Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Damon McCoy
@article{DBLP:journals/corr/abs-2401-17839, author = {Shujaat Shujaat Mirza and Bruno Coelho and Yuyuan Cui and Christina P{\"{o}}pper and Damon McCoy}, title = {Global-Liar: Factuality of LLMs over Time and Geographic Regions}, journal = {CoRR}, volume = {abs/2401.17839}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.17839}, doi = {10.48550/ARXIV.2401.17839}, eprinttype = {arXiv}, eprint = {2401.17839}, timestamp = {Wed, 07 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-17839.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/LiuRHHSVM23, author = {Enze Liu and Sumanth Rao and Sam Havron and Grant Ho and Stefan Savage and Geoffrey M. Voelker and Damon McCoy}, title = {No Privacy Among Spies: Assessing the Functionality and Insecurity of Consumer Android Spyware Apps}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2023}, number = {1}, pages = {207--224}, year = {2023}, url = {https://doi.org/10.56553/popets-2023-0013}, doi = {10.56553/POPETS-2023-0013}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/LiuRHHSVM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/CoelhoLEGM23, author = {Bruno Coelho and Tobias Lauinger and Laura Edelson and Ian Goldstein and Damon McCoy}, editor = {Ying Ding and Jie Tang and Juan F. Sequeda and Lora Aroyo and Carlos Castillo and Geert{-}Jan Houben}, title = {Propaganda Pol{\'{\i}}tica Pagada: Exploring {U.S.} Political Facebook Ads en Espa{\~{n}}ol}, booktitle = {Proceedings of the {ACM} Web Conference 2023, {WWW} 2023, Austin, TX, USA, 30 April 2023 - 4 May 2023}, pages = {2742--2753}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3543507.3583425}, doi = {10.1145/3543507.3583425}, timestamp = {Mon, 28 Aug 2023 21:17:10 +0200}, biburl = {https://dblp.org/rec/conf/www/CoelhoLEGM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2301-02737, author = {Ian Goldstein and Laura Edelson and Damon McCoy and Tobias Lauinger}, title = {Understanding the (In)Effectiveness of Content Moderation: {A} Case Study of Facebook in the Context of the {U.S.} Capitol Riot}, journal = {CoRR}, volume = {abs/2301.02737}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2301.02737}, doi = {10.48550/ARXIV.2301.02737}, eprinttype = {arXiv}, eprint = {2301.02737}, timestamp = {Tue, 10 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2301-02737.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2304-11681, author = {Ian W. Gray and Jack Cable and Benjamin Brown and Vlad Cuiujuclu and Damon McCoy}, title = {Money Over Morals: {A} Business Analysis of Conti Ransomware}, journal = {CoRR}, volume = {abs/2304.11681}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2304.11681}, doi = {10.48550/ARXIV.2304.11681}, eprinttype = {arXiv}, eprint = {2304.11681}, timestamp = {Tue, 02 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2304-11681.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pacmhci/BhaleraoMBHMR22, author = {Rasika Bhalerao and Nora McDonald and Hanna Barakat and Vaughn Hamilton and Damon McCoy and Elissa M. Redmiles}, title = {Ethics and Efficacy of Unsolicited Anti-Trafficking {SMS} Outreach}, journal = {Proc. {ACM} Hum. Comput. Interact.}, volume = {6}, number = {{CSCW2}}, pages = {1--39}, year = {2022}, url = {https://doi.org/10.1145/3555083}, doi = {10.1145/3555083}, timestamp = {Fri, 03 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pacmhci/BhaleraoMBHMR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/TakeGFMG22, author = {Kejsi Take and Kevin Gallagher and Andrea Forte and Damon McCoy and Rachel Greenstadt}, title = {"It Feels Like Whack-a-mole": User Experiences of Data Removal from People Search Websites}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2022}, number = {3}, pages = {159--178}, year = {2022}, url = {https://doi.org/10.56553/popets-2022-0067}, doi = {10.56553/POPETS-2022-0067}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/TakeGFMG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/OhKMP22, author = {ChangSeok Oh and Chris Kanich and Damon McCoy and Paul Pearce}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {Cart-ology: Intercepting Targeted Advertising via Ad Network Identity Entanglement}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {2401--2414}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3560641}, doi = {10.1145/3548606.3560641}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/OhKMP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/GrayCBCM22, author = {Ian W. Gray and Jack Cable and Benjamin Brown and Vlad Cuiujuclu and Damon McCoy}, title = {Money Over Morals: {A} Business Analysis of Conti Ransomware}, booktitle = {{APWG} Symposium on Electronic Crime Research, eCrime 2022, Boston, MA, USA, November 30 - December 2, 2022}, pages = {1--12}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/eCrime57793.2022.10142119}, doi = {10.1109/ECRIME57793.2022.10142119}, timestamp = {Tue, 20 Jun 2023 14:12:59 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/GrayCBCM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/BhaleraoM22, author = {Rasika Bhalerao and Damon McCoy}, title = {Libel Inc: An Analysis of the Libel Site Ecosystem}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2022 - Workshops, Genoa, Italy, June 6-10, 2022}, pages = {1--10}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/EuroSPW55150.2022.00019}, doi = {10.1109/EUROSPW55150.2022.00019}, timestamp = {Mon, 04 Jul 2022 17:06:18 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/BhaleraoM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/istas/BhaleraoM22, author = {Rasika Bhalerao and Damon McCoy}, title = {An Analysis of Terms of Service and Official Policies with Respect to Sex Work}, booktitle = {{IEEE} International Symposium on Technology and Society, {ISTAS} 2022, Hong Kong, November 10-12, 2022}, pages = {1--14}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ISTAS55053.2022.10227104}, doi = {10.1109/ISTAS55053.2022.10227104}, timestamp = {Mon, 11 Sep 2023 15:41:21 +0200}, biburl = {https://dblp.org/rec/conf/istas/BhaleraoM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/PochatEGJML22, author = {Victor Le Pochat and Laura Edelson and Tom van Goethem and Wouter Joosen and Damon McCoy and Tobias Lauinger}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {An Audit of Facebook's Political Ad Policy Enforcement}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {607--624}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/lepochat}, timestamp = {Tue, 18 Oct 2022 17:10:36 +0200}, biburl = {https://dblp.org/rec/conf/uss/PochatEGJML22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/BallardGMSTZGLM22, author = {Cameron Ballard and Ian Goldstein and Pulak Mehta and Genesis Smothers and Kejsi Take and Victoria Zhong and Rachel Greenstadt and Tobias Lauinger and Damon McCoy}, editor = {Fr{\'{e}}d{\'{e}}rique Laforest and Rapha{\"{e}}l Troncy and Elena Simperl and Deepak Agarwal and Aristides Gionis and Ivan Herman and Lionel M{\'{e}}dini}, title = {Conspiracy Brokers: Understanding the Monetization of YouTube Conspiracy Theories}, booktitle = {{WWW} '22: The {ACM} Web Conference 2022, Virtual Event, Lyon, France, April 25 - 29, 2022}, pages = {2707--2718}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3485447.3512142}, doi = {10.1145/3485447.3512142}, timestamp = {Thu, 23 Jun 2022 19:54:34 +0200}, biburl = {https://dblp.org/rec/conf/www/BallardGMSTZGLM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2202-09527, author = {Rasika Bhalerao and Nora McDonald and Hanna Barakat and Vaughn Hamilton and Damon McCoy and Elissa M. Redmiles}, title = {Ethics and Efficacy of Unsolicited Anti-Trafficking {SMS} Outreach}, journal = {CoRR}, volume = {abs/2202.09527}, year = {2022}, url = {https://arxiv.org/abs/2202.09527}, eprinttype = {arXiv}, eprint = {2202.09527}, timestamp = {Tue, 01 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2202-09527.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2205-15943, author = {Cameron Ballard and Ian Goldstein and Pulak Mehta and Genesis Smothers and Kejsi Take and Victoria Zhong and Rachel Greenstadt and Tobias Lauinger and Damon McCoy}, title = {Conspiracy Brokers: Understanding the Monetization of YouTube Conspiracy Theories}, journal = {CoRR}, volume = {abs/2205.15943}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2205.15943}, doi = {10.48550/ARXIV.2205.15943}, eprinttype = {arXiv}, eprint = {2205.15943}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2205-15943.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/epjds/BracciNAMGTGB21, author = {Alberto Bracci and Matthieu Nadini and Maxwell Aliapoulios and Damon McCoy and Ian W. Gray and Alexander Teytelboym and Angela Gallo and Andrea Baronchelli}, title = {Dark Web Marketplaces and {COVID-19:} before the vaccine}, journal = {{EPJ} Data Sci.}, volume = {10}, number = {1}, pages = {6}, year = {2021}, url = {https://doi.org/10.1140/epjds/s13688-021-00259-w}, doi = {10.1140/EPJDS/S13688-021-00259-W}, timestamp = {Tue, 02 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/epjds/BracciNAMGTGB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pacmhci/DoerflerFCSBM21, author = {Periwinkle Doerfler and Andrea Forte and Emiliano De Cristofaro and Gianluca Stringhini and Jeremy Blackburn and Damon McCoy}, title = {"I'm a Professor, which isn't usually a dangerous job": Internet-facilitated Harassment and Its Impact on Researchers}, journal = {Proc. {ACM} Hum. Comput. Interact.