Damon McCoy

Orcid: 0000-0001-7386-7260

Affiliations:
  • New York University, NY, USA


According to our database1, Damon McCoy authored at least 112 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Global-Liar: Factuality of LLMs over Time and Geographic Regions.
CoRR, 2024

2023
No Privacy Among Spies: Assessing the Functionality and Insecurity of Consumer Android Spyware Apps.
Proc. Priv. Enhancing Technol., January, 2023

Understanding the (In)Effectiveness of Content Moderation: A Case Study of Facebook in the Context of the U.S. Capitol Riot.
CoRR, 2023

Propaganda Política Pagada: Exploring U.S. Political Facebook Ads en Español.
Proceedings of the ACM Web Conference 2023, 2023

2022
"It Feels Like Whack-a-mole": User Experiences of Data Removal from People Search Websites.
Proc. Priv. Enhancing Technol., 2022

Ethics and Efficacy of Unsolicited Anti-Trafficking SMS Outreach.
Proc. ACM Hum. Comput. Interact., 2022

Conspiracy Brokers: Understanding the Monetization of YouTube Conspiracy Theories.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022

An Audit of Facebook's Political Ad Policy Enforcement.
Proceedings of the 31st USENIX Security Symposium, 2022

An Analysis of Terms of Service and Official Policies with Respect to Sex Work.
Proceedings of the IEEE International Symposium on Technology and Society, 2022

Libel Inc: An Analysis of the Libel Site Ecosystem.
Proceedings of the IEEE European Symposium on Security and Privacy, 2022

Money Over Morals: A Business Analysis of Conti Ransomware.
Proceedings of the APWG Symposium on Electronic Crime Research, 2022

Cart-ology: Intercepting Targeted Advertising via Ad Network Identity Entanglement.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
"I'm a Professor, which isn't usually a dangerous job": Internet-facilitated Harassment and Its Impact on Researchers.
Proc. ACM Hum. Comput. Interact., 2021

Dark Web Marketplaces and COVID-19: before the vaccine.
EPJ Data Sci., 2021

Dark Web Marketplaces and COVID-19: The vaccines.
CoRR, 2021

Swiped: Analyzing Ground-truth Data of a Marketplace for Stolen Debit and Credit Cards.
Proceedings of the 30th USENIX Security Symposium, 2021

SoK: Hate, Harassment, and the Changing Landscape of Online Abuse.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Understanding engagement with U.S. (mis)information news sources on Facebook.
Proceedings of the IMC '21: ACM Internet Measurement Conference, 2021

A large-scale characterization of online incitements to harassment across platforms.
Proceedings of the IMC '21: ACM Internet Measurement Conference, 2021

2020
"So-called privacy breeds evil": Narrative Justifications for Intimate Partner Surveillance in Online Forums.
Proc. ACM Hum. Comput. Interact., 2020

The COVID-19 online shadow economy.
CoRR, 2020

Empirical Analysis of Indirect Internal Conversions in Cryptocurrency Exchanges.
CoRR, 2020

The Pod People: Understanding Manipulation of Social Media Popularity via Reciprocity Abuse.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

Dark Matter: Uncovering the DarkComet RAT Ecosystem.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums.
Proceedings of the 29th USENIX Security Symposium, 2020

The Many Kinds of Creepware Used for Interpersonal Attacks.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

A Security Analysis of the Facebook Ad Library.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Understanding Incentivized Mobile App Installs on Google Play Store.
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020

SMAT: The Social Media Analysis Toolkit.
Proceedings of the Workshop Proceedings of the 14th International AAAI Conference on Web and Social Media, 2020

2019
An Analysis of United States Online Political Advertising Transparency.
CoRR, 2019

Evaluating Login Challenges as aDefense Against Account Takeover.
Proceedings of the World Wide Web Conference, 2019

Platforms in Everything: Analyzing Ground-Truth Data on the Anatomy and Economics of Bullet-Proof Hosting.
Proceedings of the 28th USENIX Security Symposium, 2019

Reading the Tea leaves: A Comparative Analysis of Threat Intelligence.
Proceedings of the 28th USENIX Security Symposium, 2019

