/1708.09609 (2017) - 2016
- [j4]Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, Stefan Savage:
A fistful of Bitcoins: characterizing payments among men with no names. Commun. ACM 59(4): 86-93 (2016) - [c55]Srikanth Sundaresan, Damon McCoy, Sadia Afroz, Vern Paxson:
Profiling underground merchants based on network behavior. eCrime 2016: 62-70 - [c54]Khaled Baqer, Danny Yuxing Huang, Damon McCoy, Nicholas Weaver:
Stressing Out: Bitcoin "Stress Testing". Financial Cryptography Workshops 2016: 3-18 - [c53]Youngsam Park, Damon McCoy, Elaine Shi:
Understanding Craigslist Rental Scams. Financial Cryptography 2016: 3-21 - [c52]Sheharbano Khattak, David Fifield, Sadia Afroz, Mobin Javed, Srikanth Sundaresan, Damon McCoy, Vern Paxson, Steven J. Murdoch:
Do You See What I See? Differential Treatment of Anonymous Users. NDSS 2016 - [c51]Kurt Thomas, Juan A. Elices Crespo, Ryan Rasti, Jean Michel Picod, Cait Phillips, Marc-André Decoste, Chris Sharp, Fabio Tirelo, Ali Tofigh, Marc-Antoine Courteau, Lucas Ballard, Robert Shield, Nav Jagpal, Moheeb Abu Rajab, Panayiotis Mavrommatis, Niels Provos, Elie Bursztein, Damon McCoy:
Investigating Commercial Pay-Per-Install and the Distribution of Unwanted Software. USENIX Security Symposium 2016: 721-739 - [c50]Frank Li, Zakir Durumeric, Jakub Czyz, Mohammad Karami, Michael D. Bailey, Damon McCoy, Stefan Savage, Vern Paxson:
You've Got Vulnerability: Exploring Effective Vulnerability Notifications. USENIX Security Symposium 2016: 1033-1050 - [c49]Sahar Mazloom, Mohammad Rezaeirad, Aaron Hunter, Damon McCoy:
A Security Analysis of an In-Vehicle Infotainment and App Platform. WOOT 2016 - [c48]Xiaojing Liao, Chang Liu, Damon McCoy, Elaine Shi, Shuang Hao, Raheem A. Beyah
:
Characterizing Long-tail SEO Spam on Cloud Web Hosting Services. WWW 2016: 321-332 - [c47]Mohammad Karami, Youngsam Park, Damon McCoy:
Stress Testing the Booters: Understanding and Undermining the Business of DDoS Services. WWW 2016: 1033-1043 - [p3]Damon McCoy, Youngsam Park, Elaine Shi, Markus Jakobsson:
Identifying Scams and Trends. Understanding Social Engineering Based Scams 2016: 7-19 - [p2]Damon McCoy, Youngsam Park, Elaine Shi, Markus Jakobsson:
Case Study: Sales Scams. Understanding Social Engineering Based Scams 2016: 77-87 - [p1]Damon McCoy, Youngsam Park, Elaine Shi, Markus Jakobsson:
Case Study: Rental Scams. Understanding Social Engineering Based Scams 2016: 89-102 - 2015
- [c46]Jason W. Clark, Peter Snyder, Damon McCoy, Chris Kanich:
"I Saw Images I Didn't Even Know I Had": Understanding User Perceptions of Cloud Storage Privacy. CHI 2015: 1641-1644 - [c45]Sean Palka, Damon McCoy:
Dynamic phishing content using generative grammars. ICST Workshops 2015: 1-8 - [c44]Kurt Thomas, Elie Bursztein, Chris Grier, Grant Ho, Nav Jagpal, Alexandros Kapravelos, Damon McCoy, Antonio Nappa
, Vern Paxson, Paul Pearce, Niels Provos, Moheeb Abu Rajab:
Ad Injection at Scale: Assessing Deceptive Advertisement Modifications. IEEE Symposium on Security and Privacy 2015: 151-167 - [c43]Kurt Thomas, Danny Yuxing Huang, David Y. Wang, Elie Bursztein, Chris Grier, Tom Holt, Christopher Kruegel, Damon McCoy, Stefan Savage, Giovanni Vigna:
Framing Dependencies Introduced by Underground Commoditization. WEIS 2015 - [c42]Sean Palka, Damon McCoy:
Fuzzing E-mail Filters with Generative Grammars and N-Gram Analysis. WOOT 2015 - [i1]Mohammad Karami, Youngsam Park, Damon McCoy:
Stress Testing the Booters: Understanding and Undermining the Business of DDoS Services. CoRR abs/1508.03410 (2015) - 2014
- [c41]Paul Pearce, Vacha Dave, Chris Grier, Kirill Levchenko, Saikat Guha, Damon McCoy, Vern Paxson, Stefan Savage, Geoffrey M. Voelker:
Characterizing Large-Scale Click Fraud in ZeroAccess. CCS 2014: 141-152 - [c40]Kurt Thomas, Dmytro Iatskiv, Elie Bursztein, Tadek Pietraszek, Chris Grier, Damon McCoy:
Dialing Back Abuse on Phone Verified Accounts. CCS 2014: 465-476 - [c39]Jackie Jones, Damon McCoy:
The check is in the mail: Monetization of Craigslist buyer scams. eCrime 2014: 25-35 - [c38]David Y. Wang, Matthew F. Der, Mohammad Karami, Lawrence K. Saul, Damon McCoy, Stefan Savage, Geoffrey M. Voelker:
