2023
No Privacy Among Spies: Assessing the Functionality and Insecurity of Consumer Android Spyware Apps
Enze Liu, Sumanth Rao, Sam Havron, Grant Ho, Stefan Savage, Geoffrey M Voelker, Damon McCoy
Proceedings on Privacy Enhancing Technologies, 2023

Propaganda Política Pagada: Exploring U.S. Political Facebook Ads en Español
Bruno Coelho, Tobias Lauinger, Laura Edelson, Ian Goldstein, Damon McCoy
Proceedings of the ACM Web Conference 2023 (WWW '23), May, 2023, Austin, TX

2022
Money Over Morals: A Business Analysis of Conti Ransomware
Ian W. Gray, Jack Cable, Vlad Cuiujuclu, Benjamin Brown, Damon McCoy
IEEE Symposium on Electronic Crime Research (eCrime 2022)

Cart-ology: Intercepting Targeted Advertising via Ad Network Identity Entanglement
ChangSeok Oh, Damon McCoy, Chris Kanich, Paul Pearce
ACM Conference on Computer and Communications Security (CCS 2022)

An Analysis of Terms of Service and Official Policies with Respect to Sex Work
Rasika Bhalerao and Damon McCoy
IEEE International Symposium on Technology and Society 2022 (ISTAS 2022)

Ethics and Efficacy of Unsolicited Anti-Trafficking SMS Outreach
Rasika Bhalerao, Nora McDonald, Hanna Barakat, Vaughn Hamilton, Damon McCoy, and Elissa M. Redmiles
Proceedings of the ACM Conference on Computer-Supported Cooperative Work and Social Computing (CSCW 2022)

``It feels like whack-a-mole'': User Experiences of Data Removal from People Search Websites
Kejsi Take, Kevin Gallagher, Andrea Forte, Damon McCoy, and Rachel Greenstadt
Proceedings on Privacy Enhancing Technologies, July 2022

Conspiracy Brokers: Understanding the Monetization of YouTube Conspiracy Theories
Cameron Ballard, Ian Goldstein, Pulak Mehta, Genesis Smothers, Kejsi Take, Victoria Zhong, Rachel Greenstadt, Tobias Lauinger, Damon McCoy
Proceedings of the ACM Web Conference, May 2022

An Audit of Facebook's Political Ad Policy Enforcement
Victor Le Pochat, Laura Edelson, Tom Van Goethem, Wouter Joosen, Damon McCoy, Tobias Lauinger
Proceedings of the USENIX Security Symposium, August 2022

2021
Understanding Engagement with (Mis)Information News Sources on Facebook
Laura Edelson, Minh-Kha Nguyen, Ian Goldstein, Oana Goga, Damon McCoy, Tobias Lauinger
ACM Internet Measurement Conference (IMC), November 2021

A Large-Scale Characterization of Online Incitements to Harassment Across Platforms
Max Aliapoulios, Kejsi Take, Prashanth Ramakrishna, Daniel Borkan, Beth Goldberg, Jeffrey Sorensen, Anna Turner, Rachel Greenstadt, Tobias Lauinger, Damon McCoy
ACM Internet Measurement Conference (IMC), November 2021

"I'm a Professor, which isn't usually a dangerous job": Internet-Facilitated Harassment and its Impact on Researchers
Periwinkle Doerfler, Andrea Forte, Emiliano De Cristofaro, Gianluca Stringhini, Jeremy Blackburn, Damon McCoy
ACM Conference on Computer-Supported Cooperative Work and Social Computing, Issue CSCW, 2021

Swiped: Analyzing Ground-truth Data of a Marketplace for Stolen Debit and Credit Cards
Maxwell Aliapoulios, Cameron Ballard, Rasika Bhalerao, Tobias Lauinger, Damon McCoy
Proceedings of the USENIX Security Symposium, August 2021

SoK: Hate, Harassment, and the Changing Landscape of Online Abuse
Kurt Thomas, Devdatta Akhawe, Michael Bailey, Dan Boneh, Elie Bursztein, Sunny Consolvo, Nicola Dell, Zakir Durumeric, Patrick Gage Kelley, Deepak Kumar, Damon McCoy, Sarah Meiklejohn, Thomas Ristenpart, Gianluca Stringhini.
IEEE Symposium on Security and Privacy (Oakland), May 2021

