2023 |
No Privacy Among Spies: Assessing the Functionality and Insecurity of Consumer Android Spyware Apps
Enze Liu, Sumanth Rao, Sam Havron, Grant Ho, Stefan Savage, Geoffrey M Voelker, Damon McCoy
Proceedings on Privacy Enhancing Technologies, 2023 | |
Propaganda Política Pagada: Exploring U.S. Political Facebook Ads en Español
Bruno Coelho, Tobias Lauinger, Laura Edelson, Ian Goldstein, Damon McCoy
Proceedings of the ACM Web Conference 2023 (WWW '23), May, 2023, Austin, TX |
2022 |
Money Over Morals: A Business Analysis of Conti Ransomware
Ian W. Gray, Jack Cable, Vlad Cuiujuclu, Benjamin Brown, Damon McCoy
IEEE Symposium on Electronic Crime Research (eCrime 2022) | |
Cart-ology: Intercepting Targeted Advertising via Ad Network Identity Entanglement
ChangSeok Oh, Damon McCoy, Chris Kanich, Paul Pearce
ACM Conference on Computer and Communications Security (CCS 2022) | |
An Analysis of Terms of Service and Official Policies with Respect to Sex Work
Rasika Bhalerao and Damon McCoy
IEEE International Symposium on Technology and Society 2022 (ISTAS 2022) | |
Ethics and Efficacy of Unsolicited Anti-Trafficking SMS Outreach
Rasika Bhalerao, Nora McDonald, Hanna Barakat, Vaughn Hamilton, Damon McCoy, and Elissa M. Redmiles
Proceedings of the ACM Conference on Computer-Supported Cooperative Work and Social Computing (CSCW 2022) | |
``It feels like whack-a-mole'': User Experiences of Data Removal from People Search Websites
Kejsi Take, Kevin Gallagher, Andrea Forte, Damon McCoy, and Rachel Greenstadt
Proceedings on Privacy Enhancing Technologies, July 2022 | |
Conspiracy Brokers: Understanding the Monetization of YouTube Conspiracy Theories
Cameron Ballard, Ian Goldstein, Pulak Mehta, Genesis Smothers, Kejsi Take, Victoria Zhong, Rachel Greenstadt, Tobias Lauinger, Damon McCoy
Proceedings of the ACM Web Conference, May 2022 | |
An Audit of Facebook's Political Ad Policy Enforcement
Victor Le Pochat, Laura Edelson, Tom Van Goethem, Wouter Joosen, Damon McCoy, Tobias Lauinger Proceedings of the USENIX Security Symposium, August 2022 |
2021 |
Understanding Engagement with (Mis)Information News Sources on Facebook
Laura Edelson, Minh-Kha Nguyen, Ian Goldstein, Oana Goga, Damon McCoy, Tobias Lauinger ACM Internet Measurement Conference (IMC), November 2021 | |
A Large-Scale Characterization of Online Incitements to Harassment Across Platforms
Max Aliapoulios, Kejsi Take, Prashanth Ramakrishna, Daniel Borkan, Beth Goldberg, Jeffrey Sorensen, Anna Turner, Rachel Greenstadt, Tobias Lauinger, Damon McCoy ACM Internet Measurement Conference (IMC), November 2021 | |
"I'm a Professor, which isn't usually a dangerous job": Internet-Facilitated Harassment and its Impact on Researchers
Periwinkle Doerfler, Andrea Forte, Emiliano De Cristofaro, Gianluca Stringhini, Jeremy Blackburn, Damon McCoy ACM Conference on Computer-Supported Cooperative Work and Social Computing, Issue CSCW, 2021 | |
Swiped: Analyzing Ground-truth Data of a Marketplace for Stolen Debit and Credit Cards
Maxwell Aliapoulios, Cameron Ballard, Rasika Bhalerao, Tobias Lauinger, Damon McCoy Proceedings of the USENIX Security Symposium, August 2021 | |
SoK: Hate, Harassment, and the Changing Landscape of Online Abuse
Kurt Thomas, Devdatta Akhawe, Michael Bailey, Dan Boneh, Elie Bursztein, Sunny Consolvo, Nicola Dell, Zakir Durumeric, Patrick Gage Kelley, Deepak Kumar, Damon McCoy, Sarah Meiklejohn, Thomas Ristenpart, Gianluca Stringhini. IEEE Symposium on Security and Privacy (Oakland), May 2021 | |
Dark Web Marketplaces and COVID-19: before the vaccine
Alberto Bracci, Matthieu Nadini, Maxwell Aliapoulios, Damon McCoy, Ian Gray, Alexander Teytelboym, Angela Gallo, Andrea Baronchelli EPJ Data Science, 2021 | |
"So-called privacy breeds evil": Narrative Justifications for Intimate Partner Surveillance in Online Forums.
