BibTeX records: Damon McCoy

download as .bib file

@article{DBLP:journals/corr/abs-2401-17839,
  author       = {Shujaat Shujaat Mirza and
                  Bruno Coelho and
                  Yuyuan Cui and
                  Christina P{\"{o}}pper and
                  Damon McCoy},
  title        = {Global-Liar: Factuality of LLMs over Time and Geographic Regions},
  journal      = {CoRR},
  volume       = {abs/2401.17839},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2401.17839},
  doi          = {10.48550/ARXIV.2401.17839},
  eprinttype    = {arXiv},
  eprint       = {2401.17839},
  timestamp    = {Wed, 07 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2401-17839.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/LiuRHHSVM23,
  author       = {Enze Liu and
                  Sumanth Rao and
                  Sam Havron and
                  Grant Ho and
                  Stefan Savage and
                  Geoffrey M. Voelker and
                  Damon McCoy},
  title        = {No Privacy Among Spies: Assessing the Functionality and Insecurity
                  of Consumer Android Spyware Apps},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2023},
  number       = {1},
  pages        = {207--224},
  year         = {2023},
  url          = {https://doi.org/10.56553/popets-2023-0013},
  doi          = {10.56553/POPETS-2023-0013},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/LiuRHHSVM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/CoelhoLEGM23,
  author       = {Bruno Coelho and
                  Tobias Lauinger and
                  Laura Edelson and
                  Ian Goldstein and
                  Damon McCoy},
  editor       = {Ying Ding and
                  Jie Tang and
                  Juan F. Sequeda and
                  Lora Aroyo and
                  Carlos Castillo and
                  Geert{-}Jan Houben},
  title        = {Propaganda Pol{\'{\i}}tica Pagada: Exploring {U.S.} Political
                  Facebook Ads en Espa{\~{n}}ol},
  booktitle    = {Proceedings of the {ACM} Web Conference 2023, {WWW} 2023, Austin,
                  TX, USA, 30 April 2023 - 4 May 2023},
  pages        = {2742--2753},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3543507.3583425},
  doi          = {10.1145/3543507.3583425},
  timestamp    = {Mon, 28 Aug 2023 21:17:10 +0200},
  biburl       = {https://dblp.org/rec/conf/www/CoelhoLEGM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2301-02737,
  author       = {Ian Goldstein and
                  Laura Edelson and
                  Damon McCoy and
                  Tobias Lauinger},
  title        = {Understanding the (In)Effectiveness of Content Moderation: {A} Case
                  Study of Facebook in the Context of the {U.S.} Capitol Riot},
  journal      = {CoRR},
  volume       = {abs/2301.02737},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2301.02737},
  doi          = {10.48550/ARXIV.2301.02737},
  eprinttype    = {arXiv},
  eprint       = {2301.02737},
  timestamp    = {Tue, 10 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2301-02737.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2304-11681,
  author       = {Ian W. Gray and
                  Jack Cable and
                  Benjamin Brown and
                  Vlad Cuiujuclu and
                  Damon McCoy},
  title        = {Money Over Morals: {A} Business Analysis of Conti Ransomware},
  journal      = {CoRR},
  volume       = {abs/2304.11681},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2304.11681},
  doi          = {10.48550/ARXIV.2304.11681},
  eprinttype    = {arXiv},
  eprint       = {2304.11681},
  timestamp    = {Tue, 02 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2304-11681.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pacmhci/BhaleraoMBHMR22,
  author       = {Rasika Bhalerao and
                  Nora McDonald and
                  Hanna Barakat and
                  Vaughn Hamilton and
                  Damon McCoy and
                  Elissa M. Redmiles},
  title        = {Ethics and Efficacy of Unsolicited Anti-Trafficking {SMS} Outreach},
  journal      = {Proc. {ACM} Hum. Comput. Interact.},
  volume       = {6},
  number       = {{CSCW2}},
  pages        = {1--39},
  year         = {2022},
  url          = {https://doi.org/10.1145/3555083},
  doi          = {10.1145/3555083},
  timestamp    = {Fri, 03 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pacmhci/BhaleraoMBHMR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/TakeGFMG22,
  author       = {Kejsi Take and
                  Kevin Gallagher and
                  Andrea Forte and
                  Damon McCoy and
                  Rachel Greenstadt},
  title        = {"It Feels Like Whack-a-mole": User Experiences of Data Removal
                  from People Search Websites},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2022},
  number       = {3},
  pages        = {159--178},
  year         = {2022},
  url          = {https://doi.org/10.56553/popets-2022-0067},
  doi          = {10.56553/POPETS-2022-0067},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/TakeGFMG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/OhKMP22,
  author       = {ChangSeok Oh and
                  Chris Kanich and
                  Damon McCoy and
                  Paul Pearce},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {Cart-ology: Intercepting Targeted Advertising via Ad Network Identity
                  Entanglement},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {2401--2414},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3560641},
  doi          = {10.1145/3548606.3560641},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/OhKMP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/GrayCBCM22,
  author       = {Ian W. Gray and
                  Jack Cable and
                  Benjamin Brown and
                  Vlad Cuiujuclu and
                  Damon McCoy},
  title        = {Money Over Morals: {A} Business Analysis of Conti Ransomware},
  booktitle    = {{APWG} Symposium on Electronic Crime Research, eCrime 2022, Boston,
                  MA, USA, November 30 - December 2, 2022},
  pages        = {1--12},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/eCrime57793.2022.10142119},
  doi          = {10.1109/ECRIME57793.2022.10142119},
  timestamp    = {Tue, 20 Jun 2023 14:12:59 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/GrayCBCM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/BhaleraoM22,
  author       = {Rasika Bhalerao and
                  Damon McCoy},
  title        = {Libel Inc: An Analysis of the Libel Site Ecosystem},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2022 - Workshops, Genoa, Italy, June 6-10, 2022},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/EuroSPW55150.2022.00019},
  doi          = {10.1109/EUROSPW55150.2022.00019},
  timestamp    = {Mon, 04 Jul 2022 17:06:18 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/BhaleraoM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/istas/BhaleraoM22,
  author       = {Rasika Bhalerao and
                  Damon McCoy},
  title        = {An Analysis of Terms of Service and Official Policies with Respect
                  to Sex Work},
  booktitle    = {{IEEE} International Symposium on Technology and Society, {ISTAS}
                  2022, Hong Kong, November 10-12, 2022},
  pages        = {1--14},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ISTAS55053.2022.10227104},
  doi          = {10.1109/ISTAS55053.2022.10227104},
  timestamp    = {Mon, 11 Sep 2023 15:41:21 +0200},
  biburl       = {https://dblp.org/rec/conf/istas/BhaleraoM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/PochatEGJML22,
  author       = {Victor Le Pochat and
                  Laura Edelson and
                  Tom van Goethem and
                  Wouter Joosen and
                  Damon McCoy and
                  Tobias Lauinger},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {An Audit of Facebook's Political Ad Policy Enforcement},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {607--624},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/lepochat},
  timestamp    = {Tue, 18 Oct 2022 17:10:36 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/PochatEGJML22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/BallardGMSTZGLM22,
  author       = {Cameron Ballard and
                  Ian Goldstein and
                  Pulak Mehta and
                  Genesis Smothers and
                  Kejsi Take and
                  Victoria Zhong and
                  Rachel Greenstadt and
                  Tobias Lauinger and
                  Damon McCoy},
  editor       = {Fr{\'{e}}d{\'{e}}rique Laforest and
                  Rapha{\"{e}}l Troncy and
                  Elena Simperl and
                  Deepak Agarwal and
                  Aristides Gionis and
                  Ivan Herman and
                  Lionel M{\'{e}}dini},
  title        = {Conspiracy Brokers: Understanding the Monetization of YouTube Conspiracy
                  Theories},
  booktitle    = {{WWW} '22: The {ACM} Web Conference 2022, Virtual Event, Lyon, France,
                  April 25 - 29, 2022},
  pages        = {2707--2718},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3485447.3512142},
  doi          = {10.1145/3485447.3512142},
  timestamp    = {Thu, 23 Jun 2022 19:54:34 +0200},
  biburl       = {https://dblp.org/rec/conf/www/BallardGMSTZGLM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2202-09527,
  author       = {Rasika Bhalerao and
                  Nora McDonald and
                  Hanna Barakat and
                  Vaughn Hamilton and
                  Damon McCoy and
                  Elissa M. Redmiles},
  title        = {Ethics and Efficacy of Unsolicited Anti-Trafficking {SMS} Outreach},
  journal      = {CoRR},
  volume       = {abs/2202.09527},
  year         = {2022},
  url          = {https://arxiv.org/abs/2202.09527},
  eprinttype    = {arXiv},
  eprint       = {2202.09527},
  timestamp    = {Tue, 01 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2202-09527.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2205-15943,
  author       = {Cameron Ballard and
                  Ian Goldstein and
                  Pulak Mehta and
                  Genesis Smothers and
                  Kejsi Take and
                  Victoria Zhong and
                  Rachel Greenstadt and
                  Tobias Lauinger and
                  Damon McCoy},
  title        = {Conspiracy Brokers: Understanding the Monetization of YouTube Conspiracy
                  Theories},
  journal      = {CoRR},
  volume       = {abs/2205.15943},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2205.15943},
  doi          = {10.48550/ARXIV.2205.15943},
  eprinttype    = {arXiv},
  eprint       = {2205.15943},
  timestamp    = {Wed, 01 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2205-15943.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/epjds/BracciNAMGTGB21,
  author       = {Alberto Bracci and
                  Matthieu Nadini and
                  Maxwell Aliapoulios and
                  Damon McCoy and
                  Ian W. Gray and
                  Alexander Teytelboym and
                  Angela Gallo and
                  Andrea Baronchelli},
  title        = {Dark Web Marketplaces and {COVID-19:} before the vaccine},
  journal      = {{EPJ} Data Sci.},
  volume       = {10},
  number       = {1},
  pages        = {6},
  year         = {2021},
  url          = {https://doi.org/10.1140/epjds/s13688-021-00259-w},
  doi          = {10.1140/EPJDS/S13688-021-00259-W},
  timestamp    = {Tue, 02 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/epjds/BracciNAMGTGB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pacmhci/DoerflerFCSBM21,
  author       = {Periwinkle Doerfler and
                  Andrea Forte and
                  Emiliano De Cristofaro and
                  Gianluca Stringhini and
                  Jeremy Blackburn and
                  Damon McCoy},
  title        = {"I'm a Professor, which isn't usually a dangerous job":
