Damon McCoy
Damon McCoy
Professor of Computer Science and Engineering, New York University
Подтвержден адрес электронной почты в домене nyu.edu - Главная страница
Experimental security analysis of a modern automobile
K Koscher, A Czeskis, F Roesner, S Patel, T Kohno, S Checkoway, ...
IEEE Symposium on Security and Privacy (SP), 2010
Comprehensive experimental analyses of automotive attack surfaces
S Checkoway, D McCoy, B Kantor, D Anderson, H Shacham, S Savage, ...
20th USENIX security symposium (USENIX Security 11), 2011
A fistful of bitcoins: characterizing payments among men with no names
S Meiklejohn, M Pomarole, G Jordan, K Levchenko, D McCoy, ...
Proceedings of the 2013 conference on Internet measurement conference, 127-140, 2013
{Trafficking} Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse
K Thomas, D McCoy, C Grier, A Kolcz, V Paxson
22nd USENIX Security Symposium (USENIX Security 13), 195-210, 2013
Shining light in dark places: Understanding the Tor network
D McCoy, K Bauer, D Grunwald, T Kohno, D Sicker
Privacy Enhancing Technologies: 8th International Symposium, PETS 2008 …, 2008
Low-resource routing attacks against Tor
K Bauer, D McCoy, D Grunwald, T Kohno, D Sicker
Proceedings of the 2007 ACM workshop on Privacy in electronic society, 11-20, 2007
An analysis of underground forums
M Motoyama, D McCoy, K Levchenko, S Savage, GM Voelker
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement …, 2011
Click trajectories: End-to-end analysis of the spam value chain
K Levchenko, A Pitsillidis, N Chachra, B Enright, M Félegyházi, C Grier, ...
2011 ieee symposium on security and privacy, 431-446, 2011
Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting.
J Franklin, D McCoy, P Tabriz, V Neagoe, JV Randwyk, D Sicker
USENIX Security Symposium 3 (2006), 16-89, 2006
Re:{CAPTCHAs—Understanding}{CAPTCHA-Solving} Services in an Economic Context
M Motoyama, K Levchenko, C Kanich, D McCoy, GM Voelker, S Savage
19th USENIX Security Symposium (USENIX Security 10), 2010
Manufacturing compromise: the emergence of exploit-as-a-service
C Grier, L Ballard, J Caballero, N Chachra, CJ Dietrich, K Levchenko, ...
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
Tracking ransomware end-to-end
DY Huang, MM Aliapoulios, VG Li, L Invernizzi, E Bursztein, K McRoberts, ...
2018 IEEE Symposium on Security and Privacy (SP), 618-631, 2018
The Spyware Used in Intimate Partner Violence
R Chatterjee, T Ristenpart, P Doerfler, H Orgad, S Havron, J Palmer, ...
The Spyware Used in Intimate Partner Violence, 0, 2018
Improving wireless privacy with an identifier-free link layer protocol
B Greenstein, D McCoy, J Pang, T Kohno, S Seshan, D Wetherall
Proceedings of the 6th international conference on Mobile systems …, 2008
Pharmaleaks: Understanding the business of online pharmaceutical affiliate programs
D McCoy, A Pitsillidis, G Jordan, N Weaver, C Kreibich, B Krebs, ...
Proceedings of USENIX Security, 2012
Doppelgänger finder: Taking stylometry to the underground
S Afroz, AC Islam, A Stolerman, R Greenstadt, D McCoy
2014 IEEE Symposium on Security and Privacy, 212-226, 2014
Show me the money: Characterizing spam-advertised revenue
C Kanich, N Weaver, D McCoy, T Halvorson, C Kreibich, K Levchenko, ...
20th USENIX Security Symposium (USENIX Security 11), 2011
You've got vulnerability: Exploring effective vulnerability notifications
F Li, Z Durumeric, J Czyz, M Karami, M Bailey, D McCoy, S Savage, ...
25th USENIX Security Symposium (USENIX Security 16), 1033-1050, 2016
Ad injection at scale: Assessing deceptive advertisement modifications
K Thomas, E Bursztein, C Grier, G Ho, N Jagpal, A Kapravelos, D McCoy, ...
2015 IEEE Symposium on Security and Privacy, 151-167, 2015
Framing dependencies introduced by underground commoditization
K Huang, DWEBC GrierD, TJ Holt, C Kruegel, D McCoy, S Savage, ...
Workshop on the Economics of Information Security, 2015
В данный момент система не может выполнить эту операцию. Повторите попытку позднее.
Статьи 1–20