Rosanna Bellini, Emily Tseng, Nora McDonald, Rachel Greenstadt, Damon McCoy, Thomas Ristenpart, Nicola Dell ACM Conference on Computer-Supported Cooperative Work and Social Computing, Issue CSCW, 2021 |
2020 |
Understanding Incentivized Mobile App Installs on Google Play Store
Shehroze Farooqi, Alvaro Feal, Tobias Lauinger, Damon McCoy, Zubair Shafiq, Narseo Vallina-Rodriguez Proceedings of the ACM Internet Measurement Conference (IMC), October 2020 | |
The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums
Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, Thomas Ristenpart Proceedings of the USENIX Security Symposium, August 2020 | |
A Security Analysis of the Facebook Ad Library
Laura Edelson, Tobias Lauinger, Damon McCoy IEEE Symposium on Security & Privacy (Oakland), San Francisco, CA, May 2020 | |
The Many Kinds of Creepware Used for Interpersonal Attacks
Kevin A. Roundy, Paula Barmaimon Mendelberg, Nicola Dell, Damon McCoy, Daniel Nissani, Thomas Ristenpart, and Acar Tamersoy IEEE Symposium on Security & Privacy (Oakland), San Francisco, CA, May 2020 | |
The Pod People: Understanding Manipulation of Social Media Popularity via Reciprocity Abuse
Janith Weerasinghe, Bailey Flanigan, Aviel Stein, Damon McCoy, and Rachel Greenstadt Proceedings of the Web Conference (WWW), April 2020 | |
Dark Matter: Uncovering the DarkComet RAT Ecosystem
Brown Farinholt, Mohammad Rezaeirad, Damon McCoy, and Kirill Levchenko Proceedings of the Web Conference (WWW), April 2020 |
2019 |
Mapping the Underground: Supervised Discovery of Cybercrime Supply Chains
Rasika Bhalerao, Maxwell Aliapoulios, Ilia Shumailov, Sadia Afroz, Damon McCoy IEEE APWG Symposium on Electronic Crime Research (eCrime), Pittsburgh, PA, November 2019 | |
Platforms in Everything: Analyzing Ground-Truth Data on the Anatomy and Economics of Bullet-Proof Hosting
Arman Noroozian, Jan Koenders, Eelco van Veldhuizen, Carlos H. Ganan, Sumayah Alrwais, Damon McCoy, and Michel van Eeten
Proceedings of the USENIX Security Symposium, Santa Clara, CA, August 2019 | |
Clinical Computer Security for Victims of Intimate Partner Violence
Sam Havron, Diana Freed, Rahul Chatterjee, Damon McCoy, Nicola Dell, and Thomas Ristenpart
Proceedings of the USENIX Security Symposium, Santa Clara, CA, August 2019 | |
Reading the Tea Leaves: A Comparative Analysis of Threat Intelligence
Vector Guo Li, Matthew Dunn, Paul Pearce, Damon McCoy, Geoffrey M. Voelker, Stefan Savage, and Kirill Levchenko
Proceedings of the USENIX Security Symposium, Santa Clara, CA, August 2019 | |
Iniquitous Cord-Cutting:An Analysis of Infringing IPTV Services
Prakhar Pandey, Maxwell Aliapoulios and Damon McCoy
Proceedings of the Workshop on Attackers and Cyber-Crime Operations (WACCO), Stockholm, Sweden, June 2019 | |
Evaluating Login Challenges as a Defense Against Account Takeover
Periwinkle Doerfler, Maija Marincenko, Juri Ranieri, Yu Jiang, Angelika Moscicki, Damon McCoy, and Kurt Thomas
Proceedings of the Web Conference (WWW), San Francisco, CA, May 2019 |
2018 |
Peeling the Onion's User Experience Layer: Examining Naturalistic Use of the Tor Browser
Kevin Gallagher, Sameer Patil, Brendan Dolan-Gavitt, Damon McCoy, Nasir Memon
ACM SIGSAC Conference on Computer and Communications Security (CCS), Toronto, Canada, October 2018 | |
Schrodinger's RAT: Profiling the Stakeholders in the Remote Access Trojan Ecosystem
Mohammad Rezaeirad, Brown Farinholt, Hitesh Dharmdasani, Paul Pearce, Kirill Levchenko, and Damon McCoy
USENIX Security, Baltimore, MD, August 2018 | |
Tracking Ransomware End-to-end