                  Internet-facilitated Harassment and Its Impact on Researchers},
  journal      = {Proc. {ACM} Hum. Comput. Interact.},
  volume       = {5},
  number       = {{CSCW2}},
  pages        = {341:1--341:32},
  year         = {2021},
  url          = {https://doi.org/10.1145/3476082},
  doi          = {10.1145/3476082},
  timestamp    = {Wed, 09 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pacmhci/DoerflerFCSBM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/EdelsonNGGML21,
  author       = {Laura Edelson and
                  Minh{-}Kha Nguyen and
                  Ian Goldstein and
                  Oana Goga and
                  Damon McCoy and
                  Tobias Lauinger},
  editor       = {Dave Levin and
                  Alan Mislove and
                  Johanna Amann and
                  Matthew Luckie},
  title        = {Understanding engagement with {U.S.} (mis)information news sources
                  on Facebook},
  booktitle    = {{IMC} '21: {ACM} Internet Measurement Conference, Virtual Event, USA,
                  November 2-4, 2021},
  pages        = {444--463},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3487552.3487859},
  doi          = {10.1145/3487552.3487859},
  timestamp    = {Thu, 04 Nov 2021 08:55:53 +0100},
  biburl       = {https://dblp.org/rec/conf/imc/EdelsonNGGML21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/AliapouliosTRBG21,
  author       = {Maxwell Aliapoulios and
                  Kejsi Take and
                  Prashanth Ramakrishna and
                  Daniel Borkan and
                  Beth Goldberg and
                  Jeffrey Sorensen and
                  Anna Turner and
                  Rachel Greenstadt and
                  Tobias Lauinger and
                  Damon McCoy},
  editor       = {Dave Levin and
                  Alan Mislove and
                  Johanna Amann and
                  Matthew Luckie},
  title        = {A large-scale characterization of online incitements to harassment
                  across platforms},
  booktitle    = {{IMC} '21: {ACM} Internet Measurement Conference, Virtual Event, USA,
                  November 2-4, 2021},
  pages        = {621--638},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3487552.3487852},
  doi          = {10.1145/3487552.3487852},
  timestamp    = {Thu, 04 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imc/AliapouliosTRBG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ThomasABBBCDDKK21,
  author       = {Kurt Thomas and
                  Devdatta Akhawe and
                  Michael D. Bailey and
                  Dan Boneh and
                  Elie Bursztein and
                  Sunny Consolvo and
                  Nicola Dell and
                  Zakir Durumeric and
                  Patrick Gage Kelley and
                  Deepak Kumar and
                  Damon McCoy and
                  Sarah Meiklejohn and
                  Thomas Ristenpart and
                  Gianluca Stringhini},
  title        = {SoK: Hate, Harassment, and the Changing Landscape of Online Abuse},
  booktitle    = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco,
                  CA, USA, 24-27 May 2021},
  pages        = {247--267},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SP40001.2021.00028},
  doi          = {10.1109/SP40001.2021.00028},
  timestamp    = {Thu, 26 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/ThomasABBBCDDKK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AliapouliosBBLM21,
  author       = {Maxwell Aliapoulios and
                  Cameron Ballard and
                  Rasika Bhalerao and
                  Tobias Lauinger and
                  Damon McCoy},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Swiped: Analyzing Ground-truth Data of a Marketplace for Stolen Debit
                  and Credit Cards},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {4151--4168},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/aliapoulios},
  timestamp    = {Mon, 20 Nov 2023 08:57:49 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/AliapouliosBBLM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2102-05470,
  author       = {Alberto Bracci and
                  Matthieu Nadini and
                  Maxwell Aliapoulios and
                  Damon McCoy and
                  Ian W. Gray and
                  Alexander Teytelboym and
                  Angela Gallo and
                  Andrea Baronchelli},
  title        = {Dark Web Marketplaces and {COVID-19:} The vaccines},
  journal      = {CoRR},
  volume       = {abs/2102.05470},
  year         = {2021},
  url          = {https://arxiv.org/abs/2102.05470},
  eprinttype    = {arXiv},
  eprint       = {2102.05470},
  timestamp    = {Tue, 02 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2102-05470.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2104-11145,
  author       = {Periwinkle Doerfler and
                  Andrea Forte and
                  Emiliano De Cristofaro and
                  Gianluca Stringhini and
                  Jeremy Blackburn and
                  Damon McCoy},
  title        = {"I'm a Professor, which isn't usually a dangerous job":
                  Internet-Facilitated Harassment and its Impact on Researchers},
  journal      = {CoRR},
  volume       = {abs/2104.11145},
  year         = {2021},
  url          = {https://arxiv.org/abs/2104.11145},
  eprinttype    = {arXiv},
  eprint       = {2104.11145},
  timestamp    = {Tue, 27 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2104-11145.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pacmhci/BelliniTMGMRD20,
  author       = {Rosanna Bellini and
                  Emily Tseng and
                  Nora McDonald and
                  Rachel Greenstadt and
                  Damon McCoy and
                  Thomas Ristenpart and
                  Nicola Dell},
  title        = {"So-called privacy breeds evil": Narrative Justifications
                  for Intimate Partner Surveillance in Online Forums},
  journal      = {Proc. {ACM} Hum. Comput. Interact.},
  volume       = {4},
  number       = {{CSCW3}},
  pages        = {1--27},
  year         = {2020},
  url          = {https://doi.org/10.1145/3432909},
  doi          = {10.1145/3432909},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pacmhci/BelliniTMGMRD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icwsm/BevenseeADBMB20,
  author       = {Emmi Bevensee and
                  Maxwell Aliapoulios and
                  Quinn Dougherty and
                  Jason Baumgartner and
                  Damon McCoy and
                  Jeremy Blackburn},
  editor       = {Stevie Chancellor and
                  Kiran Garimella and
                  Katrin Weller},
  title        = {{SMAT:} The Social Media Analysis Toolkit},
  booktitle    = {Workshop Proceedings of the 14th International {AAAI} Conference on
                  Web and Social Media, {ICWSM} 2020 Workshops, Atlanta, Georgia, {USA}
                  [virtual], June 8, 2020},
  year         = {2020},
  url          = {https://doi.org/10.36190/2020.18},
  doi          = {10.36190/2020.18},
  timestamp    = {Mon, 24 Oct 2022 16:56:08 +0200},
  biburl       = {https://dblp.org/rec/conf/icwsm/BevenseeADBMB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/FarooqiFLMSV20,
  author       = {Shehroze Farooqi and
                  {\'{A}}lvaro Feal and
                  Tobias Lauinger and
                  Damon McCoy and
                  Zubair Shafiq and
                  Narseo Vallina{-}Rodriguez},
  title        = {Understanding Incentivized Mobile App Installs on Google Play Store},
  booktitle    = {{IMC} '20: {ACM} Internet Measurement Conference, Virtual Event, USA,
                  October 27-29, 2020},
  pages        = {696--709},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3419394.3423662},
  doi          = {10.1145/3419394.3423662},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/imc/FarooqiFLMSV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/RoundyMDMNRT20,
  author       = {Kevin A. Roundy and
                  Paula Barmaimon Mendelberg and
                  Nicola Dell and
                  Damon McCoy and
                  Daniel Nissani and
                  Thomas Ristenpart and
                  Acar Tamersoy},
  title        = {The Many Kinds of Creepware Used for Interpersonal Attacks},
  booktitle    = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco,
                  CA, USA, May 18-21, 2020},
  pages        = {626--643},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SP40000.2020.00069},
  doi          = {10.1109/SP40000.2020.00069},
  timestamp    = {Thu, 21 Sep 2023 15:57:24 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/RoundyMDMNRT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/EdelsonLM20,
  author       = {Laura Edelson and
                  Tobias Lauinger and
                  Damon McCoy},
  title        = {A Security Analysis of the Facebook Ad Library},
  booktitle    = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco,
                  CA, USA, May 18-21, 2020},
  pages        = {661--678},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SP40000.2020.00084},
  doi          = {10.1109/SP40000.2020.00084},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/EdelsonLM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/TsengBMDGMDR20,
  author       = {Emily Tseng and
                  Rosanna Bellini and
                  Nora McDonald and
                  Matan Danos and
                  Rachel Greenstadt and
                  Damon McCoy and
                  Nicola Dell and
                  Thomas Ristenpart},
  editor       = {Srdjan Capkun and
                  Franziska Roesner},
  title        = {The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis
                  of Online Infidelity Forums},
  booktitle    = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14,
                  2020},
  pages        = {1893--1909},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/usenixsecurity20/presentation/tseng},
  timestamp    = {Fri, 29 Jan 2021 22:08:55 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/TsengBMDGMDR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/WeerasingheFSMG20,
  author       = {Janith Weerasinghe and
                  Bailey Flanigan and
                  Aviel J. Stein and
                  Damon McCoy and
                  Rachel Greenstadt},
  editor       = {Yennun Huang and
                  Irwin King and
                  Tie{-}Yan Liu and
                  Maarten van Steen},
  title        = {The Pod People: Understanding Manipulation of Social Media Popularity
                  via Reciprocity Abuse},
  booktitle    = {{WWW} '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020},
  pages        = {1874--1884},
  publisher    = {{ACM} / {IW3C2}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3366423.3380256},
  doi          = {10.1145/3366423.3380256},
  timestamp    = {Fri, 25 Dec 2020 01:14:58 +0100},
  biburl       = {https://dblp.org/rec/conf/www/WeerasingheFSMG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/FarinholtRML20,
  author       = {Brown Farinholt and
                  Mohammad Rezaeirad and
                  Damon McCoy and
                  Kirill Levchenko},
  editor       = {Yennun Huang and
                  Irwin King and
                  Tie{-}Yan Liu and
                  Maarten van Steen},
  title        = {Dark Matter: Uncovering the DarkComet {RAT} Ecosystem},
  booktitle    = {{WWW} '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020},
  pages        = {2109--2120},
  publisher    = {{ACM} / {IW3C2}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3366423.3380277},
  doi          = {10.1145/3366423.3380277},
  timestamp    = {Wed, 06 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/www/FarinholtRML20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2002-12274,
  author       = {Paz Grimberg and
                  Tobias Lauinger and
                  Damon McCoy},