Dark Web Marketplaces and COVID-19: before the vaccine
Alberto Bracci, Matthieu Nadini, Maxwell Aliapoulios, Damon McCoy, Ian Gray, Alexander Teytelboym, Angela Gallo, Andrea Baronchelli
EPJ Data Science, 2021

"So-called privacy breeds evil": Narrative Justifications for Intimate Partner Surveillance in Online Forums.
Rosanna Bellini, Emily Tseng, Nora McDonald, Rachel Greenstadt, Damon McCoy, Thomas Ristenpart, Nicola Dell
ACM Conference on Computer-Supported Cooperative Work and Social Computing, Issue CSCW, 2021

2020
Understanding Incentivized Mobile App Installs on Google Play Store
Shehroze Farooqi, Alvaro Feal, Tobias Lauinger, Damon McCoy, Zubair Shafiq, Narseo Vallina-Rodriguez
Proceedings of the ACM Internet Measurement Conference (IMC), October 2020

The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums
Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, Thomas Ristenpart
Proceedings of the USENIX Security Symposium, August 2020

A Security Analysis of the Facebook Ad Library
Laura Edelson, Tobias Lauinger, Damon McCoy
IEEE Symposium on Security & Privacy (Oakland), San Francisco, CA, May 2020

The Many Kinds of Creepware Used for Interpersonal Attacks
Kevin A. Roundy, Paula Barmaimon Mendelberg, Nicola Dell, Damon McCoy, Daniel Nissani, Thomas Ristenpart, and Acar Tamersoy
IEEE Symposium on Security & Privacy (Oakland), San Francisco, CA, May 2020

The Pod People: Understanding Manipulation of Social Media Popularity via Reciprocity Abuse
Janith Weerasinghe, Bailey Flanigan, Aviel Stein, Damon McCoy, and Rachel Greenstadt
Proceedings of the Web Conference (WWW), April 2020

Dark Matter: Uncovering the DarkComet RAT Ecosystem
Brown Farinholt, Mohammad Rezaeirad, Damon McCoy, and Kirill Levchenko
Proceedings of the Web Conference (WWW), April 2020

2019
Mapping the Underground: Supervised Discovery of Cybercrime Supply Chains
Rasika Bhalerao, Maxwell Aliapoulios, Ilia Shumailov, Sadia Afroz, Damon McCoy
IEEE APWG Symposium on Electronic Crime Research (eCrime), Pittsburgh, PA, November 2019

Platforms in Everything: Analyzing Ground-Truth Data on the Anatomy and Economics of Bullet-Proof Hosting
Arman Noroozian, Jan Koenders, Eelco van Veldhuizen, Carlos H. Ganan, Sumayah Alrwais, Damon McCoy, and Michel van Eeten
Proceedings of the USENIX Security Symposium, Santa Clara, CA, August 2019

Clinical Computer Security for Victims of Intimate Partner Violence
Sam Havron, Diana Freed, Rahul Chatterjee, Damon McCoy, Nicola Dell, and Thomas Ristenpart
Proceedings of the USENIX Security Symposium, Santa Clara, CA, August 2019

Reading the Tea Leaves: A Comparative Analysis of Threat Intelligence
Vector Guo Li, Matthew Dunn, Paul Pearce, Damon McCoy, Geoffrey M. Voelker, Stefan Savage, and Kirill Levchenko
Proceedings of the USENIX Security Symposium, Santa Clara, CA, August 2019

Iniquitous Cord-Cutting:An Analysis of Infringing IPTV Services
Prakhar Pandey, Maxwell Aliapoulios and Damon McCoy
Proceedings of the Workshop on Attackers and Cyber-Crime Operations (WACCO), Stockholm, Sweden, June 2019

Evaluating Login Challenges as a Defense Against Account Takeover
Periwinkle Doerfler, Maija Marincenko, Juri Ranieri, Yu Jiang, Angelika Moscicki, Damon McCoy, and Kurt Thomas
Proceedings of the Web Conference (WWW), San Francisco, CA, May 2019

2018
Peeling the Onion's User Experience Layer: Examining Naturalistic Use of the Tor Browser
Kevin Gallagher, Sameer Patil, Brendan Dolan-Gavitt, Damon McCoy, Nasir Memon
ACM SIGSAC Conference on Computer and Communications Security (CCS), Toronto, Canada, October 2018