Danny Yuxing Huang, Maxwell Matthaios Aliapoulios, Vector Guo Li, Luca Invernizzi, Kylie McRoberts, Elie Bursztein, Jonathan Levin, Kirill Levchenko, Alex C. Snoeren, Damon McCoy IEEE Symposium on Security & Privacy (Oakland), San Francisco, CA, May 2018 | |
The Spyware Used in Intimate Partner Violence
Rahul Chatterjee, Periwinkle Doerfler, Hadas Orgad, Sam Havron, Jackeline Palmer, Diana Freed, Karen Levy, Nicola Dell, Damon McCoy, and Thomas Ristenpart IEEE Symposium on Security & Privacy (Oakland), San Francisco, CA, May 2018 | |
Bullet-Proof Payment Processors
Hongwei Tian, Stephen M. Gaffigan, D. Sean West, and Damon McCoy
IEEE APWG Symposium on Electronic Crime Research (eCrime), San Diego, CA, May 2018 |
2017 |
Fifteen Minutes of Unwanted Fame: Detecting and Characterizing Doxing
Peter Snyder Periwinkle Doerfler Chris Kanich Damon McCoy Proceedings of the ACM Internet Measurement Conference (IMC), 2017 | |
Identifying Products in Online Cybercrime Marketplaces: A Dataset for Fine-grained Domain Adaptation
Greg Durrett, Jonathan K. Kummerfeld, Taylor Berg-Kirkpatrick, Rebecca S. Portnoff, Sadia Afroz, Damon McCoy, Kirill Levchenko and Vern Paxson
Conference on Empirical Methods on Natural Language Processing (EMNLP), 2017 | |
Linking Amplification DDoS Attacks to Booter Services
Johannes Krupp, Mohammad Karami, Christian Rossow, Damon McCoy and Michael Backes
International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Atlanta, GA, September 2017 | |
Measuring the Effectiveness of Embedded Phishing Exercises
Hossein Siadati, Sean Palka, Avi Siegel and Damon McCoy
Proceedings of Workshop on Cyber Security Experimentation and Test (CSET), August 2017. | |
Backpage and Bitcoin: Uncovering Human Traffickers
Rebecca S. Portnoff, Danny Yuxing Huang, Periwinkle Doerfler, Sadia Afroz and Damon McCoy
Proceedings of the ACM SIGKDD Conference, Halifax, Nova Scotia, Canada, August 2017 | |
Booted: An Analysis of a Payment Intervention on a DDoS-for-Hire Service
Ryan Brunt, Prakhar Pandey and Damon McCoy
Workshop on the Economics of Information Security, San Diego, CA, June 2017 | |
Under the Shadow of Sunshine: Understanding and Detecting Bulletproof Hosting on Legitimate Service Provider Networks
Sumayah Alrwais, Xiaojing Liao, Xianghang Mi, Peng Wang, XiaoFeng Wang, Feng Qian, Raheem Beyah, and Damon McCoy
IEEE Symposium on Security & Privacy (Oakland), San Jose, CA, May 2017. | |
To Catch a Ratter: Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild
Brown Farinholt, Mohammad Rezaeirad, Paul Pearce, Hitesh Dharmdasani, Haikuo Yin, Stevens Le Blond, Damon McCoy, and Kirill Levchenko
IEEE Symposium on Security & Privacy (Oakland), San Jose, CA, May 2017. | |
Automated Analysis of Cybercriminal Markets
Rebecca S Portnoff, Sadia Afroz, Greg Durrett, Jonathan K Kummerfeld, Taylor Berg-Kirkpatrick, Damon McCoy, Kirill Levchenko and Vern Paxson
Proceedings of the World Wide Web Conference (WWW), Perth, Australia, April 2017. |
2016 |
Investigating Commercial Pay-Per-Install and the Distribution of Unwanted Software Kurt Thomas, Juan A. Elices Crespo, Ryan Rasti, Jean-Michel Picod, Cait Phillips, Marc-Andre Decoste, Chris Sharp, Fabio Tirelo, Ali Tofigh, Marc-Antoine Courteau, Lucas Ballard, Robert Shield, Nav Jagpal, Moheeb Abu Rajab, Panayiotis Mavrommatis, Niels Provos, Elie Bursztein, and Damon McCoy Proceedings of the USENIX Security Symposium, Austin, TX, August 2016. | |
You've Got Vulnerability: Exploring Effective Vulnerability Notifications Frank Li, Zakir Durumeric, Jakub Czyz, Mohammad Karami, Michael Bailey, Damon McCoy, Stefan Savage, and Vern Paxson Proceedings of the USENIX Security Symposium, Austin, TX, August 2016. | |