  title        = {Empirical Analysis of Indirect Internal Conversions in Cryptocurrency
                  Exchanges},
  journal      = {CoRR},
  volume       = {abs/2002.12274},
  year         = {2020},
  url          = {https://arxiv.org/abs/2002.12274},
  eprinttype    = {arXiv},
  eprint       = {2002.12274},
  timestamp    = {Tue, 03 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2002-12274.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-14341,
  author       = {Emily Tseng and
                  Rosanna Bellini and
                  Nora McDonald and
                  Matan Danos and
                  Rachel Greenstadt and
                  Damon McCoy and
                  Nicola Dell and
                  Thomas Ristenpart},
  title        = {The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis
                  of Online Infidelity Forums},
  journal      = {CoRR},
  volume       = {abs/2005.14341},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.14341},
  eprinttype    = {arXiv},
  eprint       = {2005.14341},
  timestamp    = {Wed, 03 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-14341.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2008-01585,
  author       = {Alberto Bracci and
                  Matthieu Nadini and
                  Maxwell Aliapoulios and
                  Damon McCoy and
                  Ian W. Gray and
                  Alexander Teytelboym and
                  Angela Gallo and
                  Andrea Baronchelli},
  title        = {The {COVID-19} online shadow economy},
  journal      = {CoRR},
  volume       = {abs/2008.01585},
  year         = {2020},
  url          = {https://arxiv.org/abs/2008.01585},
  eprinttype    = {arXiv},
  eprint       = {2008.01585},
  timestamp    = {Tue, 02 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2008-01585.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-01497,
  author       = {Shehroze Farooqi and
                  {\'{A}}lvaro Feal and
                  Tobias Lauinger and
                  Damon McCoy and
                  Zubair Shafiq and
                  Narseo Vallina{-}Rodriguez},
  title        = {Understanding Incentivized Mobile App Installs on Google Play Store},
  journal      = {CoRR},
  volume       = {abs/2010.01497},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.01497},
  eprinttype    = {arXiv},
  eprint       = {2010.01497},
  timestamp    = {Mon, 12 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-01497.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/BhaleraoASAM19,
  author       = {Rasika Bhalerao and
                  Maxwell Aliapoulios and
                  Ilia Shumailov and
                  Sadia Afroz and
                  Damon McCoy},
  title        = {Mapping the Underground: Supervised Discovery of Cybercrime Supply
                  Chains},
  booktitle    = {2019 {APWG} Symposium on Electronic Crime Research, eCrime 2019, Pittsburgh,
                  PA, USA, November 13-15, 2019},
  pages        = {1--16},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/eCrime47957.2019.9037582},
  doi          = {10.1109/ECRIME47957.2019.9037582},
  timestamp    = {Wed, 28 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/BhaleraoASAM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/PandeyAM19,
  author       = {Prakhar Pandey and
                  Maxwell Aliapoulios and
                  Damon McCoy},
  title        = {Iniquitous Cord-Cutting: An Analysis of Infringing {IPTV} Services},
  booktitle    = {2019 {IEEE} European Symposium on Security and Privacy Workshops,
                  EuroS{\&}P Workshops 2019, Stockholm, Sweden, June 17-19, 2019},
  pages        = {423--432},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EuroSPW.2019.00054},
  doi          = {10.1109/EUROSPW.2019.00054},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/PandeyAM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/HavronF0MDR19,
  author       = {Sam Havron and
                  Diana Freed and
                  Rahul Chatterjee and
                  Damon McCoy and
                  Nicola Dell and
                  Thomas Ristenpart},
  editor       = {Nadia Heninger and
                  Patrick Traynor},
  title        = {Clinical Computer Security for Victims of Intimate Partner Violence},
  booktitle    = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara,
                  CA, USA, August 14-16, 2019},
  pages        = {105--122},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/usenixsecurity19/presentation/havron},
  timestamp    = {Mon, 01 Feb 2021 08:43:12 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/HavronF0MDR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LiDPMVS19,
  author       = {Vector Guo Li and
                  Matthew Dunn and
                  Paul Pearce and
                  Damon McCoy and
                  Geoffrey M. Voelker and
                  Stefan Savage},
  editor       = {Nadia Heninger and
                  Patrick Traynor},
  title        = {Reading the Tea leaves: {A} Comparative Analysis of Threat Intelligence},
  booktitle    = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara,
                  CA, USA, August 14-16, 2019},
  pages        = {851--867},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/usenixsecurity19/presentation/li},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/LiDPMVS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/NoroozianKVGAME19,
  author       = {Arman Noroozian and
                  Jan Koenders and
                  Eelco van Veldhuizen and
                  Carlos Hernandez Ga{\~{n}}{\'{a}}n and
                  Sumayah A. Alrwais and
                  Damon McCoy and
                  Michel van Eeten},
  editor       = {Nadia Heninger and
                  Patrick Traynor},
  title        = {Platforms in Everything: Analyzing Ground-Truth Data on the Anatomy
                  and Economics of Bullet-Proof Hosting},
  booktitle    = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara,
                  CA, USA, August 14-16, 2019},
  pages        = {1341--1356},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/usenixsecurity19/presentation/noroozian},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/NoroozianKVGAME19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/DoerflerTMRJMM19,
  author       = {Periwinkle Doerfler and
                  Kurt Thomas and
                  Maija Marincenko and
                  Juri Ranieri and
                  Yu Jiang and
                  Angelika Moscicki and
                  Damon McCoy},
  editor       = {Ling Liu and
                  Ryen W. White and
                  Amin Mantrach and
                  Fabrizio Silvestri and
                  Julian J. McAuley and
                  Ricardo Baeza{-}Yates and
                  Leila Zia},
  title        = {Evaluating Login Challenges as aDefense Against Account Takeover},
  booktitle    = {The World Wide Web Conference, {WWW} 2019, San Francisco, CA, USA,
                  May 13-17, 2019},
  pages        = {372--382},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3308558.3313481},
  doi          = {10.1145/3308558.3313481},
  timestamp    = {Sun, 22 Sep 2019 18:12:47 +0200},
  biburl       = {https://dblp.org/rec/conf/www/DoerflerTMRJMM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1902-04385,
  author       = {Laura Edelson and
                  Shikhar Sakhuja and
                  Ratan Dey and
                  Damon McCoy},
  title        = {An Analysis of United States Online Political Advertising Transparency},
  journal      = {CoRR},
  volume       = {abs/1902.04385},
  year         = {2019},
  url          = {http://arxiv.org/abs/1902.04385},
  eprinttype    = {arXiv},
  eprint       = {1902.04385},
  timestamp    = {Tue, 21 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1902-04385.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/GreenstadtMT18,
  author       = {Rachel Greenstadt and
                  Damon McCoy and
                  Carmela Troncoso},
  title        = {Editors' Introduction},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2018},
  number       = {1},
  pages        = {1--4},
  year         = {2018},
  url          = {https://doi.org/10.1515/popets-2018-0001},
  doi          = {10.1515/POPETS-2018-0001},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/GreenstadtMT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/GreenstadtMT18a,
  author       = {Rachel Greenstadt and
                  Damon McCoy and
                  Carmela Troncoso},
  title        = {Editors' Introduction},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2018},
  number       = {2},
  pages        = {1--3},
  year         = {2018},
  url          = {https://doi.org/10.1515/popets-2018-0009},
  doi          = {10.1515/POPETS-2018-0009},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/GreenstadtMT18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/GreenstadtMT18b,
  author       = {Rachel Greenstadt and
                  Damon McCoy and
                  Carmela Troncoso},
  title        = {Editors' Introduction},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2018},
  number       = {3},
  pages        = {1--4},
  year         = {2018},
  url          = {https://doi.org/10.1515/popets-2018-0017},
  doi          = {10.1515/POPETS-2018-0017},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/GreenstadtMT18b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/GreenstadtMT18c,
  author       = {Rachel Greenstadt and
                  Damon McCoy and
                  Carmela Troncoso},
  title        = {Editors' Introduction},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2018},
  number       = {4},
  pages        = {1--4},
  year         = {2018},
  url          = {https://doi.org/10.1515/popets-2018-0028},
  doi          = {10.1515/POPETS-2018-0028},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/GreenstadtMT18c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GallagherPDMM18,
  author       = {Kevin Gallagher and
                  Sameer Patil and
                  Brendan Dolan{-}Gavitt and
                  Damon McCoy and
                  Nasir D. Memon},
  editor       = {David Lie and
                  Mohammad Mannan and
                  Michael Backes and
                  XiaoFeng Wang},
  title        = {Peeling the Onion's User Experience Layer: Examining Naturalistic
                  Use of the Tor Browser},
  booktitle    = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2018, Toronto, ON, Canada, October
                  15-19, 2018},
  pages        = {1290--1305},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3243734.3243803},
  doi          = {10.1145/3243734.3243803},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GallagherPDMM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/TianGWM18,
  author       = {Hongwei Tian and
                  Stephen M. Gaffigan and
                  D. Sean West and
                  Damon McCoy},
  title        = {Bullet-proof payment processors},
  booktitle    = {2018 {APWG} Symposium on Electronic Crime Research, eCrime 2018, San
                  Diego, CA, USA, May 15-17, 2018},
  pages        = {1--11},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ECRIME.2018.8376208},
  doi          = {10.1109/ECRIME.2018.8376208},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/TianGWM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ChatterjeeDOHPF18,
  author       = {Rahul Chatterjee and
                  Periwinkle Doerfler and
                  Hadas Orgad and
                  Sam Havron and
                  Jackeline Palmer and
                  Diana Freed and
                  Karen Levy and
                  Nicola Dell and
                  Damon McCoy and
                  Thomas Ristenpart},
  title        = {The Spyware Used in Intimate Partner Violence},
  booktitle    = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings,
                  21-23 May 2018, San Francisco, California, {USA}},