}, volume = {5}, number = {{CSCW2}}, pages = {341:1--341:32}, year = {2021}, url = {https://doi.org/10.1145/3476082}, doi = {10.1145/3476082}, timestamp = {Wed, 09 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pacmhci/DoerflerFCSBM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/EdelsonNGGML21, author = {Laura Edelson and Minh{-}Kha Nguyen and Ian Goldstein and Oana Goga and Damon McCoy and Tobias Lauinger}, editor = {Dave Levin and Alan Mislove and Johanna Amann and Matthew Luckie}, title = {Understanding engagement with {U.S.} (mis)information news sources on Facebook}, booktitle = {{IMC} '21: {ACM} Internet Measurement Conference, Virtual Event, USA, November 2-4, 2021}, pages = {444--463}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3487552.3487859}, doi = {10.1145/3487552.3487859}, timestamp = {Thu, 04 Nov 2021 08:55:53 +0100}, biburl = {https://dblp.org/rec/conf/imc/EdelsonNGGML21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/AliapouliosTRBG21, author = {Maxwell Aliapoulios and Kejsi Take and Prashanth Ramakrishna and Daniel Borkan and Beth Goldberg and Jeffrey Sorensen and Anna Turner and Rachel Greenstadt and Tobias Lauinger and Damon McCoy}, editor = {Dave Levin and Alan Mislove and Johanna Amann and Matthew Luckie}, title = {A large-scale characterization of online incitements to harassment across platforms}, booktitle = {{IMC} '21: {ACM} Internet Measurement Conference, Virtual Event, USA, November 2-4, 2021}, pages = {621--638}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3487552.3487852}, doi = {10.1145/3487552.3487852}, timestamp = {Thu, 04 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imc/AliapouliosTRBG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ThomasABBBCDDKK21, author = {Kurt Thomas and Devdatta Akhawe and Michael D. Bailey and Dan Boneh and Elie Bursztein and Sunny Consolvo and Nicola Dell and Zakir Durumeric and Patrick Gage Kelley and Deepak Kumar and Damon McCoy and Sarah Meiklejohn and Thomas Ristenpart and Gianluca Stringhini}, title = {SoK: Hate, Harassment, and the Changing Landscape of Online Abuse}, booktitle = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco, CA, USA, 24-27 May 2021}, pages = {247--267}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SP40001.2021.00028}, doi = {10.1109/SP40001.2021.00028}, timestamp = {Thu, 26 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/ThomasABBBCDDKK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AliapouliosBBLM21, author = {Maxwell Aliapoulios and Cameron Ballard and Rasika Bhalerao and Tobias Lauinger and Damon McCoy}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Swiped: Analyzing Ground-truth Data of a Marketplace for Stolen Debit and Credit Cards}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {4151--4168}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/aliapoulios}, timestamp = {Mon, 20 Nov 2023 08:57:49 +0100}, biburl = {https://dblp.org/rec/conf/uss/AliapouliosBBLM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2102-05470, author = {Alberto Bracci and Matthieu Nadini and Maxwell Aliapoulios and Damon McCoy and Ian W. Gray and Alexander Teytelboym and Angela Gallo and Andrea Baronchelli}, title = {Dark Web Marketplaces and {COVID-19:} The vaccines}, journal = {CoRR}, volume = {abs/2102.05470}, year = {2021}, url = {https://arxiv.org/abs/2102.05470}, eprinttype = {arXiv}, eprint = {2102.05470}, timestamp = {Tue, 02 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2102-05470.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2104-11145, author = {Periwinkle Doerfler and Andrea Forte and Emiliano De Cristofaro and Gianluca Stringhini and Jeremy Blackburn and Damon McCoy}, title = {"I'm a Professor, which isn't usually a dangerous job": Internet-Facilitated Harassment and its Impact on Researchers}, journal = {CoRR}, volume = {abs/2104.11145}, year = {2021}, url = {https://arxiv.org/abs/2104.11145}, eprinttype = {arXiv}, eprint = {2104.11145}, timestamp = {Tue, 27 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2104-11145.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pacmhci/BelliniTMGMRD20, author = {Rosanna Bellini and Emily Tseng and Nora McDonald and Rachel Greenstadt and Damon McCoy and Thomas Ristenpart and Nicola Dell}, title = {"So-called privacy breeds evil": Narrative Justifications for Intimate Partner Surveillance in Online Forums}, journal = {Proc. {ACM} Hum. Comput. Interact.}, volume = {4}, number = {{CSCW3}}, pages = {1--27}, year = {2020}, url = {https://doi.org/10.1145/3432909}, doi = {10.1145/3432909}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pacmhci/BelliniTMGMRD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icwsm/BevenseeADBMB20, author = {Emmi Bevensee and Maxwell Aliapoulios and Quinn Dougherty and Jason Baumgartner and Damon McCoy and Jeremy Blackburn}, editor = {Stevie Chancellor and Kiran Garimella and Katrin Weller}, title = {{SMAT:} The Social Media Analysis Toolkit}, booktitle = {Workshop Proceedings of the 14th International {AAAI} Conference on Web and Social Media, {ICWSM} 2020 Workshops, Atlanta, Georgia, {USA} [virtual], June 8, 2020}, year = {2020}, url = {https://doi.org/10.36190/2020.18}, doi = {10.36190/2020.18}, timestamp = {Mon, 24 Oct 2022 16:56:08 +0200}, biburl = {https://dblp.org/rec/conf/icwsm/BevenseeADBMB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/FarooqiFLMSV20, author = {Shehroze Farooqi and {\'{A}}lvaro Feal and Tobias Lauinger and Damon McCoy and Zubair Shafiq and Narseo Vallina{-}Rodriguez}, title = {Understanding Incentivized Mobile App Installs on Google Play Store}, booktitle = {{IMC} '20: {ACM} Internet Measurement Conference, Virtual Event, USA, October 27-29, 2020}, pages = {696--709}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3419394.3423662}, doi = {10.1145/3419394.3423662}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imc/FarooqiFLMSV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/RoundyMDMNRT20, author = {Kevin A. Roundy and Paula Barmaimon Mendelberg and Nicola Dell and Damon McCoy and Daniel Nissani and Thomas Ristenpart and Acar Tamersoy}, title = {The Many Kinds of Creepware Used for Interpersonal Attacks}, booktitle = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco, CA, USA, May 18-21, 2020}, pages = {626--643}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SP40000.2020.00069}, doi = {10.1109/SP40000.2020.00069}, timestamp = {Thu, 21 Sep 2023 15:57:24 +0200}, biburl = {https://dblp.org/rec/conf/sp/RoundyMDMNRT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/EdelsonLM20, author = {Laura Edelson and Tobias Lauinger and Damon McCoy}, title = {A Security Analysis of the Facebook Ad Library}, booktitle = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco, CA, USA, May 18-21, 2020}, pages = {661--678}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SP40000.2020.00084}, doi = {10.1109/SP40000.2020.00084}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/EdelsonLM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/TsengBMDGMDR20, author = {Emily Tseng and Rosanna Bellini and Nora McDonald and Matan Danos and Rachel Greenstadt and Damon McCoy and Nicola Dell and Thomas Ristenpart}, editor = {Srdjan Capkun and Franziska Roesner}, title = {The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums}, booktitle = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14, 2020}, pages = {1893--1909}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/usenixsecurity20/presentation/tseng}, timestamp = {Fri, 29 Jan 2021 22:08:55 +0100}, biburl = {https://dblp.org/rec/conf/uss/TsengBMDGMDR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/WeerasingheFSMG20, author = {Janith Weerasinghe and Bailey Flanigan and Aviel J. Stein and Damon McCoy and Rachel Greenstadt}, editor = {Yennun Huang and Irwin King and Tie{-}Yan Liu and Maarten van Steen}, title = {The Pod People: Understanding Manipulation of Social Media Popularity via Reciprocity Abuse}, booktitle = {{WWW} '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020}, pages = {1874--1884}, publisher = {{ACM} / {IW3C2}}, year = {2020}, url = {https://doi.org/10.1145/3366423.3380256}, doi = {10.1145/3366423.3380256}, timestamp = {Fri, 25 Dec 2020 01:14:58 +0100}, biburl = {https://dblp.org/rec/conf/www/WeerasingheFSMG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/FarinholtRML20, author = {Brown Farinholt and Mohammad Rezaeirad and Damon McCoy and Kirill Levchenko}, editor = {Yennun Huang and Irwin King and Tie{-}Yan Liu and Maarten van Steen}, title = {Dark Matter: Uncovering the DarkComet {RAT} Ecosystem}, booktitle = {{WWW} '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020}, pages = {2109--2120}, publisher = {{ACM} / {IW3C2}}, year = {2020}, url = {https://doi.org/10.1145/3366423.3380277}, doi = {10.1145/3366423.3380277}, timestamp = {Wed, 06 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/www/FarinholtRML20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2002-12274, author = {Paz Grimberg and Tobias Lauinger and Damon McCoy}, title = {Empirical Analysis of Indirect Internal Conversions in Cryptocurrency Exchanges}, journal = {CoRR}, volume = {abs/2002.12274}, year = {2020}, url = {https://arxiv.org/abs/2002.12274}, eprinttype = {arXiv}, eprint = {2002.12274}, timestamp = {Tue, 03 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2002-12274.