A Security Analysis of an In Vehicle Infotainment and App Platform Sahar Mazloom, Mohammad Rezaeirad, Aaron Hunter, and Damon McCoy 10th USENIX Workshop on Offensive Technologies (WOOT), Austin, TX , August 2016. | |
Deterring Financially Motivated Cybercrime Zachary K. Goldman and Damon McCoy Journal of National Security Law and Policy, Vol. 8, No. 3, 2016. | |
Profiling Underground Merchants Based on Network Behavior Srikanth Sundaresan, Damon McCoy, Sadia Afroz, and Vern Paxson Proceedings of the IEEE Symposium on Electronic Crime Research (eCrime), Toronto, Canada, June 2016. | |
Stress Testing the Booters: Understanding and Undermining the Business of DDoS Services Mohammad Karami, Youngsam Park and Damon McCoy Proceedings of the World Wide Web Conference (WWW), Montreal, Canada, April 2016. | |
Characterizing Long-tail SEO Spam on Cloud Web Hosting Services Xiaojing Liao, Chang Liu, Damon McCoy, Elaine Shi and Raheem Beyah Proceedings of the World Wide Web Conference (WWW), Montreal, Canada, April 2016. | |
Understanding Craigslist Rental Scams Youngsam Park, Damon McCoy and Elaine Shi Proceedings of Financial Cryptography and Data Security Conference (FC), Barbados, February 2016. | |
Stressing Out: Bitcoin "Stress Testing" Khaled Baqer, Danny Yuxing Huang, Damon McCoy and Nicholas Weaver Workshop on Bitcoin and Blockchain Research (BITCOIN), Barbados, February 2016. | |
Do You See What I See: Differential Treatment of Anonymous Users Sheharbano Khattak, David Fifield, Sadia Afroz, Mobin Javed, Srikanth Sundaresan, Vern Paxson, Steven J. Murdoch, and Damon McCoy Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2016. |
2015 |
Fuzzing E-mail Filters with Generative Grammars and N-Gram Analysis Sean Palka and Damon McCoy 9th USENIX Workshop on Offensive Technologies (WOOT 15), Washington, D.C., August 2015 | |
Framing Dependencies Introduced by Underground Commoditization Kurt Thomas, Danny Huang, David Wang, Elie Bursztein, Chris Grier, Thomas J. Holt, Christopher Kruegel, Damon McCoy, Stefan Savage, Giovanni Vigna Workshop on the Economics of Information Security, Amsterdam, NL, June 2015 | |
Ad Injection at Scale: Assessing Deceptive Advertisement Modifications Kurt Thomas, Elie Bursztein, Chris Grier, Grant Ho, Nav Jagpal, Alexandros Kapravelos, Damon McCoy, Antonio Nappa, Vern Paxson, Paul Pearce, Niels Provos, Moheeb Abu Rajab IEEE Symposium on Security & Privacy (Oakland 2014), San Jose, CA, May 2015. | |
Dynamic Phishing Content Using Generative Grammars Sean Palka and Damon Mccoy Proceedings of the IEEE Workshop on Security TestingGraz, Austria, April 2015 | |
"I Saw Images I Didn't Even Know I Had:" Understanding User Perceptions of Cloud Storage Privacy Jason W. Clark, Peter Snyder, Damon McCoy, Chris Kanich Proceedings of the ACM Conference on Computer-Human Interaction, Seoul, Korea, April 2015 |
2014 |
Dialing Back Abuse on Phone Verified Accounts Kurt Thomas, Dima Iatskiv, Elie Bursztein, Tadek Pietraszek, Chris Grier, Damon McCoy Proceedings of the ACM Conference on Computer and Communications Security, Scotsdale, Arizona, November 2014 | |
Characterizing Large-Scale Click Fraud in ZeroAccess Paul Pearce, Vacha Dave, Chris Grier, Kirill Levchenko, Saikat Guha, Damon McCoy, Vern Paxson, Stefan Savage, and Geoffrey M. Voelker Proceedings of the ACM Conference on Computer and Communications Security, Scotsdale, Arizona, November 2014 | |
Search + Seizure: The Effectiveness of Interventions on SEO Campaigns David Wang, Matthew Der, Mohammad Karami, Lawrence Saul, Damon McCoy, Stefan Savage, and Geoffrey M. Voelker Proceedings of the ACM Internet Measurement Conference, Vancouver, BC, Canada, November 2014 | |