  pages        = {441--458},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SP.2018.00061},
  doi          = {10.1109/SP.2018.00061},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ChatterjeeDOHPF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/HuangALIBMLLSM18,
  author       = {Danny Yuxing Huang and
                  Maxwell Matthaios Aliapoulios and
                  Vector Guo Li and
                  Luca Invernizzi and
                  Elie Bursztein and
                  Kylie McRoberts and
                  Jonathan Levin and
                  Kirill Levchenko and
                  Alex C. Snoeren and
                  Damon McCoy},
  title        = {Tracking Ransomware End-to-end},
  booktitle    = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings,
                  21-23 May 2018, San Francisco, California, {USA}},
  pages        = {618--631},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SP.2018.00047},
  doi          = {10.1109/SP.2018.00047},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/HuangALIBMLLSM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/RezaeiradFDPLM18,
  author       = {Mohammad Rezaeirad and
                  Brown Farinholt and
                  Hitesh Dharmdasani and
                  Paul Pearce and
                  Kirill Levchenko and
                  Damon McCoy},
  editor       = {William Enck and
                  Adrienne Porter Felt},
  title        = {Schr{\"{o}}dinger's {RAT:} Profiling the Stakeholders in the
                  Remote Access Trojan Ecosystem},
  booktitle    = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore,
                  MD, USA, August 15-17, 2018},
  pages        = {1043--1060},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/usenixsecurity18/presentation/rezaeirad},
  timestamp    = {Mon, 01 Feb 2021 08:43:20 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/RezaeiradFDPLM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1805-04494,
  author       = {Rebekah Overdorf and
                  Carmela Troncoso and
                  Rachel Greenstadt and
                  Damon McCoy},
  title        = {Under the Underground: Predicting Private Interactions in Underground
                  Forums},
  journal      = {CoRR},
  volume       = {abs/1805.04494},
  year         = {2018},
  url          = {http://arxiv.org/abs/1805.04494},
  eprinttype    = {arXiv},
  eprint       = {1805.04494},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1805-04494.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1812-00381,
  author       = {Rasika Bhalerao and
                  Maxwell Aliapoulios and
                  Ilia Shumailov and
                  Sadia Afroz and
                  Damon McCoy},
  title        = {Towards Automatic Discovery of Cybercrime Supply Chains},
  journal      = {CoRR},
  volume       = {abs/1812.00381},
  year         = {2018},
  url          = {http://arxiv.org/abs/1812.00381},
  eprinttype    = {arXiv},
  eprint       = {1812.00381},
  timestamp    = {Sun, 19 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1812-00381.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/DiazGM17,
  author       = {Claudia D{\'{\i}}az and
                  Rachel Greenstadt and
                  Damon McCoy},
  title        = {Editors' Introduction},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2017},
  number       = {1},
  pages        = {1--3},
  year         = {2017},
  url          = {https://doi.org/10.1515/popets-2017-0001},
  doi          = {10.1515/POPETS-2017-0001},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/DiazGM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/DiazGM17a,
  author       = {Claudia D{\'{\i}}az and
                  Rachel Greenstadt and
                  Damon McCoy},
  title        = {Editors' Introduction},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2017},
  number       = {2},
  pages        = {1--3},
  year         = {2017},
  url          = {https://doi.org/10.1515/popets-2017-0012},
  doi          = {10.1515/POPETS-2017-0012},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/DiazGM17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/DiazGM17b,
  author       = {Claudia D{\'{\i}}az and
                  Rachel Greenstadt and
                  Damon McCoy},
  title        = {Editors' Introduction},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2017},
  number       = {3},
  pages        = {1},
  year         = {2017},
  url          = {https://doi.org/10.1515/popets-2017-0024},
  doi          = {10.1515/POPETS-2017-0024},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/DiazGM17b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/DiazGM17c,
  author       = {Claudia D{\'{\i}}az and
                  Rachel Greenstadt and
                  Damon McCoy},
  title        = {Editors' Introduction},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2017},
  number       = {4},
  pages        = {1--4},
  year         = {2017},
  url          = {https://doi.org/10.1515/popets-2017-0036},
  doi          = {10.1515/POPETS-2017-0036},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/DiazGM17c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/emnlp/DurrettKBPAMLP17,
  author       = {Greg Durrett and
                  Jonathan K. Kummerfeld and
                  Taylor Berg{-}Kirkpatrick and
                  Rebecca S. Portnoff and
                  Sadia Afroz and
                  Damon McCoy and
                  Kirill Levchenko and
                  Vern Paxson},
  editor       = {Martha Palmer and
                  Rebecca Hwa and
                  Sebastian Riedel},
  title        = {Identifying Products in Online Cybercrime Marketplaces: {A} Dataset
                  for Fine-grained Domain Adaptation},
  booktitle    = {Proceedings of the 2017 Conference on Empirical Methods in Natural
                  Language Processing, {EMNLP} 2017, Copenhagen, Denmark, September
                  9-11, 2017},
  pages        = {2598--2607},
  publisher    = {Association for Computational Linguistics},
  year         = {2017},
  url          = {https://doi.org/10.18653/v1/d17-1275},
  doi          = {10.18653/V1/D17-1275},
  timestamp    = {Wed, 28 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/emnlp/DurrettKBPAMLP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/SnyderDKM17,
  author       = {Peter Snyder and
                  Periwinkle Doerfler and
                  Chris Kanich and
                  Damon McCoy},
  editor       = {Steve Uhlig and
                  Olaf Maennel},
  title        = {Fifteen minutes of unwanted fame: detecting and characterizing doxing},
  booktitle    = {Proceedings of the 2017 Internet Measurement Conference, {IMC} 2017,
                  London, United Kingdom, November 1-3, 2017},
  pages        = {432--444},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3131365.3131385},
  doi          = {10.1145/3131365.3131385},
  timestamp    = {Fri, 25 Oct 2019 09:51:18 +0200},
  biburl       = {https://dblp.org/rec/conf/imc/SnyderDKM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kdd/PortnoffHDAM17,
  author       = {Rebecca S. Portnoff and
                  Danny Yuxing Huang and
                  Periwinkle Doerfler and
                  Sadia Afroz and
                  Damon McCoy},
  title        = {Backpage and Bitcoin: Uncovering Human Traffickers},
  booktitle    = {Proceedings of the 23rd {ACM} {SIGKDD} International Conference on
                  Knowledge Discovery and Data Mining, Halifax, NS, Canada, August 13
                  - 17, 2017},
  pages        = {1595--1604},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3097983.3098082},
  doi          = {10.1145/3097983.3098082},
  timestamp    = {Wed, 28 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/kdd/PortnoffHDAM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/KruppKRM017,
  author       = {Johannes Krupp and
                  Mohammad Karami and
                  Christian Rossow and
                  Damon McCoy and
                  Michael Backes},
  editor       = {Marc Dacier and
                  Michael D. Bailey and
                  Michalis Polychronakis and
                  Manos Antonakakis},
  title        = {Linking Amplification DDoS Attacks to Booter Services},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 20th International
                  Symposium, {RAID} 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10453},
  pages        = {427--449},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66332-6\_19},
  doi          = {10.1007/978-3-319-66332-6\_19},
  timestamp    = {Mon, 20 Nov 2023 09:00:29 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/KruppKRM017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/FarinholtRPDYBM17,
  author       = {Brown Farinholt and
                  Mohammad Rezaeirad and
                  Paul Pearce and
                  Hitesh Dharmdasani and
                  Haikuo Yin and
                  Stevens Le Blond and
                  Damon McCoy and
                  Kirill Levchenko},
  title        = {To Catch a Ratter: Monitoring the Behavior of Amateur DarkComet {RAT}
                  Operators in the Wild},
  booktitle    = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose,
                  CA, USA, May 22-26, 2017},
  pages        = {770--787},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SP.2017.48},
  doi          = {10.1109/SP.2017.48},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/FarinholtRPDYBM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/AlrwaisLMWWQBM17,
  author       = {Sumayah A. Alrwais and
                  Xiaojing Liao and
                  Xianghang Mi and
                  Peng Wang and
                  Xiaofeng Wang and
                  Feng Qian and
                  Raheem A. Beyah and
                  Damon McCoy},
  title        = {Under the Shadow of Sunshine: Understanding and Detecting Bulletproof
                  Hosting on Legitimate Service Provider Networks},
  booktitle    = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose,
                  CA, USA, May 22-26, 2017},
  pages        = {805--823},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SP.2017.32},
  doi          = {10.1109/SP.2017.32},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/AlrwaisLMWWQBM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SiadatiPSM17,
  author       = {Hossein Siadati and
                  Sean Palka and
                  Avi Siegel and
                  Damon McCoy},
  editor       = {Jos{\'{e}} M. Fernandez and
                  Mathias Payer},
  title        = {Measuring the Effectiveness of Embedded Phishing Exercises},
  booktitle    = {10th {USENIX} Workshop on Cyber Security Experimentation and Test,
                  {CSET} 2017, Vancouver, BC, Canada, August 14, 2017},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/cset17/workshop-program/presentation/siadatii},
  timestamp    = {Mon, 01 Feb 2021 08:43:03 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/SiadatiPSM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/PortnoffADKBMLP17,
  author       = {Rebecca S. Portnoff and
                  Sadia Afroz and
                  Greg Durrett and
                  Jonathan K. Kummerfeld and
                  Taylor Berg{-}Kirkpatrick and
                  Damon McCoy and
                  Kirill Levchenko and
                  Vern Paxson},
  editor       = {Rick Barrett and
                  Rick Cummings and
                  Eugene Agichtein and
                  Evgeniy Gabrilovich},
  title        = {Tools for Automated Analysis of Cybercriminal Markets},
  booktitle    = {Proceedings of the 26th International Conference on World Wide Web,
                  {WWW} 2017, Perth, Australia, April 3-7, 2017},
  pages        = {657--666},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3038912.3052600},
  doi          = {10.1145/3038912.3052600},
  timestamp    = {Wed, 28 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/www/PortnoffADKBMLP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1708-09609,
