Damon McCoy
Damon McCoy
Associate Professor of Computer Science and Engineering, New York University
Email verificata su nyu.edu - Home page
TitoloCitata daAnno
Experimental security analysis of a modern automobile
K Koscher, A Czeskis, F Roesner, S Patel, T Kohno, S Checkoway, ...
2010 IEEE Symposium on Security and Privacy, 447-462, 2010
13912010
Comprehensive experimental analyses of automotive attack surfaces.
S Checkoway, D McCoy, B Kantor, D Anderson, H Shacham, S Savage, ...
USENIX Security Symposium 4, 447-462, 2011
11772011
A fistful of bitcoins: characterizing payments among men with no names
S Meiklejohn, M Pomarole, G Jordan, K Levchenko, D McCoy, ...
Proceedings of the 2013 conference on Internet measurement conference, 127-140, 2013
7652013
Low-resource routing attacks against tor
K Bauer, D McCoy, D Grunwald, T Kohno, D Sicker
Proceedings of the 2007 ACM workshop on Privacy in electronic society, 11-20, 2007
3762007
Shining light in dark places: Understanding the Tor network
D McCoy, K Bauer, D Grunwald, T Kohno, D Sicker
International symposium on privacy enhancing technologies symposium, 63-76, 2008
3202008
Click trajectories: End-to-end analysis of the spam value chain
K Levchenko, A Pitsillidis, N Chachra, B Enright, M Félegyházi, C Grier, ...
2011 ieee symposium on security and privacy, 431-446, 2011
2862011
Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting.
J Franklin, D McCoy, P Tabriz, V Neagoe, JV Randwyk, D Sicker
USENIX Security Symposium 3, 16-89, 2006
272*2006
An analysis of underground forums
M Motoyama, D McCoy, K Levchenko, S Savage, GM Voelker
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement …, 2011
2482011
Manufacturing compromise: the emergence of exploit-as-a-service
C Grier, L Ballard, J Caballero, N Chachra, CJ Dietrich, K Levchenko, ...
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
2352012
Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse
K Thomas, D McCoy, C Grier, A Kolcz, V Paxson
Presented as part of the 22nd {USENIX} Security Symposium ({USENIX} Security …, 2013
2302013
Re: CAPTCHAs-Understanding CAPTCHA-Solving Services in an Economic Context.
M Motoyama, K Levchenko, C Kanich, D McCoy, GM Voelker, S Savage
USENIX Security Symposium 10, 3, 2010
2232010
Improving wireless privacy with an identifier-free link layer protocol
B Greenstein, D McCoy, J Pang, T Kohno, S Seshan, D Wetherall
Proceedings of the 6th international conference on Mobile systems …, 2008
1602008
Show Me the Money: Characterizing Spam-advertised Revenue.
C Kanich, N Weaver, D McCoy, T Halvorson, C Kreibich, K Levchenko, ...
USENIX Security Symposium, 15-15, 2011
1412011
Pharmaleaks: Understanding the business of online pharmaceutical affiliate programs
D McCoy, A Pitsillidis, G Jordan, N Weaver, C Kreibich, B Krebs, ...
Proceedings of USENIX Security, 2012
1302012
Dirty jobs: The role of freelance labor in web service abuse
M Motoyama, D McCoy, K Levchenko, S Savage, GM Voelker
Proceedings of the 20th USENIX conference on Security, 14-14, 2011
1062011
Wifi-reports: Improving wireless network selection with collaboration
J Pang, B Greenstein, M Kaminsky, D McCoy, S Seshan
IEEE Transactions on Mobile Computing 9 (12), 1713-1731, 2010
1022010
Ad injection at scale: Assessing deceptive advertisement modifications
K Thomas, E Bursztein, C Grier, G Ho, N Jagpal, A Kapravelos, D McCoy, ...
2015 IEEE Symposium on Security and Privacy, 151-167, 2015
872015
Framing dependencies introduced by underground commoditization
K Thomas, D Huang, D Wang, E Bursztein, C Grier, TJ Holt, C Kruegel, ...
822015
Doppelgänger finder: Taking stylometry to the underground
S Afroz, AC Islam, A Stolerman, R Greenstadt, D McCoy
2014 IEEE Symposium on Security and Privacy, 212-226, 2014
822014
DefenestraTor: Throwing out windows in Tor
M AlSabah, K Bauer, I Goldberg, D Grunwald, D McCoy, S Savage, ...
International Symposium on Privacy Enhancing Technologies Symposium, 134-154, 2011
812011
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20