Schrodinger's RAT: Profiling the Stakeholders in the Remote Access Trojan Ecosystem
Mohammad Rezaeirad, Brown Farinholt, Hitesh Dharmdasani, Paul Pearce, Kirill Levchenko, and Damon McCoy
USENIX Security, Baltimore, MD, August 2018

Tracking Ransomware End-to-end
Danny Yuxing Huang, Maxwell Matthaios Aliapoulios, Vector Guo Li, Luca Invernizzi, Kylie McRoberts, Elie Bursztein, Jonathan Levin, Kirill Levchenko, Alex C. Snoeren, Damon McCoy
IEEE Symposium on Security & Privacy (Oakland), San Francisco, CA, May 2018

The Spyware Used in Intimate Partner Violence
Rahul Chatterjee, Periwinkle Doerfler, Hadas Orgad, Sam Havron, Jackeline Palmer, Diana Freed, Karen Levy, Nicola Dell, Damon McCoy, and Thomas Ristenpart
IEEE Symposium on Security & Privacy (Oakland), San Francisco, CA, May 2018

Bullet-Proof Payment Processors
Hongwei Tian, Stephen M. Gaffigan, D. Sean West, and Damon McCoy
IEEE APWG Symposium on Electronic Crime Research (eCrime), San Diego, CA, May 2018

2017
Fifteen Minutes of Unwanted Fame: Detecting and Characterizing Doxing
Peter Snyder Periwinkle Doerfler Chris Kanich Damon McCoy
Proceedings of the ACM Internet Measurement Conference (IMC), 2017

Identifying Products in Online Cybercrime Marketplaces: A Dataset for Fine-grained Domain Adaptation
Greg Durrett, Jonathan K. Kummerfeld, Taylor Berg-Kirkpatrick, Rebecca S. Portnoff, Sadia Afroz, Damon McCoy, Kirill Levchenko and Vern Paxson
Conference on Empirical Methods on Natural Language Processing (EMNLP), 2017

Linking Amplification DDoS Attacks to Booter Services
Johannes Krupp, Mohammad Karami, Christian Rossow, Damon McCoy and Michael Backes
International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Atlanta, GA, September 2017

Measuring the Effectiveness of Embedded Phishing Exercises
Hossein Siadati, Sean Palka, Avi Siegel and Damon McCoy
Proceedings of Workshop on Cyber Security Experimentation and Test (CSET), August 2017.

Backpage and Bitcoin: Uncovering Human Traffickers
Rebecca S. Portnoff, Danny Yuxing Huang, Periwinkle Doerfler, Sadia Afroz and Damon McCoy
Proceedings of the ACM SIGKDD Conference, Halifax, Nova Scotia, Canada, August 2017

Booted: An Analysis of a Payment Intervention on a DDoS-for-Hire Service
Ryan Brunt, Prakhar Pandey and Damon McCoy
Workshop on the Economics of Information Security, San Diego, CA, June 2017

Under the Shadow of Sunshine: Understanding and Detecting Bulletproof Hosting on Legitimate Service Provider Networks
Sumayah Alrwais, Xiaojing Liao, Xianghang Mi, Peng Wang, XiaoFeng Wang, Feng Qian, Raheem Beyah, and Damon McCoy
IEEE Symposium on Security & Privacy (Oakland), San Jose, CA, May 2017.

To Catch a Ratter: Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild
Brown Farinholt, Mohammad Rezaeirad, Paul Pearce, Hitesh Dharmdasani, Haikuo Yin, Stevens Le Blond, Damon McCoy, and Kirill Levchenko
IEEE Symposium on Security & Privacy (Oakland), San Jose, CA, May 2017.

Automated Analysis of Cybercriminal Markets
Rebecca S Portnoff, Sadia Afroz, Greg Durrett, Jonathan K Kummerfeld, Taylor Berg-Kirkpatrick, Damon McCoy, Kirill Levchenko and Vern Paxson
Proceedings of the World Wide Web Conference (WWW), Perth, Australia, April 2017.

2016
Investigating Commercial Pay-Per-Install and the Distribution of Unwanted Software
Kurt Thomas, Juan A. Elices Crespo, Ryan Rasti, Jean-Michel Picod, Cait Phillips, Marc-Andre Decoste, Chris Sharp, Fabio Tirelo, Ali Tofigh, Marc-Antoine Courteau, Lucas Ballard, Robert Shield, Nav Jagpal, Moheeb Abu Rajab, Panayiotis Mavrommatis, Niels Provos, Elie Bursztein, and Damon McCoy
Proceedings of the USENIX Security Symposium, Austin, TX, August 2016.