  author       = {Greg Durrett and
                  Jonathan K. Kummerfeld and
                  Taylor Berg{-}Kirkpatrick and
                  Rebecca S. Portnoff and
                  Sadia Afroz and
                  Damon McCoy and
                  Kirill Levchenko and
                  Vern Paxson},
  title        = {Identifying Products in Online Cybercrime Marketplaces: {A} Dataset
                  for Fine-grained Domain Adaptation},
  journal      = {CoRR},
  volume       = {abs/1708.09609},
  year         = {2017},
  url          = {http://arxiv.org/abs/1708.09609},
  eprinttype    = {arXiv},
  eprint       = {1708.09609},
  timestamp    = {Wed, 28 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1708-09609.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/MeiklejohnPJLMV16,
  author       = {Sarah Meiklejohn and
                  Marjori Pomarole and
                  Grant Jordan and
                  Kirill Levchenko and
                  Damon McCoy and
                  Geoffrey M. Voelker and
                  Stefan Savage},
  title        = {A fistful of Bitcoins: characterizing payments among men with no names},
  journal      = {Commun. {ACM}},
  volume       = {59},
  number       = {4},
  pages        = {86--93},
  year         = {2016},
  url          = {https://doi.org/10.1145/2896384},
  doi          = {10.1145/2896384},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/MeiklejohnPJLMV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/SundaresanMAP16,
  author       = {Srikanth Sundaresan and
                  Damon McCoy and
                  Sadia Afroz and
                  Vern Paxson},
  title        = {Profiling underground merchants based on network behavior},
  booktitle    = {2016 {APWG} Symposium on Electronic Crime Research, eCrime 2016, Toronto,
                  ON, Canada, June 1-3, 2016},
  pages        = {62--70},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ECRIME.2016.7487943},
  doi          = {10.1109/ECRIME.2016.7487943},
  timestamp    = {Wed, 28 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/SundaresanMAP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/BaqerHMW16,
  author       = {Khaled Baqer and
                  Danny Yuxing Huang and
                  Damon McCoy and
                  Nicholas Weaver},
  editor       = {Jeremy Clark and
                  Sarah Meiklejohn and
                  Peter Y. A. Ryan and
                  Dan S. Wallach and
                  Michael Brenner and
                  Kurt Rohloff},
  title        = {Stressing Out: Bitcoin "Stress Testing"},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2016 International
                  Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February
                  26, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9604},
  pages        = {3--18},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53357-4\_1},
  doi          = {10.1007/978-3-662-53357-4\_1},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/BaqerHMW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/ParkMS16,
  author       = {Youngsam Park and
                  Damon McCoy and
                  Elaine Shi},
  editor       = {Jens Grossklags and
                  Bart Preneel},
  title        = {Understanding Craigslist Rental Scams},
  booktitle    = {Financial Cryptography and Data Security - 20th International Conference,
                  {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9603},
  pages        = {3--21},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-54970-4\_1},
  doi          = {10.1007/978-3-662-54970-4\_1},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/ParkMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/KhattakFAJSMPM16,
  author       = {Sheharbano Khattak and
                  David Fifield and
                  Sadia Afroz and
                  Mobin Javed and
                  Srikanth Sundaresan and
                  Damon McCoy and
                  Vern Paxson and
                  Steven J. Murdoch},
  title        = {Do You See What {I} See? Differential Treatment of Anonymous Users},
  booktitle    = {23rd Annual Network and Distributed System Security Symposium, {NDSS}
                  2016, San Diego, California, USA, February 21-24, 2016},
  publisher    = {The Internet Society},
  year         = {2016},
  url          = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/do-you-see-what-i-see-differential-treatment-anonymous-users.pdf},
  timestamp    = {Wed, 28 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/KhattakFAJSMPM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ThomasCRPPDSTTC16,
  author       = {Kurt Thomas and
                  Juan A. Elices Crespo and
                  Ryan Rasti and
                  Jean Michel Picod and
                  Cait Phillips and
                  Marc{-}Andr{\'{e}} Decoste and
                  Chris Sharp and
                  Fabio Tirelo and
                  Ali Tofigh and
                  Marc{-}Antoine Courteau and
                  Lucas Ballard and
                  Robert Shield and
                  Nav Jagpal and
                  Moheeb Abu Rajab and
                  Panayiotis Mavrommatis and
                  Niels Provos and
                  Elie Bursztein and
                  Damon McCoy},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Investigating Commercial Pay-Per-Install and the Distribution of Unwanted
                  Software},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {721--739},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/thomas},
  timestamp    = {Mon, 01 Feb 2021 08:43:18 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ThomasCRPPDSTTC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LiDCKBMSP16,
  author       = {Frank Li and
                  Zakir Durumeric and
                  Jakub Czyz and
                  Mohammad Karami and
                  Michael D. Bailey and
                  Damon McCoy and
                  Stefan Savage and
                  Vern Paxson},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {You've Got Vulnerability: Exploring Effective Vulnerability Notifications},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {1033--1050},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/li},
  timestamp    = {Thu, 26 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/LiDCKBMSP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/woot/MazloomRHM16,
  author       = {Sahar Mazloom and
                  Mohammad Rezaeirad and
                  Aaron Hunter and
                  Damon McCoy},
  editor       = {Natalie Silvanovich and
                  Patrick Traynor},
  title        = {A Security Analysis of an In-Vehicle Infotainment and App Platform},
  booktitle    = {10th {USENIX} Workshop on Offensive Technologies, {WOOT} 16, Austin,
                  TX, USA, August 8-9, 2016},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/woot16/workshop-program/presentation/mazloom},
  timestamp    = {Fri, 15 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/woot/MazloomRHM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/LiaoLMSHB16,
  author       = {Xiaojing Liao and
                  Chang Liu and
                  Damon McCoy and
                  Elaine Shi and
                  Shuang Hao and
                  Raheem A. Beyah},
  editor       = {Jacqueline Bourdeau and
                  Jim Hendler and
                  Roger Nkambou and
                  Ian Horrocks and
                  Ben Y. Zhao},
  title        = {Characterizing Long-tail {SEO} Spam on Cloud Web Hosting Services},
  booktitle    = {Proceedings of the 25th International Conference on World Wide Web,
                  {WWW} 2016, Montreal, Canada, April 11 - 15, 2016},
  pages        = {321--332},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2872427.2883008},
  doi          = {10.1145/2872427.2883008},
  timestamp    = {Tue, 12 Apr 2022 14:46:29 +0200},
  biburl       = {https://dblp.org/rec/conf/www/LiaoLMSHB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/KaramiPM16,
  author       = {Mohammad Karami and
                  Youngsam Park and
                  Damon McCoy},
  editor       = {Jacqueline Bourdeau and
                  Jim Hendler and
                  Roger Nkambou and
                  Ian Horrocks and
                  Ben Y. Zhao},
  title        = {Stress Testing the Booters: Understanding and Undermining the Business
                  of DDoS Services},
  booktitle    = {Proceedings of the 25th International Conference on World Wide Web,
                  {WWW} 2016, Montreal, Canada, April 11 - 15, 2016},
  pages        = {1033--1043},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2872427.2883004},
  doi          = {10.1145/2872427.2883004},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/www/KaramiPM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/16/McCoyPSJ16,
  author       = {Damon McCoy and
                  Youngsam Park and
                  Elaine Shi and
                  Markus Jakobsson},
  editor       = {Markus Jakobsson},
  title        = {Identifying Scams and Trends},
  booktitle    = {Understanding Social Engineering Based Scams},
  pages        = {7--19},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-1-4939-6457-4\_2},
  doi          = {10.1007/978-1-4939-6457-4\_2},
  timestamp    = {Tue, 16 May 2017 14:01:45 +0200},
  biburl       = {https://dblp.org/rec/books/sp/16/McCoyPSJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/16/McCoyPSJ16a,
  author       = {Damon McCoy and
                  Youngsam Park and
                  Elaine Shi and
                  Markus Jakobsson},
  editor       = {Markus Jakobsson},
  title        = {Case Study: Sales Scams},
  booktitle    = {Understanding Social Engineering Based Scams},
  pages        = {77--87},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-1-4939-6457-4\_8},
  doi          = {10.1007/978-1-4939-6457-4\_8},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/16/McCoyPSJ16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/16/McCoyPSJ16b,
  author       = {Damon McCoy and
                  Youngsam Park and
                  Elaine Shi and
                  Markus Jakobsson},
  editor       = {Markus Jakobsson},
  title        = {Case Study: Rental Scams},
  booktitle    = {Understanding Social Engineering Based Scams},
  pages        = {89--102},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-1-4939-6457-4\_9},
  doi          = {10.1007/978-1-4939-6457-4\_9},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/16/McCoyPSJ16b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/ClarkSMK15,
  author       = {Jason W. Clark and
                  Peter Snyder and
                  Damon McCoy and
                  Chris Kanich},
  editor       = {Bo Begole and
                  Jinwoo Kim and
                  Kori Inkpen and
                  Woontack Woo},
  title        = {"I Saw Images {I} Didn't Even Know {I} Had": Understanding
                  User Perceptions of Cloud Storage Privacy},
  booktitle    = {Proceedings of the 33rd Annual {ACM} Conference on Human Factors in
                  Computing Systems, {CHI} 2015, Seoul, Republic of Korea, April 18-23,
                  2015},
  pages        = {1641--1644},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2702123.2702535},
  doi          = {10.1145/2702123.2702535},
  timestamp    = {Fri, 12 Mar 2021 15:27:48 +0100},
  biburl       = {https://dblp.org/rec/conf/chi/ClarkSMK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icst/PalkaM15,
  author       = {Sean Palka and
                  Damon McCoy},
  title        = {Dynamic phishing content using generative grammars},
  booktitle    = {Eighth {IEEE} International Conference on Software Testing, Verification
                  and Validation, {ICST} 2015 Workshops, Graz, Austria, April 13-17,
                  2015},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICSTW.2015.7107458},