The Check is in the Mail: Monetization of Craigslist Buyer Scams Jackie Jones and Damon McCoy IEEE eCrime Research Summit, Birmingham, AL, September 2014 | |
Empirically Characterizing Domain Abuse and the Revenue Impact of Blacklisting Neha Chachra, Damon McCoy, Stefan Savage, and Geoffrey M. Voelker Proceedings of the Workshop on the Economics of Information Security (WEIS), State College, PA, June 2014. | |
Doppelgänger Finder: Taking Stylometry To The Underground Sadia Afroz, Aylin Caliskan Islam, Ariel Stolerman, Rachel Greenstadt, Damon McCoy IEEE Symposium on Security & Privacy (Oakland 2014), San Jose, CA, May 2014. | |
Constructing and Analyzing Criminal Networks Hamed Sarvari, Ehab Abozinadah, Alex Mbaziira, Damon McCoy IEEE International Workshop on Cyber Crime (IWCC 2014), San Jose, CA, May 2014. | |
Botcoin: Monetizing Stolen Cycles Danny Yuxing Huang, Hitesh Dharmdasani, Sarah Meiklejohn, Vacha Dave, Kirill Levchenko, Alex C. Snoeren, Stefan Savage, Nicholas Weaver, Chris Grier, and Damon McCoy Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2014. | |
Scambaiter:
Understanding Targeted Nigerian Scams on Craigslist Youngsam Park, Jackie Jones, Damon McCoy, Elaine Shi and Markus Jakobsson Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2014. |
2013 |
Rent to Pwn: Analyzing Commodity Booter
DDoS Services Mohammad Karami and Damon McCoy USENIX ;login:, Vol. 38, No. 6, December 2013. | |
A Fistful of Bitcoins: Characterizing Payments
Among Men with No Names Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, and Stefan Savage USENIX ;login:, Vol. 38, No. 6, December 2013. | |
A Fistful of Bitcoins: Characterizing Payments Among Men with No Names Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, and Stefan Savage Proceedings of the ACM Internet Measurement Conference, Barcelona, Spain, October 2013. | |
Folex: An Analysis of an Herbal and Counterfeit Luxury Goods Affiliate Program Mohammad Karami, Shiva Ghaemi and Damon Mccoy IEEE eCrime Research Summit, San Francisco, CA September 2013 | |
Honor among thieves: A common's analysis of cybercrime economies Sadia Afroz, Vaibhav Garg, Damon McCoy, Rachel Greenstadt IEEE eCrime Research Summit, San Francisco, CA September 2013 | |
Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse Kurt Thomas, Damon McCoy, Chris Grier, Alek Kolcz, and Vern Paxson Proceedings of the USENIX Security Symposium, August 2013. | |
OCTANE (Open Car Testbed and Network Experiments): Bringing Cyber-Physical Security Research to Researchers and Students Christopher E. Everett and Damon McCoy Proceedings of the Workshop on Cyber Security Experimentation and Test, Washington D.C., August 2013. | |
There Are No Free iPads: An Analysis of Survey Scams as a Busines Jason W. Clark and Damon McCoy Proceedings of the USENIX Workshop on Large-Scale Exploits and Emergent Threats, Washington D.C., August 2013. | |
Understanding the Emerging Threat of DDoS-as-a-Service Mohammad Karami and Damon McCoy Proceedings of the USENIX Workshop on Large-Scale Exploits and Emergent Threats, Washington D.C., August 2013. |
2012 |
Priceless: The Role of Payments in Abuse-advertised Goods Damon McCoy, Hitesh Dharmdasani, Christian Kreibich, Geoffrey M. Voelker and Stefan Savage Proceedings of the ACM Conference on Computer and Communications Security, Raleigh, NC, October 2012. | |