You've Got Vulnerability: Exploring Effective Vulnerability Notifications
Frank Li, Zakir Durumeric, Jakub Czyz, Mohammad Karami, Michael Bailey, Damon McCoy, Stefan Savage, and Vern Paxson
Proceedings of the USENIX Security Symposium, Austin, TX, August 2016.

A Security Analysis of an In Vehicle Infotainment and App Platform
Sahar Mazloom, Mohammad Rezaeirad, Aaron Hunter, and Damon McCoy
10th USENIX Workshop on Offensive Technologies (WOOT), Austin, TX , August 2016.

Deterring Financially Motivated Cybercrime
Zachary K. Goldman and Damon McCoy
Journal of National Security Law and Policy, Vol. 8, No. 3, 2016.

Profiling Underground Merchants Based on Network Behavior
Srikanth Sundaresan, Damon McCoy, Sadia Afroz, and Vern Paxson
Proceedings of the IEEE Symposium on Electronic Crime Research (eCrime), Toronto, Canada, June 2016.

Stress Testing the Booters: Understanding and Undermining the Business of DDoS Services
Mohammad Karami, Youngsam Park and Damon McCoy
Proceedings of the World Wide Web Conference (WWW), Montreal, Canada, April 2016.

Characterizing Long-tail SEO Spam on Cloud Web Hosting Services
Xiaojing Liao, Chang Liu, Damon McCoy, Elaine Shi and Raheem Beyah
Proceedings of the World Wide Web Conference (WWW), Montreal, Canada, April 2016.

Understanding Craigslist Rental Scams
Youngsam Park, Damon McCoy and Elaine Shi
Proceedings of Financial Cryptography and Data Security Conference (FC), Barbados, February 2016.

Stressing Out: Bitcoin "Stress Testing"
Khaled Baqer, Danny Yuxing Huang, Damon McCoy and Nicholas Weaver
Workshop on Bitcoin and Blockchain Research (BITCOIN), Barbados, February 2016.

Do You See What I See: Differential Treatment of Anonymous Users
Sheharbano Khattak, David Fifield, Sadia Afroz, Mobin Javed, Srikanth Sundaresan, Vern Paxson, Steven J. Murdoch, and Damon McCoy
Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2016.

2015
Fuzzing E-mail Filters with Generative Grammars and N-Gram Analysis
Sean Palka and Damon McCoy
9th USENIX Workshop on Offensive Technologies (WOOT 15), Washington, D.C., August 2015

Framing Dependencies Introduced by Underground Commoditization
Kurt Thomas, Danny Huang, David Wang, Elie Bursztein, Chris Grier, Thomas J. Holt, Christopher Kruegel, Damon McCoy, Stefan Savage, Giovanni Vigna
Workshop on the Economics of Information Security, Amsterdam, NL, June 2015

Ad Injection at Scale: Assessing Deceptive Advertisement Modifications
Kurt Thomas, Elie Bursztein, Chris Grier, Grant Ho, Nav Jagpal, Alexandros Kapravelos, Damon McCoy, Antonio Nappa, Vern Paxson, Paul Pearce, Niels Provos, Moheeb Abu Rajab
IEEE Symposium on Security & Privacy (Oakland 2014), San Jose, CA, May 2015.

Dynamic Phishing Content Using Generative Grammars
Sean Palka and Damon Mccoy
Proceedings of the IEEE Workshop on Security TestingGraz, Austria, April 2015

"I Saw Images I Didn't Even Know I Had:" Understanding User Perceptions of Cloud Storage Privacy
Jason W. Clark, Peter Snyder, Damon McCoy, Chris Kanich
Proceedings of the ACM Conference on Computer-Human Interaction, Seoul, Korea, April 2015

2014
Dialing Back Abuse on Phone Verified Accounts
Kurt Thomas, Dima Iatskiv, Elie Bursztein, Tadek Pietraszek, Chris Grier, Damon McCoy
Proceedings of the ACM Conference on Computer and Communications Security, Scotsdale, Arizona, November 2014