Clinical Computer Security for Victims of Intimate Partner Violence.
Proceedings of the 28th USENIX Security Symposium, 2019

Iniquitous Cord-Cutting: An Analysis of Infringing IPTV Services.
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019

Mapping the Underground: Supervised Discovery of Cybercrime Supply Chains.
Proceedings of the 2019 APWG Symposium on Electronic Crime Research, 2019

2018
Editors' Introduction.
Proc. Priv. Enhancing Technol., 2018

Towards Automatic Discovery of Cybercrime Supply Chains.
CoRR, 2018

Under the Underground: Predicting Private Interactions in Underground Forums.
CoRR, 2018

Schrödinger's RAT: Profiling the Stakeholders in the Remote Access Trojan Ecosystem.
Proceedings of the 27th USENIX Security Symposium, 2018

Tracking Ransomware End-to-end.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

The Spyware Used in Intimate Partner Violence.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Bullet-proof payment processors.
Proceedings of the 2018 APWG Symposium on Electronic Crime Research, 2018

Peeling the Onion's User Experience Layer: Examining Naturalistic Use of the Tor Browser.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Editors' Introduction.
Proc. Priv. Enhancing Technol., 2017

Tools for Automated Analysis of Cybercriminal Markets.
Proceedings of the 26th International Conference on World Wide Web, 2017

Measuring the Effectiveness of Embedded Phishing Exercises.
Proceedings of the 10th USENIX Workshop on Cyber Security Experimentation and Test, 2017

To Catch a Ratter: Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Under the Shadow of Sunshine: Understanding and Detecting Bulletproof Hosting on Legitimate Service Provider Networks.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Linking Amplification DDoS Attacks to Booter Services.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

Backpage and Bitcoin: Uncovering Human Traffickers.
Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Halifax, NS, Canada, August 13, 2017

Fifteen minutes of unwanted fame: detecting and characterizing doxing.
Proceedings of the 2017 Internet Measurement Conference, 2017

Identifying Products in Online Cybercrime Marketplaces: A Dataset for Fine-grained Domain Adaptation.
Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing, 2017

2016
Characterizing Long-tail SEO Spam on Cloud Web Hosting Services.
Proceedings of the 25th International Conference on World Wide Web, 2016

Stress Testing the Booters: Understanding and Undermining the Business of DDoS Services.
Proceedings of the 25th International Conference on World Wide Web, 2016

A Security Analysis of an In-Vehicle Infotainment and App Platform.
Proceedings of the 10th USENIX Workshop on Offensive Technologies, 2016


You've Got Vulnerability: Exploring Effective Vulnerability Notifications.
Proceedings of the 25th USENIX Security Symposium, 2016

Do You See What I See? Differential Treatment of Anonymous Users.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Understanding Craigslist Rental Scams.
Proceedings of the Financial Cryptography and Data Security, 2016

Stressing Out: Bitcoin "Stress Testing".
Proceedings of the Financial Cryptography and Data Security, 2016

Profiling underground merchants based on network behavior.
Proceedings of the 2016 APWG Symposium on Electronic Crime Research, 2016

Case Study: Rental Scams.
Proceedings of the Understanding Social Engineering Based Scams, 2016

Case Study: Sales Scams.
Proceedings of the Understanding Social Engineering Based Scams, 2016

Identifying Scams and Trends.
Proceedings of the Understanding Social Engineering Based Scams, 2016

2015
Fuzzing E-mail Filters with Generative Grammars and N-Gram Analysis.
Proceedings of the 9th USENIX Workshop on Offensive Technologies, 2015

Framing Dependencies Introduced by Underground Commoditization.
Proceedings of the 14th Annual Workshop on the Economics of Information Security, 2015

Ad Injection at Scale: Assessing Deceptive Advertisement Modifications.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Dynamic phishing content using generative grammars.
Proceedings of the Eighth IEEE International Conference on Software Testing, 2015

"I Saw Images I Didn't Even Know I Had": Understanding User Perceptions of Cloud Storage Privacy.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015

2014
Constructing and Analyzing Criminal Networks.
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014

Doppelgänger Finder: Taking Stylometry to the Underground.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