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-14341, author = {Emily Tseng and Rosanna Bellini and Nora McDonald and Matan Danos and Rachel Greenstadt and Damon McCoy and Nicola Dell and Thomas Ristenpart}, title = {The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums}, journal = {CoRR}, volume = {abs/2005.14341}, year = {2020}, url = {https://arxiv.org/abs/2005.14341}, eprinttype = {arXiv}, eprint = {2005.14341}, timestamp = {Wed, 03 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-14341.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2008-01585, author = {Alberto Bracci and Matthieu Nadini and Maxwell Aliapoulios and Damon McCoy and Ian W. Gray and Alexander Teytelboym and Angela Gallo and Andrea Baronchelli}, title = {The {COVID-19} online shadow economy}, journal = {CoRR}, volume = {abs/2008.01585}, year = {2020}, url = {https://arxiv.org/abs/2008.01585}, eprinttype = {arXiv}, eprint = {2008.01585}, timestamp = {Tue, 02 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2008-01585.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-01497, author = {Shehroze Farooqi and {\'{A}}lvaro Feal and Tobias Lauinger and Damon McCoy and Zubair Shafiq and Narseo Vallina{-}Rodriguez}, title = {Understanding Incentivized Mobile App Installs on Google Play Store}, journal = {CoRR}, volume = {abs/2010.01497}, year = {2020}, url = {https://arxiv.org/abs/2010.01497}, eprinttype = {arXiv}, eprint = {2010.01497}, timestamp = {Mon, 12 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-01497.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/BhaleraoASAM19, author = {Rasika Bhalerao and Maxwell Aliapoulios and Ilia Shumailov and Sadia Afroz and Damon McCoy}, title = {Mapping the Underground: Supervised Discovery of Cybercrime Supply Chains}, booktitle = {2019 {APWG} Symposium on Electronic Crime Research, eCrime 2019, Pittsburgh, PA, USA, November 13-15, 2019}, pages = {1--16}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/eCrime47957.2019.9037582}, doi = {10.1109/ECRIME47957.2019.9037582}, timestamp = {Wed, 28 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/BhaleraoASAM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/PandeyAM19, author = {Prakhar Pandey and Maxwell Aliapoulios and Damon McCoy}, title = {Iniquitous Cord-Cutting: An Analysis of Infringing {IPTV} Services}, booktitle = {2019 {IEEE} European Symposium on Security and Privacy Workshops, EuroS{\&}P Workshops 2019, Stockholm, Sweden, June 17-19, 2019}, pages = {423--432}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EuroSPW.2019.00054}, doi = {10.1109/EUROSPW.2019.00054}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/PandeyAM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/HavronF0MDR19, author = {Sam Havron and Diana Freed and Rahul Chatterjee and Damon McCoy and Nicola Dell and Thomas Ristenpart}, editor = {Nadia Heninger and Patrick Traynor}, title = {Clinical Computer Security for Victims of Intimate Partner Violence}, booktitle = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara, CA, USA, August 14-16, 2019}, pages = {105--122}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/usenixsecurity19/presentation/havron}, timestamp = {Mon, 01 Feb 2021 08:43:12 +0100}, biburl = {https://dblp.org/rec/conf/uss/HavronF0MDR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LiDPMVS19, author = {Vector Guo Li and Matthew Dunn and Paul Pearce and Damon McCoy and Geoffrey M. Voelker and Stefan Savage}, editor = {Nadia Heninger and Patrick Traynor}, title = {Reading the Tea leaves: {A} Comparative Analysis of Threat Intelligence}, booktitle = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara, CA, USA, August 14-16, 2019}, pages = {851--867}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/usenixsecurity19/presentation/li}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/LiDPMVS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/NoroozianKVGAME19, author = {Arman Noroozian and Jan Koenders and Eelco van Veldhuizen and Carlos Hernandez Ga{\~{n}}{\'{a}}n and Sumayah A. Alrwais and Damon McCoy and Michel van Eeten}, editor = {Nadia Heninger and Patrick Traynor}, title = {Platforms in Everything: Analyzing Ground-Truth Data on the Anatomy and Economics of Bullet-Proof Hosting}, booktitle = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara, CA, USA, August 14-16, 2019}, pages = {1341--1356}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/usenixsecurity19/presentation/noroozian}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/NoroozianKVGAME19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/DoerflerTMRJMM19, author = {Periwinkle Doerfler and Kurt Thomas and Maija Marincenko and Juri Ranieri and Yu Jiang and Angelika Moscicki and Damon McCoy}, editor = {Ling Liu and Ryen W. White and Amin Mantrach and Fabrizio Silvestri and Julian J. McAuley and Ricardo Baeza{-}Yates and Leila Zia}, title = {Evaluating Login Challenges as aDefense Against Account Takeover}, booktitle = {The World Wide Web Conference, {WWW} 2019, San Francisco, CA, USA, May 13-17, 2019}, pages = {372--382}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3308558.3313481}, doi = {10.1145/3308558.3313481}, timestamp = {Sun, 22 Sep 2019 18:12:47 +0200}, biburl = {https://dblp.org/rec/conf/www/DoerflerTMRJMM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1902-04385, author = {Laura Edelson and Shikhar Sakhuja and Ratan Dey and Damon McCoy}, title = {An Analysis of United States Online Political Advertising Transparency}, journal = {CoRR}, volume = {abs/1902.04385}, year = {2019}, url = {http://arxiv.org/abs/1902.04385}, eprinttype = {arXiv}, eprint = {1902.04385}, timestamp = {Tue, 21 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1902-04385.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/GreenstadtMT18, author = {Rachel Greenstadt and Damon McCoy and Carmela Troncoso}, title = {Editors' Introduction}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2018}, number = {1}, pages = {1--4}, year = {2018}, url = {https://doi.org/10.1515/popets-2018-0001}, doi = {10.1515/POPETS-2018-0001}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/GreenstadtMT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/GreenstadtMT18a, author = {Rachel Greenstadt and Damon McCoy and Carmela Troncoso}, title = {Editors' Introduction}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2018}, number = {2}, pages = {1--3}, year = {2018}, url = {https://doi.org/10.1515/popets-2018-0009}, doi = {10.1515/POPETS-2018-0009}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/GreenstadtMT18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/GreenstadtMT18b, author = {Rachel Greenstadt and Damon McCoy and Carmela Troncoso}, title = {Editors' Introduction}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2018}, number = {3}, pages = {1--4}, year = {2018}, url = {https://doi.org/10.1515/popets-2018-0017}, doi = {10.1515/POPETS-2018-0017}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/GreenstadtMT18b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/GreenstadtMT18c, author = {Rachel Greenstadt and Damon McCoy and Carmela Troncoso}, title = {Editors' Introduction}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2018}, number = {4}, pages = {1--4}, year = {2018}, url = {https://doi.org/10.1515/popets-2018-0028}, doi = {10.1515/POPETS-2018-0028}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/GreenstadtMT18c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GallagherPDMM18, author = {Kevin Gallagher and Sameer Patil and Brendan Dolan{-}Gavitt and Damon McCoy and Nasir D. Memon}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {Peeling the Onion's User Experience Layer: Examining Naturalistic Use of the Tor Browser}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {1290--1305}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3243803}, doi = {10.1145/3243734.3243803}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GallagherPDMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/TianGWM18, author = {Hongwei Tian and Stephen M. Gaffigan and D. Sean West and Damon McCoy}, title = {Bullet-proof payment processors}, booktitle = {2018 {APWG} Symposium on Electronic Crime Research, eCrime 2018, San Diego, CA, USA, May 15-17, 2018}, pages = {1--11}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ECRIME.2018.8376208}, doi = {10.1109/ECRIME.2018.8376208}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/TianGWM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ChatterjeeDOHPF18, author = {Rahul Chatterjee and Periwinkle Doerfler and Hadas Orgad and Sam Havron and Jackeline Palmer and Diana Freed and Karen Levy and Nicola Dell and Damon McCoy and Thomas Ristenpart}, title = {The Spyware Used in Intimate Partner Violence}, booktitle = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings, 21-23 May 2018, San Francisco, California, {USA}}, pages = {441--458}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SP.2018.00061}, doi = {10.1109/SP.2018.00061}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/ChatterjeeDOHPF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/HuangALIBMLLSM18, author = {Danny Yuxing Huang and Maxwell Matthaios Aliapoulios and Vector Guo Li and Luca Invernizzi and Elie Bursztein and Kylie McRoberts and Jonathan Levin and Kirill Levchenko and Alex C. Snoeren and Damon McCoy}, title = {Tracking Ransomware End-to-end}, booktitle = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings, 21-23 May 2018, San Francisco, California, {USA}}, pages = {618--631}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SP.2018.00047}, doi = {10.1109/SP.2018.00047}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/HuangALIBMLLSM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/RezaeiradFDPLM18, author = {Mohammad Rezaeirad and Brown Farinholt and Hitesh Dharmdasani and Paul Pearce and Kirill Levchenko and Damon McCoy}, editor = {William Enck and Adrienne Porter Felt}, title = {Schr{\"{o}}dinger's {RAT:} Profiling the Stakeholders in the Remote Access Trojan Ecosystem}, booktitle = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore, MD, USA, August 15-17, 2018}, pages = {1043--1060}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/usenixsecurity18/presentation/rezaeirad}, timestamp = {Mon, 01 Feb 2021 08:43:20 +0100}, biburl = {https://dblp.org/rec/conf/uss/RezaeiradFDPLM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1805-04494, author = {Rebekah Overdorf and Carmela Troncoso and Rachel Greenstadt and Damon McCoy}, title = {Under the Underground: Predicting Private Interactions in Underground Forums}, journal = {CoRR}, volume = {abs/1805.04494}, year = {2018}, url = {http://arxiv.org/abs/1805.04494}, eprinttype = {arXiv}, eprint = {1805.04494}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1805-04494.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1812-00381, author = {Rasika Bhalerao and Maxwell Aliapoulios and Ilia Shumailov and Sadia Afroz and Damon McCoy}, title = {Towards Automatic Discovery of Cybercrime Supply Chains}, journal = {CoRR}, volume = {abs/1812.00381}, year = {2018}, url = {http://arxiv.org/abs/1812.00381}, eprinttype = {arXiv}, eprint = {1812.00381}, timestamp = {Sun, 19 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1812-00381.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/DiazGM17, author = {Claudia D{\'{\i}}az and Rachel Greenstadt and Damon McCoy}, title = {Editors' Introduction}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2017}, number = {1}, pages = {1--3}, year = {2017}, url = {https://doi.org/10.1515/popets-2017-0001}, doi = {10.1515/POPETS-2017-0001}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/DiazGM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/DiazGM17a, author = {Claudia D{\'{\i}}az and Rachel Greenstadt and Damon McCoy}, title = {Editors' Introduction}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2017}, number = {2}, pages = {1--3}, year = {2017}, url = {https://doi.org/10.1515/popets-2017-0012}, doi = {10.1515/POPETS-2017-0012}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/DiazGM17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/DiazGM17b, author = {Claudia D{\'{\i}}az and Rachel Greenstadt and Damon McCoy}, title = {Editors' Introduction}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2017}, number = {3}, pages = {1}, year = {2017}, url = {https://doi.org/10.1515/popets-2017-0024}, doi = {10.1515/POPETS-2017-0024}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/DiazGM17b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/DiazGM17c, author = {Claudia D{\'{\i}}az and Rachel Greenstadt and Damon McCoy}, title = {Editors' Introduction}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2017}, number = {4}, pages = {1--4}, year = {2017}, url = {https://doi.org/10.1515/popets-2017-0036}, doi = {10.1515/POPETS-2017-0036}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/DiazGM17c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/emnlp/DurrettKBPAMLP17, author = {Greg Durrett and Jonathan K. Kummerfeld and Taylor Berg{-}Kirkpatrick and Rebecca S. Portnoff and Sadia Afroz and Damon McCoy and Kirill Levchenko and Vern Paxson}, editor = {Martha Palmer and Rebecca Hwa and Sebastian Riedel}, title = {Identifying Products in Online Cybercrime Marketplaces: {A} Dataset for Fine-grained Domain Adaptation}, booktitle = {Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing, {EMNLP} 2017, Copenhagen, Denmark, September 9-11, 2017}, pages = {2598--2607}, publisher = {Association for Computational Linguistics}, year = {2017}, url = {https://doi.org/10.18653/v1/d17-1275}, doi = {10.18653/V1/D17-1275}, timestamp = {Wed, 28 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/emnlp/DurrettKBPAMLP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/SnyderDKM17, author = {Peter Snyder and Periwinkle Doerfler and Chris Kanich and Damon McCoy}, editor = {Steve Uhlig and Olaf Maennel}, title = {Fifteen minutes of unwanted fame: detecting and characterizing doxing}, booktitle = {Proceedings of the 2017 Internet Measurement Conference, {IMC} 2017, London, United Kingdom, November 1-3, 2017}, pages = {432--444}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3131365.3131385}, doi = {10.1145/3131365.3131385}, timestamp = {Fri, 25 Oct 2019 09:51:18 +0200}, biburl = {https://dblp.org/rec/conf/imc/SnyderDKM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kdd/PortnoffHDAM17, author = {Rebecca S. Portnoff and Danny Yuxing Huang and Periwinkle Doerfler and Sadia Afroz and Damon McCoy}, title = {Backpage and Bitcoin: Uncovering Human Traffickers}, booktitle = {Proceedings of the 23rd {ACM} {SIGKDD} International Conference on Knowledge Discovery and Data Mining, Halifax, NS, Canada, August 13 - 17, 2017}, pages = {1595--1604}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3097983.3098082}, doi = {10.1145/3097983.3098082}, timestamp = {Wed, 28 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/kdd/PortnoffHDAM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/KruppKRM017, author = {Johannes Krupp and Mohammad Karami and Christian Rossow and Damon McCoy and Michael Backes}, editor = {Marc Dacier and Michael D. Bailey and Michalis Polychronakis and Manos Antonakakis}, title = {Linking Amplification DDoS Attacks to Booter Services}, booktitle = {Research in Attacks, Intrusions, and Defenses - 20th International Symposium, {RAID} 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10453}, pages = {427--449}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66332-6\_19}, doi = {10.1007/978-3-319-66332-6\_19}, timestamp = {Mon, 20 Nov 2023 09:00:29 +0100}, biburl = {https://dblp.org/rec/conf/raid/KruppKRM017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/FarinholtRPDYBM17, author = {Brown Farinholt and Mohammad Rezaeirad and Paul Pearce and Hitesh Dharmdasani and Haikuo Yin and Stevens Le Blond and Damon McCoy and Kirill Levchenko}, title = {To Catch a Ratter: Monitoring the Behavior of Amateur DarkComet {RAT} Operators in the Wild}, booktitle = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose, CA, USA, May 22-26, 2017}, pages = {770--787}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SP.2017.48}, doi = {10.1109/SP.2017.48}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/FarinholtRPDYBM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/AlrwaisLMWWQBM17, author = {Sumayah A. Alrwais and Xiaojing Liao and Xianghang Mi and Peng Wang and Xiaofeng Wang and Feng Qian and Raheem A. Beyah and Damon McCoy}, title = {Under the Shadow of Sunshine: Understanding and Detecting Bulletproof Hosting on Legitimate Service Provider Networks}, booktitle = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose, CA, USA, May 22-26, 2017}, pages = {805--823}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SP.2017.32}, doi = {10.1109/SP.2017.32}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/AlrwaisLMWWQBM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SiadatiPSM17, author = {Hossein Siadati and Sean Palka and Avi Siegel and Damon McCoy}, editor = {Jos{\'{e}} M. Fernandez and Mathias Payer}, title = {Measuring the Effectiveness of Embedded Phishing Exercises}, booktitle = {10th {USENIX} Workshop on Cyber Security Experimentation and Test, {CSET} 2017, Vancouver, BC, Canada, August 14, 2017}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/cset17/workshop-program/presentation/siadatii}, timestamp = {Mon, 01 Feb 2021 08:43:03 +0100}, biburl = {https://dblp.org/rec/conf/uss/SiadatiPSM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/PortnoffADKBMLP17, author = {Rebecca S. Portnoff and Sadia Afroz and Greg Durrett and Jonathan K. Kummerfeld and Taylor Berg{-}Kirkpatrick and Damon McCoy and Kirill Levchenko and Vern Paxson}, editor = {Rick Barrett and Rick Cummings and Eugene Agichtein and Evgeniy Gabrilovich}, title = {Tools for Automated Analysis of Cybercriminal Markets}, booktitle = {Proceedings of the 26th International Conference on World Wide Web, {WWW} 2017, Perth, Australia, April 3-7, 2017}, pages = {657--666}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3038912.3052600}, doi = {10.1145/3038912.3052600}, timestamp = {Wed, 28 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/PortnoffADKBMLP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1708-09609, author = {Greg Durrett and Jonathan K. Kummerfeld and Taylor Berg{-}Kirkpatrick and Rebecca S. Portnoff and Sadia Afroz and Damon McCoy and Kirill Levchenko and Vern Paxson}, title = {Identifying Products in Online Cybercrime Marketplaces: {A} Dataset for Fine-grained Domain Adaptation}, journal = {CoRR}, volume = {abs/1708.09609}, year = {2017}, url = {http://arxiv.org/abs/1708.09609}, eprinttype = {arXiv}, eprint = {1708.09609}, timestamp = {Wed, 28 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1708-09609.