Characterizing Large-Scale Click Fraud in ZeroAccess
Paul Pearce, Vacha Dave, Chris Grier, Kirill Levchenko, Saikat Guha, Damon McCoy, Vern Paxson, Stefan Savage, and Geoffrey M. Voelker
Proceedings of the ACM Conference on Computer and Communications Security, Scotsdale, Arizona, November 2014

Search + Seizure: The Effectiveness of Interventions on SEO Campaigns
David Wang, Matthew Der, Mohammad Karami, Lawrence Saul, Damon McCoy, Stefan Savage, and Geoffrey M. Voelker
Proceedings of the ACM Internet Measurement Conference, Vancouver, BC, Canada, November 2014

The Check is in the Mail: Monetization of Craigslist Buyer Scams
Jackie Jones and Damon McCoy
IEEE eCrime Research Summit, Birmingham, AL, September 2014
Empirically Characterizing Domain Abuse and the Revenue Impact of Blacklisting
Neha Chachra, Damon McCoy, Stefan Savage, and Geoffrey M. Voelker
Proceedings of the Workshop on the Economics of Information Security (WEIS), State College, PA, June 2014.

Doppelgänger Finder: Taking Stylometry To The Underground
Sadia Afroz, Aylin Caliskan Islam, Ariel Stolerman, Rachel Greenstadt, Damon McCoy
IEEE Symposium on Security & Privacy (Oakland 2014), San Jose, CA, May 2014.

Constructing and Analyzing Criminal Networks
Hamed Sarvari, Ehab Abozinadah, Alex Mbaziira, Damon McCoy
IEEE International Workshop on Cyber Crime (IWCC 2014), San Jose, CA, May 2014.

Botcoin: Monetizing Stolen Cycles
Danny Yuxing Huang, Hitesh Dharmdasani, Sarah Meiklejohn, Vacha Dave, Kirill Levchenko, Alex C. Snoeren, Stefan Savage, Nicholas Weaver, Chris Grier, and Damon McCoy
Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2014.

Scambaiter: Understanding Targeted Nigerian Scams on Craigslist
Youngsam Park, Jackie Jones, Damon McCoy, Elaine Shi and Markus Jakobsson
Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2014.