  doi          = {10.1109/ICSTW.2015.7107458},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icst/PalkaM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ThomasBGHJKMNPP15,
  author       = {Kurt Thomas and
                  Elie Bursztein and
                  Chris Grier and
                  Grant Ho and
                  Nav Jagpal and
                  Alexandros Kapravelos and
                  Damon McCoy and
                  Antonio Nappa and
                  Vern Paxson and
                  Paul Pearce and
                  Niels Provos and
                  Moheeb Abu Rajab},
  title        = {Ad Injection at Scale: Assessing Deceptive Advertisement Modifications},
  booktitle    = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose,
                  CA, USA, May 17-21, 2015},
  pages        = {151--167},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SP.2015.17},
  doi          = {10.1109/SP.2015.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ThomasBGHJKMNPP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/weis/ThomasHWBGHKMSV15,
  author       = {Kurt Thomas and
                  Danny Yuxing Huang and
                  David Y. Wang and
                  Elie Bursztein and
                  Chris Grier and
                  Tom Holt and
                  Christopher Kruegel and
                  Damon McCoy and
                  Stefan Savage and
                  Giovanni Vigna},
  title        = {Framing Dependencies Introduced by Underground Commoditization},
  booktitle    = {14th Annual Workshop on the Economics of Information Security, {WEIS}
                  2015, Delft, The Netherlands, 22-23 June, 2015},
  year         = {2015},
  url          = {http://www.econinfosec.org/archive/weis2015/papers/WEIS\_2015\_thomas.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/weis/ThomasHWBGHKMSV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/woot/PalkaM15,
  author       = {Sean Palka and
                  Damon McCoy},
  editor       = {Aur{\'{e}}lien Francillon and
                  Thomas Ptacek},
  title        = {Fuzzing E-mail Filters with Generative Grammars and N-Gram Analysis},
  booktitle    = {9th {USENIX} Workshop on Offensive Technologies, {WOOT} '15, Washington,
                  DC, USA, August 10-11, 2015},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/woot15/workshop-program/presentation/palka},
  timestamp    = {Mon, 01 Feb 2021 08:41:51 +0100},
  biburl       = {https://dblp.org/rec/conf/woot/PalkaM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KaramiPM15,
  author       = {Mohammad Karami and
                  Youngsam Park and
                  Damon McCoy},
  title        = {Stress Testing the Booters: Understanding and Undermining the Business
                  of DDoS Services},
  journal      = {CoRR},
  volume       = {abs/1508.03410},
  year         = {2015},
  url          = {http://arxiv.org/abs/1508.03410},
  eprinttype    = {arXiv},
  eprint       = {1508.03410},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KaramiPM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PearceDGLGMPSV14,
  author       = {Paul Pearce and
                  Vacha Dave and
                  Chris Grier and
                  Kirill Levchenko and
                  Saikat Guha and
                  Damon McCoy and
                  Vern Paxson and
                  Stefan Savage and
                  Geoffrey M. Voelker},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {Characterizing Large-Scale Click Fraud in ZeroAccess},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {141--152},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660369},
  doi          = {10.1145/2660267.2660369},
  timestamp    = {Tue, 07 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/PearceDGLGMPSV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ThomasIBPGM14,
  author       = {Kurt Thomas and
                  Dmytro Iatskiv and
                  Elie Bursztein and
                  Tadek Pietraszek and
                  Chris Grier and
                  Damon McCoy},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {Dialing Back Abuse on Phone Verified Accounts},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {465--476},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660321},
  doi          = {10.1145/2660267.2660321},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ThomasIBPGM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/JonesM14,
  author       = {Jackie Jones and
                  Damon McCoy},
  title        = {The check is in the mail: Monetization of Craigslist buyer scams},
  booktitle    = {2014 {APWG} Symposium on Electronic Crime Research, eCrime 2014, Birmingham,
                  AL, USA, September 23-25, 2014},
  pages        = {25--35},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ECRIME.2014.6963162},
  doi          = {10.1109/ECRIME.2014.6963162},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/JonesM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/WangDKSMSV14,
  author       = {David Y. Wang and
                  Matthew F. Der and
                  Mohammad Karami and
                  Lawrence K. Saul and
                  Damon McCoy and
                  Stefan Savage and
                  Geoffrey M. Voelker},
  editor       = {Carey Williamson and
                  Aditya Akella and
                  Nina Taft},
  title        = {Search + Seizure: The Effectiveness of Interventions on {SEO} Campaigns},
  booktitle    = {Proceedings of the 2014 Internet Measurement Conference, {IMC} 2014,
                  Vancouver, BC, Canada, November 5-7, 2014},
  pages        = {359--372},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2663716.2663738},
  doi          = {10.1145/2663716.2663738},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imc/WangDKSMSV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/HuangDMDGMSWSL14,
  author       = {Danny Yuxing Huang and
                  Hitesh Dharmdasani and
                  Sarah Meiklejohn and
                  Vacha Dave and
                  Chris Grier and
                  Damon McCoy and
                  Stefan Savage and
                  Nicholas Weaver and
                  Alex C. Snoeren and
                  Kirill Levchenko},
  title        = {Botcoin: Monetizing Stolen Cycles},
  booktitle    = {21st Annual Network and Distributed System Security Symposium, {NDSS}
                  2014, San Diego, California, USA, February 23-26, 2014},
  publisher    = {The Internet Society},
  year         = {2014},
  url          = {https://www.ndss-symposium.org/ndss2014/botcoin-monetizing-stolen-cycles},
  timestamp    = {Mon, 01 Feb 2021 08:42:18 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/HuangDMDGMSWSL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ParkJMSJ14,
  author       = {Youngsam Park and
                  Jackie Jones and
                  Damon McCoy and
                  Elaine Shi and
                  Markus Jakobsson},
  title        = {Scambaiter: Understanding Targeted Nigerian Scams on Craigslist},
  booktitle    = {21st Annual Network and Distributed System Security Symposium, {NDSS}
                  2014, San Diego, California, USA, February 23-26, 2014},
  publisher    = {The Internet Society},
  year         = {2014},
  url          = {https://www.ndss-symposium.org/ndss2014/scambaiter-understanding-targeted-nigerian-scams-craigslist},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/ParkJMSJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/SarvariAMM14,
  author       = {Hamed Sarvari and
                  Ehab Atif Abozinadah and
                  Alex Mbaziira and
                  Damon McCoy},
  title        = {Constructing and Analyzing Criminal Networks},
  booktitle    = {35. {IEEE} Security and Privacy Workshops, {SPW} 2014, San Jose, CA,
                  USA, May 17-18, 2014},
  pages        = {84--91},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/SPW.2014.22},
  doi          = {10.1109/SPW.2014.22},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/SarvariAMM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/AfrozISGM14,
  author       = {Sadia Afroz and
                  Aylin Caliskan Islam and
                  Ariel Stolerman and
                  Rachel Greenstadt and
                  Damon McCoy},
  title        = {Doppelg{\"{a}}nger Finder: Taking Stylometry to the Underground},
  booktitle    = {2014 {IEEE} Symposium on Security and Privacy, {SP} 2014, Berkeley,
                  CA, USA, May 18-21, 2014},
  pages        = {212--226},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/SP.2014.21},
  doi          = {10.1109/SP.2014.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/AfrozISGM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/KaramiM13,
  author       = {Mohammad Karami and
                  Damon McCoy},
  title        = {Rent to Pwn: Analyzing Commodity Booter DDoS Services},
  journal      = {login Usenix Mag.},
  volume       = {38},
  number       = {6},
  year         = {2013},
  url          = {https://www.usenix.org/publications/login/december-2013-volume-38-number-6/rent-pwn-analyzing-commodity-booter-ddos},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/KaramiM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/MeiklejohnPJLMV13,
  author       = {Sarah Meiklejohn and
                  Marjori Pomarole and
                  Grant Jordan and
                  Kirill Levchenko and
                  Damon McCoy and
                  Geoffrey M. Voelker and
                  Stefan Savage},
  title        = {A Fistful of Bitcoins: Characterizing Payments Among Men with No Names},
  journal      = {login Usenix Mag.},
  volume       = {38},
  number       = {6},
  year         = {2013},
  url          = {https://www.usenix.org/publications/login/december-2013-volume-38-number-6/fistful-bitcoins-characterizing-payments-among},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/MeiklejohnPJLMV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/AfrozGMG13,
  author       = {Sadia Afroz and
                  Vaibhav Garg and
                  Damon McCoy and
                  Rachel Greenstadt},
  title        = {Honor among thieves: {A} common's analysis of cybercrime economies},
  booktitle    = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco,
                  CA, USA, September 17-18, 2013},
  pages        = {1--11},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/eCRS.2013.6805778},
  doi          = {10.1109/ECRS.2013.6805778},
  timestamp    = {Wed, 28 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/AfrozGMG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/KaramiGM13,
  author       = {Mohammad Karami and
                  Shiva Ghaemi and
                  Damon McCoy},
  title        = {Folex: An analysis of an herbal and counterfeit luxury goods affiliate
                  program},
  booktitle    = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco,
                  CA, USA, September 17-18, 2013},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/eCRS.2013.6805782},
  doi          = {10.1109/ECRS.2013.6805782},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/KaramiGM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/MeiklejohnPJLMVS13,
  author       = {Sarah Meiklejohn and
                  Marjori Pomarole and
                  Grant Jordan and
                  Kirill Levchenko and
                  Damon McCoy and
                  Geoffrey M. Voelker and
                  Stefan Savage},
  editor       = {Konstantina Papagiannaki and
                  P. Krishna Gummadi and
                  Craig Partridge},
  title        = {A fistful of bitcoins: characterizing payments among men with no names},
  booktitle    = {Proceedings of the 2013 Internet Measurement Conference, {IMC} 2013,
                  Barcelona, Spain, October 23-25, 2013},
  pages        = {127--140},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2504730.2504747},
  doi          = {10.1145/2504730.2504747},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/imc/MeiklejohnPJLMVS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/leet/ClarkM13,