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/MeiklejohnPJLMV16, author = {Sarah Meiklejohn and Marjori Pomarole and Grant Jordan and Kirill Levchenko and Damon McCoy and Geoffrey M. Voelker and Stefan Savage}, title = {A fistful of Bitcoins: characterizing payments among men with no names}, journal = {Commun. {ACM}}, volume = {59}, number = {4}, pages = {86--93}, year = {2016}, url = {https://doi.org/10.1145/2896384}, doi = {10.1145/2896384}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/MeiklejohnPJLMV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/SundaresanMAP16, author = {Srikanth Sundaresan and Damon McCoy and Sadia Afroz and Vern Paxson}, title = {Profiling underground merchants based on network behavior}, booktitle = {2016 {APWG} Symposium on Electronic Crime Research, eCrime 2016, Toronto, ON, Canada, June 1-3, 2016}, pages = {62--70}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ECRIME.2016.7487943}, doi = {10.1109/ECRIME.2016.7487943}, timestamp = {Wed, 28 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/SundaresanMAP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/BaqerHMW16, author = {Khaled Baqer and Danny Yuxing Huang and Damon McCoy and Nicholas Weaver}, editor = {Jeremy Clark and Sarah Meiklejohn and Peter Y. A. Ryan and Dan S. Wallach and Michael Brenner and Kurt Rohloff}, title = {Stressing Out: Bitcoin "Stress Testing"}, booktitle = {Financial Cryptography and Data Security - {FC} 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9604}, pages = {3--18}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53357-4\_1}, doi = {10.1007/978-3-662-53357-4\_1}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/BaqerHMW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ParkMS16, author = {Youngsam Park and Damon McCoy and Elaine Shi}, editor = {Jens Grossklags and Bart Preneel}, title = {Understanding Craigslist Rental Scams}, booktitle = {Financial Cryptography and Data Security - 20th International Conference, {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9603}, pages = {3--21}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-54970-4\_1}, doi = {10.1007/978-3-662-54970-4\_1}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/ParkMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/KhattakFAJSMPM16, author = {Sheharbano Khattak and David Fifield and Sadia Afroz and Mobin Javed and Srikanth Sundaresan and Damon McCoy and Vern Paxson and Steven J. Murdoch}, title = {Do You See What {I} See? Differential Treatment of Anonymous Users}, booktitle = {23rd Annual Network and Distributed System Security Symposium, {NDSS} 2016, San Diego, California, USA, February 21-24, 2016}, publisher = {The Internet Society}, year = {2016}, url = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/do-you-see-what-i-see-differential-treatment-anonymous-users.pdf}, timestamp = {Wed, 28 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/KhattakFAJSMPM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ThomasCRPPDSTTC16, author = {Kurt Thomas and Juan A. Elices Crespo and Ryan Rasti and Jean Michel Picod and Cait Phillips and Marc{-}Andr{\'{e}} Decoste and Chris Sharp and Fabio Tirelo and Ali Tofigh and Marc{-}Antoine Courteau and Lucas Ballard and Robert Shield and Nav Jagpal and Moheeb Abu Rajab and Panayiotis Mavrommatis and Niels Provos and Elie Bursztein and Damon McCoy}, editor = {Thorsten Holz and Stefan Savage}, title = {Investigating Commercial Pay-Per-Install and the Distribution of Unwanted Software}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {721--739}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/thomas}, timestamp = {Mon, 01 Feb 2021 08:43:18 +0100}, biburl = {https://dblp.org/rec/conf/uss/ThomasCRPPDSTTC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LiDCKBMSP16, author = {Frank Li and Zakir Durumeric and Jakub Czyz and Mohammad Karami and Michael D. Bailey and Damon McCoy and Stefan Savage and Vern Paxson}, editor = {Thorsten Holz and Stefan Savage}, title = {You've Got Vulnerability: Exploring Effective Vulnerability Notifications}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {1033--1050}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/li}, timestamp = {Thu, 26 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/LiDCKBMSP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/woot/MazloomRHM16, author = {Sahar Mazloom and Mohammad Rezaeirad and Aaron Hunter and Damon McCoy}, editor = {Natalie Silvanovich and Patrick Traynor}, title = {A Security Analysis of an In-Vehicle Infotainment and App Platform}, booktitle = {10th {USENIX} Workshop on Offensive Technologies, {WOOT} 16, Austin, TX, USA, August 8-9, 2016}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/woot16/workshop-program/presentation/mazloom}, timestamp = {Fri, 15 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/woot/MazloomRHM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/LiaoLMSHB16, author = {Xiaojing Liao and Chang Liu and Damon McCoy and Elaine Shi and Shuang Hao and Raheem A. Beyah}, editor = {Jacqueline Bourdeau and Jim Hendler and Roger Nkambou and Ian Horrocks and Ben Y. Zhao}, title = {Characterizing Long-tail {SEO} Spam on Cloud Web Hosting Services}, booktitle = {Proceedings of the 25th International Conference on World Wide Web, {WWW} 2016, Montreal, Canada, April 11 - 15, 2016}, pages = {321--332}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2872427.2883008}, doi = {10.1145/2872427.2883008}, timestamp = {Tue, 12 Apr 2022 14:46:29 +0200}, biburl = {https://dblp.org/rec/conf/www/LiaoLMSHB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/KaramiPM16, author = {Mohammad Karami and Youngsam Park and Damon McCoy}, editor = {Jacqueline Bourdeau and Jim Hendler and Roger Nkambou and Ian Horrocks and Ben Y. Zhao}, title = {Stress Testing the Booters: Understanding and Undermining the Business of DDoS Services}, booktitle = {Proceedings of the 25th International Conference on World Wide Web, {WWW} 2016, Montreal, Canada, April 11 - 15, 2016}, pages = {1033--1043}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2872427.2883004}, doi = {10.1145/2872427.2883004}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/KaramiPM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/16/McCoyPSJ16, author = {Damon McCoy and Youngsam Park and Elaine Shi and Markus Jakobsson}, editor = {Markus Jakobsson}, title = {Identifying Scams and Trends}, booktitle = {Understanding Social Engineering Based Scams}, pages = {7--19}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-1-4939-6457-4\_2}, doi = {10.1007/978-1-4939-6457-4\_2}, timestamp = {Tue, 16 May 2017 14:01:45 +0200}, biburl = {https://dblp.org/rec/books/sp/16/McCoyPSJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/16/McCoyPSJ16a, author = {Damon McCoy and Youngsam Park and Elaine Shi and Markus Jakobsson}, editor = {Markus Jakobsson}, title = {Case Study: Sales Scams}, booktitle = {Understanding Social Engineering Based Scams}, pages = {77--87}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-1-4939-6457-4\_8}, doi = {10.1007/978-1-4939-6457-4\_8}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/16/McCoyPSJ16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/16/McCoyPSJ16b, author = {Damon McCoy and Youngsam Park and Elaine Shi and Markus Jakobsson}, editor = {Markus Jakobsson}, title = {Case Study: Rental Scams}, booktitle = {Understanding Social Engineering Based Scams}, pages = {89--102}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-1-4939-6457-4\_9}, doi = {10.1007/978-1-4939-6457-4\_9}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/16/McCoyPSJ16b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/ClarkSMK15, author = {Jason W. Clark and Peter Snyder and Damon McCoy and Chris Kanich}, editor = {Bo Begole and Jinwoo Kim and Kori Inkpen and Woontack Woo}, title = {"I Saw Images {I} Didn't Even Know {I} Had": Understanding User Perceptions of Cloud Storage Privacy}, booktitle = {Proceedings of the 33rd Annual {ACM} Conference on Human Factors in Computing Systems, {CHI} 2015, Seoul, Republic of Korea, April 18-23, 2015}, pages = {1641--1644}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2702123.2702535}, doi = {10.1145/2702123.2702535}, timestamp = {Fri, 12 Mar 2021 15:27:48 +0100}, biburl = {https://dblp.org/rec/conf/chi/ClarkSMK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icst/PalkaM15, author = {Sean Palka and Damon McCoy}, title = {Dynamic phishing content using generative grammars}, booktitle = {Eighth {IEEE} International Conference on Software Testing, Verification and Validation, {ICST} 2015 Workshops, Graz, Austria, April 13-17, 2015}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICSTW.2015.7107458}, doi = {10.1109/ICSTW.2015.7107458}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icst/PalkaM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ThomasBGHJKMNPP15, author = {Kurt Thomas and Elie Bursztein and Chris Grier and Grant Ho and Nav Jagpal and Alexandros Kapravelos and Damon McCoy and Antonio Nappa and Vern Paxson and Paul Pearce and Niels Provos and Moheeb Abu Rajab}, title = {Ad Injection at Scale: Assessing Deceptive Advertisement Modifications}, booktitle = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose, CA, USA, May 17-21, 2015}, pages = {151--167}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SP.2015.17}, doi = {10.1109/SP.2015.17}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/ThomasBGHJKMNPP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/weis/ThomasHWBGHKMSV15, author = {Kurt Thomas and Danny Yuxing Huang and David Y. Wang and Elie Bursztein and Chris Grier and Tom Holt and Christopher Kruegel and Damon McCoy and Stefan Savage and Giovanni Vigna}, title = {Framing Dependencies Introduced by Underground Commoditization}, booktitle = {14th Annual Workshop on the Economics of Information Security, {WEIS} 2015, Delft, The Netherlands, 22-23 June, 2015}, year = {2015}, url = {http://www.econinfosec.org/archive/weis2015/papers/WEIS\_2015\_thomas.