Search + Seizure: The Effectiveness of Interventions on SEO Campaigns. Internet Measurement Conference 2014: 359-372 - [c37]Danny Yuxing Huang, Hitesh Dharmdasani, Sarah Meiklejohn, Vacha Dave, Chris Grier, Damon McCoy, Stefan Savage, Nicholas Weaver, Alex C. Snoeren, Kirill Levchenko:
Botcoin: Monetizing Stolen Cycles. NDSS 2014 - [c36]Youngsam Park, Jackie Jones, Damon McCoy, Elaine Shi, Markus Jakobsson:
Scambaiter: Understanding Targeted Nigerian Scams on Craigslist. NDSS 2014 - [c35]Hamed Sarvari, Ehab Atif Abozinadah
, Alex Mbaziira, Damon McCoy:
Constructing and Analyzing Criminal Networks. IEEE Symposium on Security and Privacy Workshops 2014: 84-91 - [c34]Sadia Afroz, Aylin Caliskan Islam, Ariel Stolerman, Rachel Greenstadt, Damon McCoy:
Doppelgänger Finder: Taking Stylometry to the Underground. IEEE Symposium on Security and Privacy 2014: 212-226 - 2013
- [j3]Mohammad Karami, Damon McCoy:
Rent to Pwn: Analyzing Commodity Booter DDoS Services. login Usenix Mag. 38(6) (2013) - [j2]Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, Stefan Savage:
A Fistful of Bitcoins: Characterizing Payments Among Men with No Names. login Usenix Mag. 38(6) (2013) - [c33]Sadia Afroz, Vaibhav Garg, Damon McCoy, Rachel Greenstadt:
Honor among thieves: A common's analysis of cybercrime economies. eCrime 2013: 1-11 - [c32]Mohammad Karami, Shiva Ghaemi, Damon McCoy:
Folex: An analysis of an herbal and counterfeit luxury goods affiliate program. eCrime 2013: 1-9 - [c31]Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, Stefan Savage:
A fistful of bitcoins: characterizing payments among men with no names. Internet Measurement Conference 2013: 127-140 - [c30]Jason W. Clark, Damon McCoy:
There Are No Free iPads: An Analysis of Survey Scams as a Business. LEET 2013 - [c29]Mohammad Karami, Damon McCoy:
Understanding the Emerging Threat of DDoS-as-a-Service. LEET 2013 - [c28]Christopher E. Everett, Damon McCoy:
OCTANE (Open Car Testbed and Network Experiments): Bringing Cyber-Physical Security Research to Researchers and Students. CSET 2013 - [c27]Kurt Thomas, Damon McCoy, Chris Grier, Alek Kolcz, Vern Paxson:
Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse. USENIX Security Symposium 2013: 195-210 - 2012
- [c26]Chris Grier, Lucas Ballard, Juan Caballero, Neha Chachra, Christian J. Dietrich, Kirill Levchenko, Panayiotis Mavrommatis, Damon McCoy, Antonio Nappa
, Andreas Pitsillidis, Niels Provos, M. Zubair Rafique, Moheeb Abu Rajab, Christian Rossow, Kurt Thomas, Vern Paxson, Stefan Savage, Geoffrey M. Voelker:
Manufacturing compromise: the emergence of exploit-as-a-service. CCS 2012: 821-832 - [c25]Damon McCoy, Hitesh Dharmdasani, Christian Kreibich, Geoffrey M. Voelker, Stefan Savage:
Priceless: the role of payments in abuse-advertised goods. CCS 2012: 845-856 - [c24]Damon McCoy, Andreas Pitsillidis, Grant Jordan, Nicholas Weaver, Christian Kreibich, Brian Krebs, Geoffrey M. Voelker, Stefan Savage, Kirill Levchenko:
PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs. USENIX Security Symposium 2012: 1-16 - 2011
- [c23]Damon McCoy, Jose Andre Morales
, Kirill Levchenko:
Proximax: Measurement-Driven Proxy Dissemination (Short Paper). Financial Cryptography 2011: 260-267 - [c22]Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker:
An analysis of underground forums. Internet Measurement Conference 2011: 71-80 - [c21]Mashael AlSabah, Kevin S. Bauer, Ian Goldberg, Dirk Grunwald, Damon McCoy, Stefan Savage, Geoffrey M. Voelker:
DefenestraTor: Throwing Out Windows in Tor. PETS 2011: 134-154 - [c20]Kirill Levchenko, Andreas Pitsillidis, Neha Chachra, Brandon Enright, Márk Félegyházi, Chris Grier, Tristan Halvorson, Chris Kanich, Christian Kreibich, He Liu, Damon McCoy, Nicholas Weaver, Vern Paxson, Geoffrey M. Voelker, Stefan Savage:
Click Trajectories: End-to-End Analysis of the Spam Value Chain. IEEE Symposium on Security and Privacy 2011: 431-446 - [c19]Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, Tadayoshi Kohno:
Comprehensive Experimental Analyses of Automotive Attack Surfaces. USENIX Security Symposium 2011 - [c18]Chris Kanich, Neha Chachra, Damon McCoy, Chris Grier, David Y. Wang, Marti Motoyama, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker:
No Plan Survives Contact: Experience with Cybercrime Measurement. CSET 2011 - [c17]