  author       = {Jason W. Clark and
                  Damon McCoy},
  editor       = {Vern Paxson},
  title        = {There Are No Free iPads: An Analysis of Survey Scams as a Business},
  booktitle    = {6th {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
                  {LEET} '13, Washington, D.C., USA, August 12, 2013},
  publisher    = {{USENIX} Association},
  year         = {2013},
  url          = {https://www.usenix.org/conference/leet13/workshop-program/presentation/clark},
  timestamp    = {Mon, 01 Feb 2021 08:42:30 +0100},
  biburl       = {https://dblp.org/rec/conf/leet/ClarkM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/leet/KaramiM13,
  author       = {Mohammad Karami and
                  Damon McCoy},
  editor       = {Vern Paxson},
  title        = {Understanding the Emerging Threat of DDoS-as-a-Service},
  booktitle    = {6th {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
                  {LEET} '13, Washington, D.C., USA, August 12, 2013},
  publisher    = {{USENIX} Association},
  year         = {2013},
  url          = {https://www.usenix.org/conference/leet13/workshop-program/presentation/karami},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/leet/KaramiM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/EverettM13,
  author       = {Christopher E. Everett and
                  Damon McCoy},
  editor       = {Chris Kanich and
                  Micah Sherr},
  title        = {{OCTANE} (Open Car Testbed and Network Experiments): Bringing Cyber-Physical
                  Security Research to Researchers and Students},
  booktitle    = {6th Workshop on Cyber Security Experimentation and Test, {CSET} '13,
                  Washington, D.C., USA, August 12, 2013},
  publisher    = {{USENIX} Association},
  year         = {2013},
  url          = {https://www.usenix.org/conference/cset13/workshop-program/presentation/everett},
  timestamp    = {Mon, 01 Feb 2021 08:43:03 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/EverettM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ThomasMGKP13,
  author       = {Kurt Thomas and
                  Damon McCoy and
                  Chris Grier and
                  Alek Kolcz and
                  Vern Paxson},
  editor       = {Samuel T. King},
  title        = {Trafficking Fraudulent Accounts: The Role of the Underground Market
                  in Twitter Spam and Abuse},
  booktitle    = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC,
                  USA, August 14-16, 2013},
  pages        = {195--210},
  publisher    = {{USENIX} Association},
  year         = {2013},
  url          = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/paper/thomas},
  timestamp    = {Mon, 01 Feb 2021 08:42:56 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ThomasMGKP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GrierBCCDLMMNPPRRRTPSV12,
  author       = {Chris Grier and
                  Lucas Ballard and
                  Juan Caballero and
                  Neha Chachra and
                  Christian J. Dietrich and
                  Kirill Levchenko and
                  Panayiotis Mavrommatis and
                  Damon McCoy and
                  Antonio Nappa and
                  Andreas Pitsillidis and
                  Niels Provos and
                  M. Zubair Rafique and
                  Moheeb Abu Rajab and
                  Christian Rossow and
                  Kurt Thomas and
                  Vern Paxson and
                  Stefan Savage and
                  Geoffrey M. Voelker},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Manufacturing compromise: the emergence of exploit-as-a-service},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {821--832},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382283},
  doi          = {10.1145/2382196.2382283},
  timestamp    = {Tue, 12 Apr 2022 13:28:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/GrierBCCDLMMNPPRRRTPSV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/McCoyDKVS12,
  author       = {Damon McCoy and
                  Hitesh Dharmdasani and
                  Christian Kreibich and
                  Geoffrey M. Voelker and
                  Stefan Savage},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Priceless: the role of payments in abuse-advertised goods},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {845--856},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382285},
  doi          = {10.1145/2382196.2382285},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/McCoyDKVS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/McCoyPJWKKVSL12,
  author       = {Damon McCoy and
                  Andreas Pitsillidis and
                  Grant Jordan and
                  Nicholas Weaver and
                  Christian Kreibich and
                  Brian Krebs and
                  Geoffrey M. Voelker and
                  Stefan Savage and
                  Kirill Levchenko},
  editor       = {Tadayoshi Kohno},
  title        = {PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate
                  Programs},
  booktitle    = {Proceedings of the 21th {USENIX} Security Symposium, Bellevue, WA,
                  USA, August 8-10, 2012},
  pages        = {1--16},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/usenixsecurity12/technical-sessions/presentation/mccoy},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/McCoyPJWKKVSL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/McCoyML11,
  author       = {Damon McCoy and
                  Jose Andre Morales and
                  Kirill Levchenko},
  editor       = {George Danezis},
  title        = {Proximax: Measurement-Driven Proxy Dissemination (Short Paper)},
  booktitle    = {Financial Cryptography and Data Security - 15th International Conference,
                  {FC} 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7035},
  pages        = {260--267},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27576-0\_21},
  doi          = {10.1007/978-3-642-27576-0\_21},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/McCoyML11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/MotoyamaMLSV11,
  author       = {Marti Motoyama and
                  Damon McCoy and
                  Kirill Levchenko and
                  Stefan Savage and
                  Geoffrey M. Voelker},
  editor       = {Patrick Thiran and
                  Walter Willinger},
  title        = {An analysis of underground forums},
  booktitle    = {Proceedings of the 11th {ACM} {SIGCOMM} Internet Measurement Conference,
                  {IMC} '11, Berlin, Germany, November 2-, 2011},
  pages        = {71--80},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2068816.2068824},
  doi          = {10.1145/2068816.2068824},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imc/MotoyamaMLSV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/AlSabahBGGMSV11,
  author       = {Mashael AlSabah and
                  Kevin S. Bauer and
                  Ian Goldberg and
                  Dirk Grunwald and
                  Damon McCoy and
                  Stefan Savage and
                  Geoffrey M. Voelker},
  editor       = {Simone Fischer{-}H{\"{u}}bner and
                  Nicholas Hopper},
  title        = {DefenestraTor: Throwing Out Windows in Tor},
  booktitle    = {Privacy Enhancing Technologies - 11th International Symposium, {PETS}
                  2011, Waterloo, ON, Canada, July 27-29, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6794},
  pages        = {134--154},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22263-4\_8},
  doi          = {10.1007/978-3-642-22263-4\_8},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/AlSabahBGGMSV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/LevchenkoPCEFGHKKLMWPVS11,
  author       = {Kirill Levchenko and
                  Andreas Pitsillidis and
                  Neha Chachra and
                  Brandon Enright and
                  M{\'{a}}rk F{\'{e}}legyh{\'{a}}zi and
                  Chris Grier and
                  Tristan Halvorson and
                  Chris Kanich and
                  Christian Kreibich and
                  He Liu and
                  Damon McCoy and
                  Nicholas Weaver and
                  Vern Paxson and
                  Geoffrey M. Voelker and
                  Stefan Savage},
  title        = {Click Trajectories: End-to-End Analysis of the Spam Value Chain},
  booktitle    = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May
                  2011, Berkeley, California, {USA}},
  pages        = {431--446},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SP.2011.24},
  doi          = {10.1109/SP.2011.24},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/LevchenkoPCEFGHKKLMWPVS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/CheckowayMKASSKCRK11,
  author       = {Stephen Checkoway and
                  Damon McCoy and
                  Brian Kantor and
                  Danny Anderson and
                  Hovav Shacham and
                  Stefan Savage and
                  Karl Koscher and
                  Alexei Czeskis and
                  Franziska Roesner and
                  Tadayoshi Kohno},
  title        = {Comprehensive Experimental Analyses of Automotive Attack Surfaces},
  booktitle    = {20th {USENIX} Security Symposium, San Francisco, CA, USA, August 8-12,
                  2011, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {http://static.usenix.org/events/sec11/tech/full\_papers/Checkoway.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/CheckowayMKASSKCRK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KanichCMGWMLSV11,
  author       = {Chris Kanich and
                  Neha Chachra and
                  Damon McCoy and
                  Chris Grier and
                  David Y. Wang and
                  Marti Motoyama and
                  Kirill Levchenko and
                  Stefan Savage and
                  Geoffrey M. Voelker},
  editor       = {Sean Peisert and
                  Stephen Schwab},
  title        = {No Plan Survives Contact: Experience with Cybercrime Measurement},
  booktitle    = {4th Workshop on Cyber Security Experimentation and Test, {CSET} '11,
                  San Francisco, CA, USA, August 8, 2011},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {https://www.usenix.org/conference/cset11/no-plan-survives-contact-experience-cybercrime-measurement},
  timestamp    = {Mon, 01 Feb 2021 08:43:02 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/KanichCMGWMLSV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KanichWMHKLPVS11,
  author       = {Chris Kanich and
                  Nicholas Weaver and
                  Damon McCoy and
                  Tristan Halvorson and
                  Christian Kreibich and
                  Kirill Levchenko and
                  Vern Paxson and
                  Geoffrey M. Voelker and
                  Stefan Savage},
  title        = {Show Me the Money: Characterizing Spam-advertised Revenue},
  booktitle    = {20th {USENIX} Security Symposium, San Francisco, CA, USA, August 8-12,
                  2011, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {http://static.usenix.org/events/sec11/tech/full\_papers/Kanich.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/KanichWMHKLPVS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MotoyamaMLSV11,
  author       = {Marti Motoyama and
                  Damon McCoy and
                  Kirill Levchenko and
                  Stefan Savage and
                  Geoffrey M. Voelker},
  title        = {Dirty Jobs: The Role of Freelance Labor in Web Service Abuse},
  booktitle    = {20th {USENIX} Security Symposium, San Francisco, CA, USA, August 8-12,
                  2011, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {http://static.usenix.org/events/sec11/tech/full\_papers/Motoyama.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/MotoyamaMLSV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/PangGKMS10,