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/weis/ThomasHWBGHKMSV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/woot/PalkaM15, author = {Sean Palka and Damon McCoy}, editor = {Aur{\'{e}}lien Francillon and Thomas Ptacek}, title = {Fuzzing E-mail Filters with Generative Grammars and N-Gram Analysis}, booktitle = {9th {USENIX} Workshop on Offensive Technologies, {WOOT} '15, Washington, DC, USA, August 10-11, 2015}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/woot15/workshop-program/presentation/palka}, timestamp = {Mon, 01 Feb 2021 08:41:51 +0100}, biburl = {https://dblp.org/rec/conf/woot/PalkaM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KaramiPM15, author = {Mohammad Karami and Youngsam Park and Damon McCoy}, title = {Stress Testing the Booters: Understanding and Undermining the Business of DDoS Services}, journal = {CoRR}, volume = {abs/1508.03410}, year = {2015}, url = {http://arxiv.org/abs/1508.03410}, eprinttype = {arXiv}, eprint = {1508.03410}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KaramiPM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PearceDGLGMPSV14, author = {Paul Pearce and Vacha Dave and Chris Grier and Kirill Levchenko and Saikat Guha and Damon McCoy and Vern Paxson and Stefan Savage and Geoffrey M. Voelker}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Characterizing Large-Scale Click Fraud in ZeroAccess}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {141--152}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660369}, doi = {10.1145/2660267.2660369}, timestamp = {Tue, 07 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/PearceDGLGMPSV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ThomasIBPGM14, author = {Kurt Thomas and Dmytro Iatskiv and Elie Bursztein and Tadek Pietraszek and Chris Grier and Damon McCoy}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Dialing Back Abuse on Phone Verified Accounts}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {465--476}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660321}, doi = {10.1145/2660267.2660321}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ThomasIBPGM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/JonesM14, author = {Jackie Jones and Damon McCoy}, title = {The check is in the mail: Monetization of Craigslist buyer scams}, booktitle = {2014 {APWG} Symposium on Electronic Crime Research, eCrime 2014, Birmingham, AL, USA, September 23-25, 2014}, pages = {25--35}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ECRIME.2014.6963162}, doi = {10.1109/ECRIME.2014.6963162}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/JonesM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/WangDKSMSV14, author = {David Y. Wang and Matthew F. Der and Mohammad Karami and Lawrence K. Saul and Damon McCoy and Stefan Savage and Geoffrey M. Voelker}, editor = {Carey Williamson and Aditya Akella and Nina Taft}, title = {Search + Seizure: The Effectiveness of Interventions on {SEO} Campaigns}, booktitle = {Proceedings of the 2014 Internet Measurement Conference, {IMC} 2014, Vancouver, BC, Canada, November 5-7, 2014}, pages = {359--372}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2663716.2663738}, doi = {10.1145/2663716.2663738}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imc/WangDKSMSV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/HuangDMDGMSWSL14, author = {Danny Yuxing Huang and Hitesh Dharmdasani and Sarah Meiklejohn and Vacha Dave and Chris Grier and Damon McCoy and Stefan Savage and Nicholas Weaver and Alex C. Snoeren and Kirill Levchenko}, title = {Botcoin: Monetizing Stolen Cycles}, booktitle = {21st Annual Network and Distributed System Security Symposium, {NDSS} 2014, San Diego, California, USA, February 23-26, 2014}, publisher = {The Internet Society}, year = {2014}, url = {https://www.ndss-symposium.org/ndss2014/botcoin-monetizing-stolen-cycles}, timestamp = {Mon, 01 Feb 2021 08:42:18 +0100}, biburl = {https://dblp.org/rec/conf/ndss/HuangDMDGMSWSL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ParkJMSJ14, author = {Youngsam Park and Jackie Jones and Damon McCoy and Elaine Shi and Markus Jakobsson}, title = {Scambaiter: Understanding Targeted Nigerian Scams on Craigslist}, booktitle = {21st Annual Network and Distributed System Security Symposium, {NDSS} 2014, San Diego, California, USA, February 23-26, 2014}, publisher = {The Internet Society}, year = {2014}, url = {https://www.ndss-symposium.org/ndss2014/scambaiter-understanding-targeted-nigerian-scams-craigslist}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/ParkJMSJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/SarvariAMM14, author = {Hamed Sarvari and Ehab Atif Abozinadah and Alex Mbaziira and Damon McCoy}, title = {Constructing and Analyzing Criminal Networks}, booktitle = {35. {IEEE} Security and Privacy Workshops, {SPW} 2014, San Jose, CA, USA, May 17-18, 2014}, pages = {84--91}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/SPW.2014.22}, doi = {10.1109/SPW.2014.22}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/SarvariAMM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/AfrozISGM14, author = {Sadia Afroz and Aylin Caliskan Islam and Ariel Stolerman and Rachel Greenstadt and Damon McCoy}, title = {Doppelg{\"{a}}nger Finder: Taking Stylometry to the Underground}, booktitle = {2014 {IEEE} Symposium on Security and Privacy, {SP} 2014, Berkeley, CA, USA, May 18-21, 2014}, pages = {212--226}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/SP.2014.21}, doi = {10.1109/SP.2014.21}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/AfrozISGM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/KaramiM13, author = {Mohammad Karami and Damon McCoy}, title = {Rent to Pwn: Analyzing Commodity Booter DDoS Services}, journal = {login Usenix Mag.}, volume = {38}, number = {6}, year = {2013}, url = {https://www.usenix.org/publications/login/december-2013-volume-38-number-6/rent-pwn-analyzing-commodity-booter-ddos}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/KaramiM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/MeiklejohnPJLMV13, author = {Sarah Meiklejohn and Marjori Pomarole and Grant Jordan and Kirill Levchenko and Damon McCoy and Geoffrey M. Voelker and Stefan Savage}, title = {A Fistful of Bitcoins: Characterizing Payments Among Men with No Names}, journal = {login Usenix Mag.}, volume = {38}, number = {6}, year = {2013}, url = {https://www.usenix.org/publications/login/december-2013-volume-38-number-6/fistful-bitcoins-characterizing-payments-among}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/MeiklejohnPJLMV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/AfrozGMG13, author = {Sadia Afroz and Vaibhav Garg and Damon McCoy and Rachel Greenstadt}, title = {Honor among thieves: {A} common's analysis of cybercrime economies}, booktitle = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco, CA, USA, September 17-18, 2013}, pages = {1--11}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/eCRS.2013.6805778}, doi = {10.1109/ECRS.2013.6805778}, timestamp = {Wed, 28 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/AfrozGMG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/KaramiGM13, author = {Mohammad Karami and Shiva Ghaemi and Damon McCoy}, title = {Folex: An analysis of an herbal and counterfeit luxury goods affiliate program}, booktitle = {2013 {APWG} eCrime Researchers Summit, eCrime 2013, San Francisco, CA, USA, September 17-18, 2013}, pages = {1--9}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/eCRS.2013.6805782}, doi = {10.1109/ECRS.2013.6805782}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/KaramiGM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/MeiklejohnPJLMVS13, author = {Sarah Meiklejohn and Marjori Pomarole and Grant Jordan and Kirill Levchenko and Damon McCoy and Geoffrey M. Voelker and Stefan Savage}, editor = {Konstantina Papagiannaki and P. Krishna Gummadi and Craig Partridge}, title = {A fistful of bitcoins: characterizing payments among men with no names}, booktitle = {Proceedings of the 2013 Internet Measurement Conference, {IMC} 2013, Barcelona, Spain, October 23-25, 2013}, pages = {127--140}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2504730.2504747}, doi = {10.1145/2504730.2504747}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imc/MeiklejohnPJLMVS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/leet/ClarkM13, author = {Jason W. Clark and Damon McCoy}, editor = {Vern Paxson}, title = {There Are No Free iPads: An Analysis of Survey Scams as a Business}, booktitle = {6th {USENIX} Workshop on Large-Scale Exploits and Emergent Threats, {LEET} '13, Washington, D.C., USA, August 12, 2013}, publisher = {{USENIX} Association}, year = {2013}, url = {https://www.usenix.org/conference/leet13/workshop-program/presentation/clark}, timestamp = {Mon, 01 Feb 2021 08:42:30 +0100}, biburl = {https://dblp.org/rec/conf/leet/ClarkM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/leet/KaramiM13, author = {Mohammad Karami and Damon McCoy}, editor = {Vern Paxson}, title = {Understanding the Emerging Threat of DDoS-as-a-Service}, booktitle = {6th {USENIX} Workshop on Large-Scale Exploits and Emergent Threats, {LEET} '13, Washington, D.C., USA, August 12, 2013}, publisher = {{USENIX} Association}, year = {2013}, url = {https://www.usenix.org/conference/leet13/workshop-program/presentation/karami}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/leet/KaramiM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/EverettM13, author = {Christopher E. Everett and Damon McCoy}, editor = {Chris Kanich and Micah Sherr}, title = {{OCTANE} (Open Car Testbed and Network Experiments): Bringing Cyber-Physical Security Research to Researchers and Students}, booktitle = {6th Workshop on Cyber Security Experimentation and Test, {CSET} '13, Washington, D.C., USA, August 12, 2013}, publisher = {{USENIX} Association}, year = {2013}, url = {https://www.usenix.org/conference/cset13/workshop-program/presentation/everett}, timestamp = {Mon, 01 Feb 2021 08:43:03 +0100}, biburl = {https://dblp.org/rec/conf/uss/EverettM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ThomasMGKP13, author = {Kurt Thomas and Damon McCoy and Chris Grier and Alek Kolcz and Vern Paxson}, editor = {Samuel T. King}, title = {Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse}, booktitle = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC, USA, August 14-16, 2013}, pages = {195--210}, publisher = {{USENIX} Association}, year = {2013}, url = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/paper/thomas}, timestamp = {Mon, 01 Feb 2021 08:42:56 +0100}, biburl = {https://dblp.org/rec/conf/uss/ThomasMGKP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GrierBCCDLMMNPPRRRTPSV12, author = {Chris Grier and Lucas Ballard and Juan Caballero and Neha Chachra and Christian J. Dietrich and Kirill Levchenko and Panayiotis Mavrommatis and Damon McCoy and Antonio Nappa and Andreas Pitsillidis and Niels Provos and M. Zubair Rafique and Moheeb Abu Rajab and Christian Rossow and Kurt Thomas and Vern Paxson and Stefan Savage and Geoffrey M. Voelker}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Manufacturing compromise: the emergence of exploit-as-a-service}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {821--832}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382283}, doi = {10.1145/2382196.2382283}, timestamp = {Tue, 12 Apr 2022 13:28:49 +0200}, biburl = {https://dblp.org/rec/conf/ccs/GrierBCCDLMMNPPRRRTPSV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/McCoyDKVS12, author = {Damon McCoy and Hitesh Dharmdasani and Christian Kreibich and Geoffrey M. Voelker and Stefan Savage}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Priceless: the role of payments in abuse-advertised goods}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {845--856}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382285}, doi = {10.1145/2382196.2382285}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/McCoyDKVS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/McCoyPJWKKVSL12, author = {Damon McCoy and Andreas Pitsillidis and Grant Jordan and Nicholas Weaver and Christian Kreibich and Brian Krebs and Geoffrey M. Voelker and Stefan Savage and Kirill Levchenko}, editor = {Tadayoshi Kohno}, title = {PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs}, booktitle = {Proceedings of the 21th {USENIX} Security Symposium, Bellevue, WA, USA, August 8-10, 2012}, pages = {1--16}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/usenixsecurity12/technical-sessions/presentation/mccoy}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/McCoyPJWKKVSL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/McCoyML11, author = {Damon McCoy and Jose Andre Morales and Kirill Levchenko}, editor = {George Danezis}, title = {Proximax: Measurement-Driven Proxy Dissemination (Short Paper)}, booktitle = {Financial Cryptography and Data Security - 15th International Conference, {FC} 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7035}, pages = {260--267}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27576-0\_21}, doi = {10.1007/978-3-642-27576-0\_21}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/McCoyML11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/MotoyamaMLSV11, author = {Marti Motoyama and Damon McCoy and Kirill Levchenko and Stefan Savage and Geoffrey M. Voelker}, editor = {Patrick Thiran and Walter Willinger}, title = {An analysis of underground forums}, booktitle = {Proceedings of the 11th {ACM} {SIGCOMM} Internet Measurement Conference, {IMC} '11, Berlin, Germany, November 2-, 2011}, pages = {71--80}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2068816.2068824}, doi = {10.1145/2068816.2068824}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imc/MotoyamaMLSV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/AlSabahBGGMSV11, author = {Mashael AlSabah and Kevin S. Bauer and Ian Goldberg and Dirk Grunwald and Damon McCoy and Stefan Savage and Geoffrey M. Voelker}, editor = {Simone Fischer{-}H{\"{u}}bner and Nicholas Hopper}, title = {DefenestraTor: Throwing Out Windows in Tor}, booktitle = {Privacy Enhancing Technologies - 11th International Symposium, {PETS} 2011, Waterloo, ON, Canada, July 27-29, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6794}, pages = {134--154}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22263-4\_8}, doi = {10.1007/978-3-642-22263-4\_8}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/pet/AlSabahBGGMSV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/LevchenkoPCEFGHKKLMWPVS11, author = {Kirill Levchenko and Andreas Pitsillidis and Neha Chachra and Brandon Enright and M{\'{a}}rk F{\'{e}}legyh{\'{a}}zi and Chris Grier and Tristan Halvorson and Chris Kanich and Christian Kreibich and He Liu and Damon McCoy and Nicholas Weaver and Vern Paxson and Geoffrey M. Voelker and Stefan Savage}, title = {Click Trajectories: End-to-End Analysis of the Spam Value Chain}, booktitle = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May 2011, Berkeley, California, {USA}}, pages = {431--446}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/SP.2011.24}, doi = {10.1109/SP.2011.24}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/LevchenkoPCEFGHKKLMWPVS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/CheckowayMKASSKCRK11, author = {Stephen Checkoway and Damon McCoy and Brian Kantor and Danny Anderson and Hovav Shacham and Stefan Savage and Karl Koscher and Alexei Czeskis and Franziska Roesner and Tadayoshi Kohno}, title = {Comprehensive Experimental Analyses of Automotive Attack Surfaces}, booktitle = {20th {USENIX} Security Symposium, San Francisco, CA, USA, August 8-12, 2011, Proceedings}, publisher = {{USENIX} Association}, year = {2011}, url = {http://static.usenix.org/events/sec11/tech/full\_papers/Checkoway.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/CheckowayMKASSKCRK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KanichCMGWMLSV11, author = {Chris Kanich and Neha Chachra and Damon McCoy and Chris Grier and David Y. Wang and Marti Motoyama and Kirill Levchenko and Stefan Savage and Geoffrey M. Voelker}, editor = {Sean Peisert and Stephen Schwab}, title = {No Plan Survives Contact: Experience with Cybercrime Measurement}, booktitle = {4th Workshop on Cyber Security Experimentation and Test, {CSET} '11, San Francisco, CA, USA, August 8, 2011}, publisher = {{USENIX} Association}, year = {2011}, url = {https://www.usenix.org/conference/cset11/no-plan-survives-contact-experience-cybercrime-measurement}, timestamp = {Mon, 01 Feb 2021 08:43:02 +0100}, biburl = {https://dblp.org/rec/conf/uss/KanichCMGWMLSV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KanichWMHKLPVS11, author = {Chris Kanich and Nicholas Weaver and Damon McCoy and Tristan Halvorson and Christian Kreibich and Kirill Levchenko and Vern Paxson and Geoffrey M. Voelker and Stefan Savage}, title = {Show Me the Money: Characterizing Spam-advertised Revenue}, booktitle = {20th {USENIX} Security Symposium, San Francisco, CA, USA, August 8-12, 2011, Proceedings}, publisher = {{USENIX} Association}, year = {2011}, url = {http://static.usenix.org/events/sec11/tech/full\_papers/Kanich.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/KanichWMHKLPVS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/MotoyamaMLSV11, author = {Marti Motoyama and Damon McCoy and Kirill Levchenko and Stefan Savage and Geoffrey M. Voelker}, title = {Dirty Jobs: The Role of Freelance Labor in Web Service Abuse}, booktitle = {20th {USENIX} Security Symposium, San Francisco, CA, USA, August 8-12, 2011, Proceedings}, publisher = {{USENIX} Association}, year = {2011}, url = {http://static.usenix.org/events/sec11/tech/full\_papers/Motoyama.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/MotoyamaMLSV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/PangGKMS10, author = {Jeffrey Pang and Ben Greenstein and Michael Kaminsky and Damon McCoy and Srinivasan Seshan}, title = {Wifi-Reports: Improving Wireless Network Selection with Collaboration}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {9}, number = {12}, pages = {1713--1731}, year = {2010}, url = {https://doi.org/10.1109/TMC.2010.151}, doi = {10.1109/TMC.2010.151}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmc/PangGKMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/GonzalesBLMS10, author = {Harold Gonzales and Kevin S. Bauer and Janne Lindqvist and Damon McCoy and Douglas C. Sicker}, title = {Practical Defenses for Evil Twin Attacks in 802.11}, booktitle = {Proceedings of the Global Communications Conference, 2010. {GLOBECOM} 2010, 6-10 December 2010, Miami, Florida, {USA}}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/GLOCOM.2010.5684213}, doi = {10.1109/GLOCOM.2010.5684213}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/globecom/GonzalesBLMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/KoscherCRPKCMKASS10, author = {Karl Koscher and Alexei Czeskis and Franziska Roesner and Shwetak N. Patel and Tadayoshi Kohno and Stephen Checkoway and Damon McCoy and Brian Kantor and Danny Anderson and Hovav Shacham and Stefan Savage}, title = {Experimental Security Analysis of a Modern Automobile}, booktitle = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May 2010, Berleley/Oakland, California, {USA}}, pages = {447--462}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SP.2010.34}, doi = {10.1109/SP.2010.34}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/KoscherCRPKCMKASS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/MotoyamaLKMVS10, author = {Marti Motoyama and Kirill Levchenko and Chris Kanich and Damon McCoy and Geoffrey M. Voelker and Stefan Savage}, title = {Re: CAPTCHAs-Understanding CAPTCHA-Solving Services in an Economic Context}, booktitle = {19th {USENIX} Security Symposium, Washington, DC, USA, August 11-13, 2010, Proceedings}, pages = {435--462}, publisher = {{USENIX} Association}, year = {2010}, url = {http://www.usenix.org/events/sec10/tech/full\_papers/Motoyama.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/MotoyamaLKMVS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/BauerMABGGS09, author = {Kevin S. Bauer and Damon McCoy and Eric W. Anderson and Markus Breitenbach and Gregory Z. Grudic and Dirk Grunwald and Douglas C. Sicker}, title = {The Directional Attack on Wireless Localization -or- How to Spoof Your Location with a Tin Can}, booktitle = {Proceedings of the Global Communications Conference, 2009. {GLOBECOM} 2009, Honolulu, Hawaii, USA, 30 November - 4 December 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/GLOCOM.2009.5425737}, doi = {10.1109/GLOCOM.2009.5425737}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/globecom/BauerMABGGS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisys/PangGKMS09, author = {Jeffrey Pang and Ben Greenstein and Michael Kaminsky and Damon McCoy and Srinivasan Seshan}, editor = {Krzysztof Zielinski and Adam Wolisz and Jason Flinn and Anthony LaMarca}, title = {Wifi-reports: improving wireless network selection with collaboration}, booktitle = {Proceedings of the 7th International Conference on Mobile Systems, Applications, and Services (MobiSys 2009), Krak{\'{o}}w, Poland, June 22-25, 2009}, pages = {123--136}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1555816.1555830}, doi = {10.1145/1555816.1555830}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobisys/PangGKMS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/BauerMGGS09, author = {Kevin S. Bauer and Damon McCoy and Ben Greenstein and Dirk Grunwald and Douglas C. Sicker}, editor = {Ian Goldberg and Mikhail J. Atallah}, title = {Physical Layer Attacks on Unlinkability in Wireless LANs}, booktitle = {Privacy Enhancing Technologies, 9th International Symposium, {PETS} 2009, Seattle, WA, USA, August 5-7, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5672}, pages = {108--127}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03168-7\_7}, doi = {10.1007/978-3-642-03168-7\_7}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pet/BauerMGGS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tapia/BauerMGGS09, author = {Kevin S. Bauer and Damon McCoy and Ben Greenstein and Dirk Grunwald and Douglas C. Sicker}, editor = {Nina M. Berry}, title = {Performing traffic analysis on a wireless identifier-free link layer}, booktitle = {Proceedings of the Richard Tapia Celebration of Diversity in Computing Conference 2009: Intellect, Initiatives, Insight, and Innovations, Portland, Oregon, USA, April 1-4, 2009}, pages = {18--23}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1565799.1565804}, doi = {10.1145/1565799.1565804}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tapia/BauerMGGS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/BauerMGS09, author = {Kevin S. Bauer and Damon McCoy and Dirk Grunwald and Douglas C. Sicker}, title = {BitStalker: Accurately and efficiently monitoring bittorrent traffic}, booktitle = {First {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2009, London, UK, December 6-9, 2009}, pages = {181--185}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/WIFS.2009.5386457}, doi = {10.1109/WIFS.2009.5386457}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wifs/BauerMGS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipccc/BauerGM08, author = {Kevin S. Bauer and Harold Gonzales and Damon McCoy}, editor = {Ty Znati and Youtao Zhang}, title = {Mitigating Evil Twin Attacks in 802.11}, booktitle = {2008 {IEEE} International Performance, Computing and Communications Conference, {IPCCC} 2008, Austin, TX, USA, December 7-9, 2008}, pages = {513--516}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/PCCC.2008.4745081}, doi = {10.1109/PCCC.2008.4745081}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipccc/BauerGM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisys/GreensteinMPKSW08, author = {Ben Greenstein and Damon McCoy and Jeffrey Pang and Tadayoshi Kohno and Srinivasan Seshan and David Wetherall}, editor = {Dirk Grunwald and Richard Han and Eyal de Lara and Carla Schlatter Ellis}, title = {Improving wireless privacy with an identifier-free link layer protocol}, booktitle = {Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services (MobiSys 2008), Breckenridge, CO, USA, June 17-20, 2008}, pages = {40--53}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1378600.1378607}, doi = {10.1145/1378600.1378607}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobisys/GreensteinMPKSW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/McCoyBGKS08, author = {Damon McCoy and Kevin S. Bauer and Dirk Grunwald and Tadayoshi Kohno and Douglas C. Sicker}, editor = {Nikita Borisov and Ian Goldberg}, title = {Shining Light in Dark Places: Understanding the Tor Network}, booktitle = {Privacy Enhancing Technologies, 8th International Symposium, {PETS} 2008, Leuven, Belgium, July 23-25, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5134}, pages = {63--76}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70630-4\_5}, doi = {10.1007/978-3-540-70630-4\_5}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pet/McCoyBGKS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/BauerMGS08, author = {Kevin S. Bauer and Damon McCoy and Dirk Grunwald and Douglas C. Sicker}, editor = {Albert Levi and Peng Liu and Refik Molva}, title = {BitBlender: Light-Weight Anonymity for BitTorrent}, booktitle = {4th International {ICST} Conference on Security and Privacy in Communication Networks, {SECURECOMM} 2008, Istanbul, Turkey, September 22-25, 2008}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1461464.1461465}, doi = {10.1145/1461464.1461465}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/BauerMGS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secon/McCoySG07, author = {Damon McCoy and Douglas C. Sicker and Dirk Grunwald}, title = {A Mechanism for Detecting and Responding to Misbehaving Nodes in Wireless Networks}, booktitle = {Proceedings of the Fourth Annual {IEEE} Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, {SECON} 2007, Merged with {IEEE} International Workshop on Wireless Ad-hoc and Sensor Networks (IWWAN), June 18-21, 2007, San Diego, California, {USA}}, pages = {678--684}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/SAHCN.2007.4292881}, doi = {10.1109/SAHCN.2007.4292881}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secon/McCoySG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/BauerMGKS07, author = {Kevin S. Bauer and Damon McCoy and Dirk Grunwald and Tadayoshi Kohno and Douglas C. Sicker}, editor = {Peng Ning and Ting Yu}, title = {Low-resource routing attacks against tor}, booktitle = {Proceedings of the 2007 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2007, Alexandria, VA, USA, October 29, 2007}, pages = {11--20}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1314333.1314336}, doi = {10.1145/1314333.1314336}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/BauerMGKS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/FranklinM06, author = {Jason Franklin and Damon McCoy}, editor = {Angelos D. Keromytis}, title = {Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting}, booktitle = {Proceedings of the 15th {USENIX} Security Symposium, Vancouver, BC, Canada, July 31 - August 4, 2006}, publisher = {{USENIX} Association}, year = {2006}, url = {https://www.usenix.org/conference/15th-usenix-security-symposium/passive-data-link-layer-80211-wireless-device-driver}, timestamp = {Mon, 01 Feb 2021 08:43:12 +0100}, biburl = {https://dblp.org/rec/conf/uss/FranklinM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.