Browser Exploits as a Service: The Monetization of Driveby Downloads Chris Grier, Lucas Ballard, Juan Caballero, Neha Chachra, Christian J. Dietrich, Kirill Levchenko, Panayiotis Mavrommatis, Damon McCoy, Antonio Nappa, Andreas Pitsillidis, Niels Provos, Zubair Rafique, Moheeb Abu Rajab, Christian Rossow, Kurt Thomas, Vern Paxson, Stefan Savage, and Geoffrey M. Voelker Proceedings of the ACM Conference on Computer and Communications Security, Raleigh, NC, October 2012. | |
PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs Damon McCoy, Andreas Pitsillidis, Grant Jordan, Nicholas Weaver, Christian Kreibich, Brian Krebs, Geoffrey M. Voelker, Stefan Savage, and Kirill Levchenko Proceedings of the USENIX Security Symposium, Bellevue, WA, August 2012. |
2011 |
An Analysis of Underground Forums Marti Motoyama, Damon McCoy, Stefan Savage, and Geoffrey M. Voelker Proceedings of the ACM Internet Measurement Conference, Berlin, CA, November 2011. | |
Comprehensive Experimental Analysis of Automototive Attack Surfaces Stephen Checkoway, Damon McCoy, Danny Anderson, Brian Kantor, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, Tadayoshi Kohno Proceedings of the USENIX Security Symposium, San Francisco, CA, August 2011. [ New York Times ] | |
Dirty Jobs: The Role of Freelance Labor in Web Service Abuse Marti Motoyama, Damon McCoy, Kirill Levchenko, Geoffrey M. Voelker, Stefan Savage Proceedings of the USENIX Security Symposium, San Francisco, CA, August 2011. | |
Show Me the Money: Characterizing Spam-advertised Revenue Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorson, Christian Kreibich, Kirill Levchenko, Vern Paxson, Geoffrey M. Voelker, Stefan Savage Proceedings of the USENIX Security Symposium, San Francisco, CA, August 2011. | |
No Plan Survives Contact: Experience with Cybercrime Measurement Chris Kanich, Neha Chachra, Damon McCoy, Chris Grier, David Wang, Marti Motoyama, Kirill Levchenko, Stefan Savage, Geoffrey M. Veolker Proceedings of Workshop on Cyber Security Experimentation and Test (CSET), August 2011. | |
ExperimenTor: A Testbed for Safe and Realistic Tor Experimentation Kevin Bauer, Micah Sherr, Damon McCoy, Dirk Grunwald To appear at 4th USENIX Workshop on Cyber Security Experimentation and Test (CSET) San Francisco, CA, August 2011 | |
DefenestraTor: Throwing out Windows in Tor Mashael AlSabah, Kevin Bauer, Ian Goldberg, Dirk Grunwald, Damon McCoy, Stefan Savage, Geoffrey M. Voelker Privacy Enhancing Technologies Symposium, Waterloo, Canada, July 2011 | |
Click Trajectories: End-to-End Analysis of the Spam Value Chain Kirill Levchenko, Neha Chachra, Brandon Enright, Mark Felegyhazi, Chris Grier, Tristan Halvorson, Chris Kanich, Christian Kreibich, He Liu, Damon McCoy, Andreas Pitsillidis, Nicholas Weaver, Vern Paxson, Geoffrey M. Voelker, Stefan Savage Proceedings of the IEEE Symposium and Security and Privacy, Oakland, CA, May 2011 [ The New York Times, CBS ] | |
Proximax: A Measurement Based System for Proxies Dissemination Damon McCoy, Jose Andre Morales, Kirill Levchenko Financial Cryptography and Data Security, St. Lucia, February 2011 |
2010 |
Practical Defenses for Evil Twin Attacks in 802.11 Harold Gonzales, Kevin Bauer, Janne Lindqvist, Damon McCoy, Douglas Sicker IEEE Globecom Communications and Information Security Symposium, Miami, FL, December 2010 | |
Wifi-Reports: Improving Wireless Network Selection with Collaboration Jeffrey Pang, Ben Greenstein, Michael Kaminsky, Damon McCoy, Srinivasan Seshan IEEE Transactions On Mobile Computing, Vol. 9 2010 [ Wifi-Scanner Tool, Crawdad Data Set ] | |
Re: CAPTCHAs -- Understanding CAPTCHA Solving from an Economic Context Marti Motoyama, Kirill Levchenko, Chris Kanich, Damon McCoy, Geoffrey M. Voelker, Stefan Savage Proceedings of the USENIX Security Symposium, Washington, D.C., August 2010. [ NPR, MIT Technology Review ] | |