  author       = {Jeffrey Pang and
                  Ben Greenstein and
                  Michael Kaminsky and
                  Damon McCoy and
                  Srinivasan Seshan},
  title        = {Wifi-Reports: Improving Wireless Network Selection with Collaboration},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {9},
  number       = {12},
  pages        = {1713--1731},
  year         = {2010},
  url          = {https://doi.org/10.1109/TMC.2010.151},
  doi          = {10.1109/TMC.2010.151},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmc/PangGKMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/GonzalesBLMS10,
  author       = {Harold Gonzales and
                  Kevin S. Bauer and
                  Janne Lindqvist and
                  Damon McCoy and
                  Douglas C. Sicker},
  title        = {Practical Defenses for Evil Twin Attacks in 802.11},
  booktitle    = {Proceedings of the Global Communications Conference, 2010. {GLOBECOM}
                  2010, 6-10 December 2010, Miami, Florida, {USA}},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/GLOCOM.2010.5684213},
  doi          = {10.1109/GLOCOM.2010.5684213},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/GonzalesBLMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/KoscherCRPKCMKASS10,
  author       = {Karl Koscher and
                  Alexei Czeskis and
                  Franziska Roesner and
                  Shwetak N. Patel and
                  Tadayoshi Kohno and
                  Stephen Checkoway and
                  Damon McCoy and
                  Brian Kantor and
                  Danny Anderson and
                  Hovav Shacham and
                  Stefan Savage},
  title        = {Experimental Security Analysis of a Modern Automobile},
  booktitle    = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  pages        = {447--462},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SP.2010.34},
  doi          = {10.1109/SP.2010.34},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/KoscherCRPKCMKASS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MotoyamaLKMVS10,
  author       = {Marti Motoyama and
                  Kirill Levchenko and
                  Chris Kanich and
                  Damon McCoy and
                  Geoffrey M. Voelker and
                  Stefan Savage},
  title        = {Re: CAPTCHAs-Understanding CAPTCHA-Solving Services in an Economic
                  Context},
  booktitle    = {19th {USENIX} Security Symposium, Washington, DC, USA, August 11-13,
                  2010, Proceedings},
  pages        = {435--462},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {http://www.usenix.org/events/sec10/tech/full\_papers/Motoyama.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/MotoyamaLKMVS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/BauerMABGGS09,
  author       = {Kevin S. Bauer and
                  Damon McCoy and
                  Eric W. Anderson and
                  Markus Breitenbach and
                  Gregory Z. Grudic and
                  Dirk Grunwald and
                  Douglas C. Sicker},
  title        = {The Directional Attack on Wireless Localization -or- How to Spoof
                  Your Location with a Tin Can},
  booktitle    = {Proceedings of the Global Communications Conference, 2009. {GLOBECOM}
                  2009, Honolulu, Hawaii, USA, 30 November - 4 December 2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/GLOCOM.2009.5425737},
  doi          = {10.1109/GLOCOM.2009.5425737},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/BauerMABGGS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisys/PangGKMS09,
  author       = {Jeffrey Pang and
                  Ben Greenstein and
                  Michael Kaminsky and
                  Damon McCoy and
                  Srinivasan Seshan},
  editor       = {Krzysztof Zielinski and
                  Adam Wolisz and
                  Jason Flinn and
                  Anthony LaMarca},
  title        = {Wifi-reports: improving wireless network selection with collaboration},
  booktitle    = {Proceedings of the 7th International Conference on Mobile Systems,
                  Applications, and Services (MobiSys 2009), Krak{\'{o}}w, Poland,
                  June 22-25, 2009},
  pages        = {123--136},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1555816.1555830},
  doi          = {10.1145/1555816.1555830},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobisys/PangGKMS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/BauerMGGS09,
  author       = {Kevin S. Bauer and
                  Damon McCoy and
                  Ben Greenstein and
                  Dirk Grunwald and
                  Douglas C. Sicker},
  editor       = {Ian Goldberg and
                  Mikhail J. Atallah},
  title        = {Physical Layer Attacks on Unlinkability in Wireless LANs},
  booktitle    = {Privacy Enhancing Technologies, 9th International Symposium, {PETS}
                  2009, Seattle, WA, USA, August 5-7, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5672},
  pages        = {108--127},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03168-7\_7},
  doi          = {10.1007/978-3-642-03168-7\_7},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pet/BauerMGGS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tapia/BauerMGGS09,
  author       = {Kevin S. Bauer and
                  Damon McCoy and
                  Ben Greenstein and
                  Dirk Grunwald and
                  Douglas C. Sicker},
  editor       = {Nina M. Berry},
  title        = {Performing traffic analysis on a wireless identifier-free link layer},
  booktitle    = {Proceedings of the Richard Tapia Celebration of Diversity in Computing
                  Conference 2009: Intellect, Initiatives, Insight, and Innovations,
                  Portland, Oregon, USA, April 1-4, 2009},
  pages        = {18--23},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1565799.1565804},
  doi          = {10.1145/1565799.1565804},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tapia/BauerMGGS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BauerMGS09,
  author       = {Kevin S. Bauer and
                  Damon McCoy and
                  Dirk Grunwald and
                  Douglas C. Sicker},
  title        = {BitStalker: Accurately and efficiently monitoring bittorrent traffic},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {181--185},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386457},
  doi          = {10.1109/WIFS.2009.5386457},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/BauerMGS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipccc/BauerGM08,
  author       = {Kevin S. Bauer and
                  Harold Gonzales and
                  Damon McCoy},
  editor       = {Ty Znati and
                  Youtao Zhang},
  title        = {Mitigating Evil Twin Attacks in 802.11},
  booktitle    = {2008 {IEEE} International Performance, Computing and Communications
                  Conference, {IPCCC} 2008, Austin, TX, USA, December 7-9, 2008},
  pages        = {513--516},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/PCCC.2008.4745081},
  doi          = {10.1109/PCCC.2008.4745081},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipccc/BauerGM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisys/GreensteinMPKSW08,
  author       = {Ben Greenstein and
                  Damon McCoy and
                  Jeffrey Pang and
                  Tadayoshi Kohno and
                  Srinivasan Seshan and
                  David Wetherall},
  editor       = {Dirk Grunwald and
                  Richard Han and
                  Eyal de Lara and
                  Carla Schlatter Ellis},
  title        = {Improving wireless privacy with an identifier-free link layer protocol},
  booktitle    = {Proceedings of the 6th International Conference on Mobile Systems,
                  Applications, and Services (MobiSys 2008), Breckenridge, CO, USA,
                  June 17-20, 2008},
  pages        = {40--53},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1378600.1378607},
  doi          = {10.1145/1378600.1378607},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobisys/GreensteinMPKSW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/McCoyBGKS08,
  author       = {Damon McCoy and
                  Kevin S. Bauer and
                  Dirk Grunwald and
                  Tadayoshi Kohno and
                  Douglas C. Sicker},
  editor       = {Nikita Borisov and
                  Ian Goldberg},
  title        = {Shining Light in Dark Places: Understanding the Tor Network},
  booktitle    = {Privacy Enhancing Technologies, 8th International Symposium, {PETS}
                  2008, Leuven, Belgium, July 23-25, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5134},
  pages        = {63--76},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70630-4\_5},
  doi          = {10.1007/978-3-540-70630-4\_5},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pet/McCoyBGKS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/BauerMGS08,
  author       = {Kevin S. Bauer and
                  Damon McCoy and
                  Dirk Grunwald and
                  Douglas C. Sicker},
  editor       = {Albert Levi and
                  Peng Liu and
                  Refik Molva},
  title        = {BitBlender: Light-Weight Anonymity for BitTorrent},
  booktitle    = {4th International {ICST} Conference on Security and Privacy in Communication
                  Networks, {SECURECOMM} 2008, Istanbul, Turkey, September 22-25, 2008},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1461464.1461465},
  doi          = {10.1145/1461464.1461465},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/BauerMGS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secon/McCoySG07,
  author       = {Damon McCoy and
                  Douglas C. Sicker and
                  Dirk Grunwald},
  title        = {A Mechanism for Detecting and Responding to Misbehaving Nodes in Wireless
                  Networks},
  booktitle    = {Proceedings of the Fourth Annual {IEEE} Communications Society Conference
                  on Sensor, Mesh and Ad Hoc Communications and Networks, {SECON} 2007,
                  Merged with {IEEE} International Workshop on Wireless Ad-hoc and Sensor
                  Networks (IWWAN), June 18-21, 2007, San Diego, California, {USA}},
  pages        = {678--684},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/SAHCN.2007.4292881},
  doi          = {10.1109/SAHCN.2007.4292881},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secon/McCoySG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/BauerMGKS07,
  author       = {Kevin S. Bauer and
                  Damon McCoy and
                  Dirk Grunwald and
                  Tadayoshi Kohno and
                  Douglas C. Sicker},
  editor       = {Peng Ning and
                  Ting Yu},
  title        = {Low-resource routing attacks against tor},
  booktitle    = {Proceedings of the 2007 {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2007, Alexandria, VA, USA, October 29, 2007},
  pages        = {11--20},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1314333.1314336},
  doi          = {10.1145/1314333.1314336},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/BauerMGKS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/FranklinM06,
  author       = {Jason Franklin and
                  Damon McCoy},
  editor       = {Angelos D. Keromytis},
  title        = {Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting},
  booktitle    = {Proceedings of the 15th {USENIX} Security Symposium, Vancouver, BC,
                  Canada, July 31 - August 4, 2006},
  publisher    = {{USENIX} Association},
  year         = {2006},
  url          = {https://www.usenix.org/conference/15th-usenix-security-symposium/passive-data-link-layer-80211-wireless-device-driver},
  timestamp    = {Mon, 01 Feb 2021 08:43:12 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/FranklinM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics