フォロー
Damon McCoy
Damon McCoy
Professor of Computer Science and Engineering, New York University
確認したメール アドレス: nyu.edu - ホームページ
タイトル
引用先
引用先
Experimental security analysis of a modern automobile
K Koscher, A Czeskis, F Roesner, S Patel, T Kohno, S Checkoway, ...
IEEE Symposium on Security and Privacy (SP), 2010
25702010
Comprehensive experimental analyses of automotive attack surfaces
S Checkoway, D McCoy, B Kantor, D Anderson, H Shacham, S Savage, ...
20th USENIX security symposium (USENIX Security 11), 2011
22992011
A fistful of bitcoins: characterizing payments among men with no names
S Meiklejohn, M Pomarole, G Jordan, K Levchenko, D McCoy, ...
Proceedings of the 2013 conference on Internet measurement conference, 127-140, 2013
19162013
{Trafficking} Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse
K Thomas, D McCoy, C Grier, A Kolcz, V Paxson
22nd USENIX Security Symposium (USENIX Security 13), 195-210, 2013
639*2013
Shining light in dark places: Understanding the Tor network
D McCoy, K Bauer, D Grunwald, T Kohno, D Sicker
Privacy Enhancing Technologies: 8th International Symposium, PETS 2008 …, 2008
5902008
Low-resource routing attacks against Tor
K Bauer, D McCoy, D Grunwald, T Kohno, D Sicker
Proceedings of the 2007 ACM workshop on Privacy in electronic society, 11-20, 2007
4942007
An analysis of underground forums
M Motoyama, D McCoy, K Levchenko, S Savage, GM Voelker
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement …, 2011
4142011
Click trajectories: End-to-end analysis of the spam value chain
K Levchenko, A Pitsillidis, N Chachra, B Enright, M Félegyházi, C Grier, ...
2011 ieee symposium on security and privacy, 431-446, 2011
3812011
Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting.
J Franklin, D McCoy, P Tabriz, V Neagoe, JV Randwyk, D Sicker
USENIX Security Symposium 3 (2006), 16-89, 2006
3672006
Manufacturing compromise: the emergence of exploit-as-a-service
C Grier, L Ballard, J Caballero, N Chachra, CJ Dietrich, K Levchenko, ...
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
3142012
Re:{CAPTCHAs—Understanding}{CAPTCHA-Solving} Services in an Economic Context
M Motoyama, K Levchenko, C Kanich, D McCoy, GM Voelker, S Savage
19th USENIX Security Symposium (USENIX Security 10), 2010
3122010
Tracking ransomware end-to-end
DY Huang, MM Aliapoulios, VG Li, L Invernizzi, E Bursztein, K McRoberts, ...
2018 IEEE Symposium on Security and Privacy (SP), 618-631, 2018
2802018
The Spyware Used in Intimate Partner Violence
R Chatterjee, T Ristenpart, P Doerfler, H Orgad, S Havron, J Palmer, ...
The Spyware Used in Intimate Partner Violence, 0, 2018
2122018
Improving wireless privacy with an identifier-free link layer protocol
B Greenstein, D McCoy, J Pang, T Kohno, S Seshan, D Wetherall
Proceedings of the 6th international conference on Mobile systems …, 2008
1902008
Doppelgänger finder: Taking stylometry to the underground
S Afroz, AC Islam, A Stolerman, R Greenstadt, D McCoy
2014 IEEE Symposium on Security and Privacy, 212-226, 2014
1822014
You've got vulnerability: Exploring effective vulnerability notifications
F Li, Z Durumeric, J Czyz, M Karami, M Bailey, D McCoy, S Savage, ...
25th USENIX Security Symposium (USENIX Security 16), 1033-1050, 2016
1802016
Pharmaleaks: Understanding the business of online pharmaceutical affiliate programs
D McCoy, A Pitsillidis, G Jordan, N Weaver, C Kreibich, B Krebs, ...
Proceedings of USENIX Security, 2012
1792012
Sok: Hate, harassment, and the changing landscape of online abuse
K Thomas, D Akhawe, M Bailey, D Boneh, E Bursztein, S Consolvo, ...
2021 IEEE Symposium on Security and Privacy (SP), 247-267, 2021
1712021
Show me the money: Characterizing spam-advertised revenue
C Kanich, N Weaver, D McCoy, T Halvorson, C Kreibich, K Levchenko, ...
20th USENIX Security Symposium (USENIX Security 11), 2011
1672011
Ad injection at scale: Assessing deceptive advertisement modifications
K Thomas, E Bursztein, C Grier, G Ho, N Jagpal, A Kapravelos, D McCoy, ...
2015 IEEE Symposium on Security and Privacy, 151-167, 2015
1642015
現在システムで処理を実行できません。しばらくしてからもう一度お試しください。
論文 1–20