Obserwuj
Damon McCoy
Damon McCoy
Associate Professor of Computer Science and Engineering, New York University
Zweryfikowany adres z nyu.edu - Strona główna
Tytuł
Cytowane przez
Cytowane przez
Rok
Experimental security analysis of a modern automobile
K Koscher, A Czeskis, F Roesner, S Patel, T Kohno, S Checkoway, ...
IEEE Symposium on Security and Privacy (SP), 2010
21492010
Comprehensive experimental analyses of automotive attack surfaces
S Checkoway, D McCoy, B Kantor, D Anderson, H Shacham, S Savage, ...
20th USENIX security symposium (USENIX Security 11), 2011
19012011
A fistful of bitcoins: characterizing payments among men with no names
S Meiklejohn, M Pomarole, G Jordan, K Levchenko, D McCoy, ...
Proceedings of the 2013 conference on Internet measurement conference, 127-140, 2013
15102013
Low-resource routing attacks against Tor
K Bauer, D McCoy, D Grunwald, T Kohno, D Sicker
Proceedings of the 2007 ACM workshop on Privacy in electronic society, 11-20, 2007
4612007
Shining light in dark places: Understanding the Tor network
D McCoy, K Bauer, D Grunwald, T Kohno, D Sicker
International symposium on privacy enhancing technologies symposium, 63-76, 2008
4442008
An analysis of underground forums
M Motoyama, D McCoy, K Levchenko, S Savage, GM Voelker
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement …, 2011
3572011
Click trajectories: End-to-end analysis of the spam value chain
K Levchenko, A Pitsillidis, N Chachra, B Enright, M Félegyházi, C Grier, ...
2011 ieee symposium on security and privacy, 431-446, 2011
3512011
{Trafficking} Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse
K Thomas, D McCoy, C Grier, A Kolcz, V Paxson
22nd USENIX Security Symposium (USENIX Security 13), 195-210, 2013
3362013
Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting.
J Franklin, D McCoy, P Tabriz, V Neagoe, JV Randwyk, D Sicker
USENIX Security Symposium 3 (2006), 16-89, 2006
3332006
Manufacturing compromise: the emergence of exploit-as-a-service
C Grier, L Ballard, J Caballero, N Chachra, CJ Dietrich, K Levchenko, ...
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
2842012
Re:{CAPTCHAs—Understanding}{CAPTCHA-Solving} Services in an Economic Context
M Motoyama, K Levchenko, C Kanich, D McCoy, GM Voelker, S Savage
19th USENIX Security Symposium (USENIX Security 10), 2010
2782010
Improving wireless privacy with an identifier-free link layer protocol
B Greenstein, D McCoy, J Pang, T Kohno, S Seshan, D Wetherall
Proceedings of the 6th international conference on Mobile systems …, 2008
1862008
Tracking ransomware end-to-end
DY Huang, MM Aliapoulios, VG Li, L Invernizzi, E Bursztein, K McRoberts, ...
2018 IEEE Symposium on Security and Privacy (SP), 618-631, 2018
1742018
Pharmaleaks: Understanding the business of online pharmaceutical affiliate programs
D McCoy, A Pitsillidis, G Jordan, N Weaver, C Kreibich, B Krebs, ...
Proceedings of USENIX Security, 2012
1682012
Show me the money: Characterizing spam-advertised revenue
C Kanich, N Weaver, D McCoy, T Halvorson, C Kreibich, K Levchenko, ...
20th USENIX Security Symposium (USENIX Security 11), 2011
1622011
Doppelgänger finder: Taking stylometry to the underground
S Afroz, AC Islam, A Stolerman, R Greenstadt, D McCoy
2014 IEEE Symposium on Security and Privacy, 212-226, 2014
1462014
Ad injection at scale: Assessing deceptive advertisement modifications
K Thomas, E Bursztein, C Grier, G Ho, N Jagpal, A Kapravelos, D McCoy, ...
2015 IEEE Symposium on Security and Privacy, 151-167, 2015
1362015
Framing dependencies introduced by underground commoditization
K Thomas, D Huang, D Wang, E Bursztein, C Grier, TJ Holt, C Kruegel, ...
1342015
You've got vulnerability: Exploring effective vulnerability notifications
F Li, Z Durumeric, J Czyz, M Karami, M Bailey, D McCoy, S Savage, ...
25th USENIX Security Symposium (USENIX Security 16), 1033-1050, 2016
1262016
Dirty jobs: The role of freelance labor in web service abuse
M Motoyama, D McCoy, K Levchenko, S Savage, GM Voelker
20th USENIX Security Symposium (USENIX Security 11), 2011
1262011
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20