Experimental Security Analysis of a Modern Automobile Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage Proceedings of the IEEE Symposium and Security and Privacy, Oakland, CA, May 2010 [ Automotive Security Project Web Page ] [ The New York Times, PC World, Technology Review, Slashdot, Popular Science, BBC ] |
2009 |
BitStalker: Accurately and Efficiently Monitoring BitTorrent Traffic Kevin Bauer, Damon McCoy, Dirk Grunwald, Douglas Sicker Proceedings of the 1st IEEE Workshop on Information Forensics and Security , London, United Kingdom, December, 2009 [Slashdot] | |
The Directional Attack on Wireless Localization - or - How to Spoof your Location with a Tin Can Kevin Bauer, Damon McCoy, Eric Anderson, Markus Breitenbach, Greg Grudic, Dirk Grunwald, Douglas Sicker Proceedings of the IEEE Globecom Communications and Information Security Symposium , Honolulu, HI, USA, November, 2009 [ Crawdad Data Set] | |
Physical Layer Attacks on Unlinkability in Wireless LANs Kevin Bauer, Damon McCoy, Ben Greenstein, Dirk Grunwald, Douglas Sicker Proceedings of the 9th Privacy Enhancing Technologies Symposium (PETS 2009) , Seattle, WA, USA, August, 2009 [ Crawdad Data Set] | |
Wifi-Reports: Improving Wireless Network Selection with Collaboration Jeffrey Pang, Ben Greenstein, Michael Kaminsky, Damon McCoy, Srinivasan Seshan MobiSys '09: 7th International Conference on Mobile Systems, Applications, and Services, 2009, Krakow, Poland [ Wifi-Scanner Tool Crawdad Data Set] |
2008 |
Mitigating Evil Twin Attacks in 802.11 Kevin Bauer, Harold Gonzales, Damon McCoy Proceedings of 1st IEEE International Workshop on Information and Data Assurance (WIDA 2008) in conjunction with the 27th IEEE International Performance Computing and Communications Conference (IPCCC 2008) , Austin, TX, USA, December, 2008 | |
BitBlender: Light-Weight Anonymity for BitTorrent Kevin Bauer, Damon McCoy, Dirk Grunwald, Douglas Sicker Proceedings of the Workshop on Applications of Private and Anonymous Communications (AlPACa 2008) in conjunction with SecureComm 2008 , Istanbul, Turkey, September, 2008 | |
Shining Light in Dark Places: Understanding the Tor Network Damon McCoy, Kevin Bauer, Dirk Grunwald, Tadayoshi Kohno, Douglas Sicker Proceedings of the 8th Privacy Enhancing Technologies Symposium (PETS 2008) , Leuven, Belgium, July, 2008 | |
Improving Wireless Privacy with an Identifier-Free Link Layer Protocol (Best Paper Award.) Ben Greenstein, Damon McCoy, Jeffrey Pang, Tadayoshi Kohno, Srinivasan Seshan, David Wetherall MobiSys '08: 6th International Conference on Mobile Systems, Application, and Services , Breckenridge, CO, USA, June, 2008 [ More information (including SlyFi code) ] |
2007 |
Tryst: The Case for Confidential Service Discovery Jeffrey Pang, Ben Greenstein, Damon McCoy, Srinivasan Seshan, David Wetherall HotNets VI: The Sixth Workshop on Hot Topics in Networks , Atlanta, GA, USA, October, 2007 | |
Low-Resource Routing Attacks Against Tor Kevin Bauer, Damon McCoy, Dirk Grunwald, Tadayoshi Kohno, Douglas Sicker Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2007) , Alexandria, VA, USA, October, 2007 [ Slashdot FAQ Technical Report ] | |
A Mechanism for Detecting and Responding to Misbehaving Nodes in Wireless Networks Damon McCoy, Douglas Sicker, Dirk Grunwald SDR Workshop, IEEE SECON , 2007 |
2006 |
Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting Jason Franklin, Damon McCoy, Parisa Tabriz, Vicentiu Neagoe, Jamie Van Randwyk, Douglas Sicker Proceedings of the 15th USENIX Security Symposium , Vancouver, BC, Canada, August, 2006 [Slashdot Sandia Labs CNBC (WMV Video)] |