2013
Rent to Pwn: Analyzing Commodity Booter DDoS Services
Mohammad Karami and Damon McCoy
USENIX ;login:, Vol. 38, No. 6, December 2013.
A Fistful of Bitcoins: Characterizing Payments Among Men with No Names
Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, and Stefan Savage
USENIX ;login:, Vol. 38, No. 6, December 2013.
A Fistful of Bitcoins: Characterizing Payments Among Men with No Names
Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, and Stefan Savage
Proceedings of the ACM Internet Measurement Conference, Barcelona, Spain, October 2013.
Folex: An Analysis of an Herbal and Counterfeit Luxury Goods Affiliate Program
Mohammad Karami, Shiva Ghaemi and Damon Mccoy
IEEE eCrime Research Summit, San Francisco, CA September 2013
Honor among thieves: A common's analysis of cybercrime economies
Sadia Afroz, Vaibhav Garg, Damon McCoy, Rachel Greenstadt
IEEE eCrime Research Summit, San Francisco, CA September 2013
Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse
Kurt Thomas, Damon McCoy, Chris Grier, Alek Kolcz, and Vern Paxson
Proceedings of the USENIX Security Symposium, August 2013.
OCTANE (Open Car Testbed and Network Experiments): Bringing Cyber-Physical Security Research to Researchers and Students
Christopher E. Everett and Damon McCoy
Proceedings of the Workshop on Cyber Security Experimentation and Test, Washington D.C., August 2013.
There Are No Free iPads: An Analysis of Survey Scams as a Busines
Jason W. Clark and Damon McCoy
Proceedings of the USENIX Workshop on Large-Scale Exploits and Emergent Threats, Washington D.C., August 2013.
Understanding the Emerging Threat of DDoS-as-a-Service
Mohammad Karami and Damon McCoy
Proceedings of the USENIX Workshop on Large-Scale Exploits and Emergent Threats, Washington D.C., August 2013.
2012
Priceless: The Role of Payments in Abuse-advertised Goods
Damon McCoy, Hitesh Dharmdasani, Christian Kreibich, Geoffrey M. Voelker and Stefan Savage
Proceedings of the ACM Conference on Computer and Communications Security, Raleigh, NC, October 2012.
Browser Exploits as a Service: The Monetization of Driveby Downloads
Chris Grier, Lucas Ballard, Juan Caballero, Neha Chachra, Christian J. Dietrich, Kirill Levchenko, Panayiotis Mavrommatis, Damon McCoy, Antonio Nappa, Andreas Pitsillidis, Niels Provos, Zubair Rafique, Moheeb Abu Rajab, Christian Rossow, Kurt Thomas, Vern Paxson, Stefan Savage, and Geoffrey M. Voelker
Proceedings of the ACM Conference on Computer and Communications Security, Raleigh, NC, October 2012.
PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs
Damon McCoy, Andreas Pitsillidis, Grant Jordan, Nicholas Weaver, Christian Kreibich, Brian Krebs, Geoffrey M. Voelker, Stefan Savage, and Kirill Levchenko
Proceedings of the USENIX Security Symposium, Bellevue, WA, August 2012.
2011
An Analysis of Underground Forums
Marti Motoyama, Damon McCoy, Stefan Savage, and Geoffrey M. Voelker
Proceedings of the ACM Internet Measurement Conference, Berlin, CA, November 2011.
Comprehensive Experimental Analysis of Automototive Attack Surfaces
Stephen Checkoway, Damon McCoy, Danny Anderson, Brian Kantor, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, Tadayoshi Kohno
Proceedings of the USENIX Security Symposium, San Francisco, CA, August 2011.
[ New York Times ]
Dirty Jobs: The Role of Freelance Labor in Web Service Abuse
Marti Motoyama, Damon McCoy, Kirill Levchenko, Geoffrey M. Voelker, Stefan Savage
Proceedings of the USENIX Security Symposium, San Francisco, CA, August 2011.
Show Me the Money: Characterizing Spam-advertised Revenue
Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorson, Christian Kreibich, Kirill Levchenko, Vern Paxson, Geoffrey M. Voelker, Stefan Savage
Proceedings of the USENIX Security Symposium, San Francisco, CA, August 2011.
No Plan Survives Contact: Experience with Cybercrime Measurement
Chris Kanich, Neha Chachra, Damon McCoy, Chris Grier, David Wang, Marti Motoyama, Kirill Levchenko, Stefan Savage, Geoffrey M. Veolker
Proceedings of Workshop on Cyber Security Experimentation and Test (CSET), August 2011.
ExperimenTor: A Testbed for Safe and Realistic Tor Experimentation
Kevin Bauer, Micah Sherr, Damon McCoy, Dirk Grunwald
To appear at 4th USENIX Workshop on Cyber Security Experimentation and Test (CSET) San Francisco, CA, August 2011
DefenestraTor: Throwing out Windows in Tor
Mashael AlSabah, Kevin Bauer, Ian Goldberg, Dirk Grunwald, Damon McCoy, Stefan Savage, Geoffrey M. Voelker
Privacy Enhancing Technologies Symposium, Waterloo, Canada, July 2011
Click Trajectories: End-to-End Analysis of the Spam Value Chain
Kirill Levchenko, Neha Chachra, Brandon Enright, Mark Felegyhazi, Chris Grier, Tristan Halvorson, Chris Kanich, Christian Kreibich, He Liu, Damon McCoy, Andreas Pitsillidis, Nicholas Weaver, Vern Paxson, Geoffrey M. Voelker, Stefan Savage
Proceedings of the IEEE Symposium and Security and Privacy, Oakland, CA, May 2011
[ The New York Times, CBS ]
Proximax: A Measurement Based System for Proxies Dissemination
Damon McCoy, Jose Andre Morales, Kirill Levchenko
Financial Cryptography and Data Security, St. Lucia, February 2011

2010
Practical Defenses for Evil Twin Attacks in 802.11
Harold Gonzales, Kevin Bauer, Janne Lindqvist, Damon McCoy, Douglas Sicker
IEEE Globecom Communications and Information Security Symposium, Miami, FL, December 2010
Wifi-Reports: Improving Wireless Network Selection with Collaboration
Jeffrey Pang, Ben Greenstein, Michael Kaminsky, Damon McCoy, Srinivasan Seshan
IEEE Transactions On Mobile Computing, Vol. 9 2010
[ Wifi-Scanner Tool, Crawdad Data Set ]
Re: CAPTCHAs -- Understanding CAPTCHA Solving from an Economic Context
Marti Motoyama, Kirill Levchenko, Chris Kanich, Damon McCoy, Geoffrey M. Voelker, Stefan Savage
Proceedings of the USENIX Security Symposium, Washington, D.C., August 2010.
[ NPR, MIT Technology Review ]
Experimental Security Analysis of a Modern Automobile
Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage
Proceedings of the IEEE Symposium and Security and Privacy, Oakland, CA, May 2010
[ Automotive Security Project Web Page ] [ The New York Times, PC World, Technology Review, Slashdot, Popular Science, BBC ]