Scambaiter: Understanding Targeted Nigerian Scams on Craigslist.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Botcoin: Monetizing Stolen Cycles.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Search + Seizure: The Effectiveness of Interventions on SEO Campaigns.
Proceedings of the 2014 Internet Measurement Conference, 2014

The check is in the mail: Monetization of Craigslist buyer scams.
Proceedings of the 2014 APWG Symposium on Electronic Crime Research, 2014

Dialing Back Abuse on Phone Verified Accounts.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Characterizing Large-Scale Click Fraud in ZeroAccess.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
A Fistful of Bitcoins: Characterizing Payments Among Men with No Names.
login Usenix Mag., 2013

Rent to Pwn: Analyzing Commodity Booter DDoS Services.
login Usenix Mag., 2013

Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

OCTANE (Open Car Testbed and Network Experiments): Bringing Cyber-Physical Security Research to Researchers and Students.
Proceedings of the 6th Workshop on Cyber Security Experimentation and Test, 2013

Understanding the Emerging Threat of DDoS-as-a-Service.
Proceedings of the 6th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2013

There Are No Free iPads: An Analysis of Survey Scams as a Business.
Proceedings of the 6th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2013

Folex: An analysis of an herbal and counterfeit luxury goods affiliate program.
Proceedings of the 2013 APWG eCrime Researchers Summit, 2013

Honor among thieves: A common's analysis of cybercrime economies.
Proceedings of the 2013 APWG eCrime Researchers Summit, 2013

2012
PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

Priceless: the role of payments in abuse-advertised goods.
Proceedings of the ACM Conference on Computer and Communications Security, 2012


2011
Dirty Jobs: The Role of Freelance Labor in Web Service Abuse.
Proceedings of the 20th USENIX Security Symposium, 2011

Show Me the Money: Characterizing Spam-advertised Revenue.
Proceedings of the 20th USENIX Security Symposium, 2011

No Plan Survives Contact: Experience with Cybercrime Measurement.
Proceedings of the 4th Workshop on Cyber Security Experimentation and Test, 2011

Comprehensive Experimental Analyses of Automotive Attack Surfaces.
Proceedings of the 20th USENIX Security Symposium, 2011

Click Trajectories: End-to-End Analysis of the Spam Value Chain.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

DefenestraTor: Throwing Out Windows in Tor.
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011

An analysis of underground forums.
Proceedings of the 11th ACM SIGCOMM Internet Measurement Conference, 2011

Proximax: Measurement-Driven Proxy Dissemination (Short Paper).
Proceedings of the Financial Cryptography and Data Security, 2011

2010
Wifi-Reports: Improving Wireless Network Selection with Collaboration.
IEEE Trans. Mob. Comput., 2010

Re: CAPTCHAs-Understanding CAPTCHA-Solving Services in an Economic Context.
Proceedings of the 19th USENIX Security Symposium, 2010

Experimental Security Analysis of a Modern Automobile.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

Practical Defenses for Evil Twin Attacks in 802.11.
Proceedings of the Global Communications Conference, 2010

2009
BitStalker: Accurately and efficiently monitoring bittorrent traffic.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009

Performing traffic analysis on a wireless identifier-free link layer.
Proceedings of the Richard Tapia Celebration of Diversity in Computing Conference 2009: Intellect, 2009

Physical Layer Attacks on Unlinkability in Wireless LANs.
Proceedings of the Privacy Enhancing Technologies, 9th International Symposium, 2009

The Directional Attack on Wireless Localization -or- How to Spoof Your Location with a Tin Can.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
BitBlender: Light-Weight Anonymity for BitTorrent.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

Shining Light in Dark Places: Understanding the Tor Network.
Proceedings of the Privacy Enhancing Technologies, 2008

Improving wireless privacy with an identifier-free link layer protocol.
Proceedings of the 6th International Conference on Mobile Systems, 2008

Mitigating Evil Twin Attacks in 802.11.
Proceedings of the 2008 IEEE International Performance, 2008

2007
Low-resource routing attacks against tor.
Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, 2007

A Mechanism for Detecting and Responding to Misbehaving Nodes in Wireless Networks.
Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, 2007

2006
Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting.
Proceedings of the 15th USENIX Security Symposium, Vancouver, BC, Canada, July 31, 2006


  Loading...