2009
BitStalker: Accurately and Efficiently Monitoring BitTorrent Traffic
Kevin Bauer, Damon McCoy, Dirk Grunwald, Douglas Sicker
Proceedings of the 1st IEEE Workshop on Information Forensics and Security , London, United Kingdom, December, 2009
[Slashdot]
The Directional Attack on Wireless Localization - or - How to Spoof your Location with a Tin Can
Kevin Bauer, Damon McCoy, Eric Anderson, Markus Breitenbach, Greg Grudic, Dirk Grunwald, Douglas Sicker
Proceedings of the IEEE Globecom Communications and Information Security Symposium , Honolulu, HI, USA, November, 2009
[ Crawdad Data Set]
Physical Layer Attacks on Unlinkability in Wireless LANs
Kevin Bauer, Damon McCoy, Ben Greenstein, Dirk Grunwald, Douglas Sicker
Proceedings of the 9th Privacy Enhancing Technologies Symposium (PETS 2009) , Seattle, WA, USA, August, 2009
[ Crawdad Data Set]
Wifi-Reports: Improving Wireless Network Selection with Collaboration
Jeffrey Pang, Ben Greenstein, Michael Kaminsky, Damon McCoy, Srinivasan Seshan
MobiSys '09: 7th International Conference on Mobile Systems, Applications, and Services, 2009, Krakow, Poland
[ Wifi-Scanner Tool Crawdad Data Set]

2008
Mitigating Evil Twin Attacks in 802.11
Kevin Bauer, Harold Gonzales, Damon McCoy
Proceedings of 1st IEEE International Workshop on Information and Data Assurance (WIDA 2008) in conjunction with the 27th IEEE International Performance Computing and Communications Conference (IPCCC 2008) , Austin, TX, USA, December, 2008
BitBlender: Light-Weight Anonymity for BitTorrent
Kevin Bauer, Damon McCoy, Dirk Grunwald, Douglas Sicker
Proceedings of the Workshop on Applications of Private and Anonymous Communications (AlPACa 2008) in conjunction with SecureComm 2008 , Istanbul, Turkey, September, 2008
Shining Light in Dark Places: Understanding the Tor Network
Damon McCoy, Kevin Bauer, Dirk Grunwald, Tadayoshi Kohno, Douglas Sicker
Proceedings of the 8th Privacy Enhancing Technologies Symposium (PETS 2008) , Leuven, Belgium, July, 2008
Improving Wireless Privacy with an Identifier-Free Link Layer Protocol (Best Paper Award.)
Ben Greenstein, Damon McCoy, Jeffrey Pang, Tadayoshi Kohno, Srinivasan Seshan, David Wetherall
MobiSys '08: 6th International Conference on Mobile Systems, Application, and Services , Breckenridge, CO, USA, June, 2008
[ More information (including SlyFi code) ]

2007
Tryst: The Case for Confidential Service Discovery
Jeffrey Pang, Ben Greenstein, Damon McCoy, Srinivasan Seshan, David Wetherall
HotNets VI: The Sixth Workshop on Hot Topics in Networks , Atlanta, GA, USA, October, 2007
Low-Resource Routing Attacks Against Tor
Kevin Bauer, Damon McCoy, Dirk Grunwald, Tadayoshi Kohno, Douglas Sicker
Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2007) , Alexandria, VA, USA, October, 2007
[ Slashdot FAQ Technical Report ]
A Mechanism for Detecting and Responding to Misbehaving Nodes in Wireless Networks
Damon McCoy, Douglas Sicker, Dirk Grunwald
SDR Workshop, IEEE SECON , 2007

2006
Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting
Jason Franklin, Damon McCoy, Parisa Tabriz, Vicentiu Neagoe, Jamie Van Randwyk, Douglas Sicker
Proceedings of the 15th USENIX Security Symposium , Vancouver, BC, Canada, August, 2006
[Slashdot Sandia Labs CNBC (WMV Video)]