What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Damon McCoy
Google Scholar
60
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/popets
Tracker Installations Are Not Created Equal: Understanding Tracker Configuration of Form Data Collection.
Julia B. Kieserman
Athanasios Andreou
Chris Geeng
Tobias Lauinger
Damon McCoy
2025
journals/popets
More and Scammier Ads: The Perils of YouTube's Ad Privacy Settings.
Cat Mai
Bruno Coelho
Julia B. Kieserman
Lexie Matsumoto
Kyle Spinelli
Eric Yang
Athanasios Andreou
Rachel Greenstadt
Tobias Lauinger
Damon McCoy
2025
conf/sp
Characterizing the Usability and Usefulness of U.S. Ad Transparency Systems.
Kevin Bryson
Arthur Borem
Phoebe Moh
Omer Akgul
Laura Edelson
Tobias Lauinger
Michelle L. Mazurek
Damon McCoy
Blase Ur
2024
journals/popets
What to Expect When You're Accessing: An Exploration of User Privacy Rights in People Search Websites.
Kejsi Take
Jordyn Young
Rasika Bhalerao
Kevin Gallagher
Andrea Forte
Damon McCoy
Rachel Greenstadt
2024
conf/soups
"Say I'm in public...I don't want my nudes to pop up." User Threat Models for Using Vault Applications.
Chris Geeng
Natalie Chen
Kieron Ivy Turk
Jevan A. Hutson
Damon McCoy
2023
journals/popets
No Privacy Among Spies: Assessing the Functionality and Insecurity of Consumer Android Spyware Apps.
Enze Liu
Sumanth Rao
Sam Havron
Grant Ho
Stefan Savage
Geoffrey M. Voelker
Damon McCoy
2022
journals/popets
"It Feels Like Whack-a-mole": User Experiences of Data Removal from People Search Websites.
Kejsi Take
Kevin Gallagher
Andrea Forte
Damon McCoy
Rachel Greenstadt
2022
conf/ccs
Cart-ology: Intercepting Targeted Advertising via Ad Network Identity Entanglement.
ChangSeok Oh
Chris Kanich
Damon McCoy
Paul Pearce
2022
conf/uss
An Audit of Facebook's Political Ad Policy Enforcement.
Victor Le Pochat
Laura Edelson
Tom van Goethem
Wouter Joosen
Damon McCoy
Tobias Lauinger
2022
conf/eurosp
Libel Inc: An Analysis of the Libel Site Ecosystem.
Rasika Bhalerao
Damon McCoy
2021
conf/uss
Swiped: Analyzing Ground-truth Data of a Marketplace for Stolen Debit and Credit Cards.
Maxwell Aliapoulios
Cameron Ballard
Rasika Bhalerao
Tobias Lauinger
Damon McCoy
2021
conf/sp
SoK: Hate, Harassment, and the Changing Landscape of Online Abuse.
Kurt Thomas
Devdatta Akhawe
Michael D. Bailey
Dan Boneh
Elie Bursztein
Sunny Consolvo
Nicola Dell
Zakir Durumeric
Patrick Gage Kelley
Deepak Kumar
Damon McCoy
Sarah Meiklejohn
Thomas Ristenpart
Gianluca Stringhini
2020
conf/uss
The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums.
Emily Tseng
Rosanna Bellini
Nora McDonald
Matan Danos
Rachel Greenstadt
Damon McCoy
Nicola Dell
Thomas Ristenpart
2020
conf/sp
A Security Analysis of the Facebook Ad Library.
Laura Edelson
Tobias Lauinger
Damon McCoy
2020
conf/sp
The Many Kinds of Creepware Used for Interpersonal Attacks.
Kevin A. Roundy
Paula Barmaimon Mendelberg
Nicola Dell
Damon McCoy
Daniel Nissani
Thomas Ristenpart
Acar Tamersoy
2019
conf/uss
Clinical Computer Security for Victims of Intimate Partner Violence.
Sam Havron
Diana Freed
Rahul Chatterjee
Damon McCoy
Nicola Dell
Thomas Ristenpart
2019
conf/uss
Platforms in Everything: Analyzing Ground-Truth Data on the Anatomy and Economics of Bullet-Proof Hosting.
Arman Noroozian
Jan Koenders
Eelco van Veldhuizen
Carlos Hernandez Gañán
Sumayah A. Alrwais
Damon McCoy
Michel van Eeten
2019
conf/uss
Reading the Tea leaves: A Comparative Analysis of Threat Intelligence.
Vector Guo Li
Matthew Dunn
Paul Pearce
Damon McCoy
Geoffrey M. Voelker
Stefan Savage
2019
conf/eurosp
Iniquitous Cord-Cutting: An Analysis of Infringing IPTV Services.
Prakhar Pandey
Maxwell Aliapoulios
Damon McCoy
2018
journals/popets
Editors' Introduction.
Rachel Greenstadt
Damon McCoy
Carmela Troncoso
2018
journals/popets
Editors' Introduction.
Rachel Greenstadt
Damon McCoy
Carmela Troncoso
2018
journals/popets
Editors' Introduction.
Rachel Greenstadt
Damon McCoy
Carmela Troncoso
2018
journals/popets
Editors' Introduction.
Rachel Greenstadt
Damon McCoy
Carmela Troncoso
2018
conf/ccs
Peeling the Onion's User Experience Layer: Examining Naturalistic Use of the Tor Browser.
Kevin Gallagher
Sameer Patil
Brendan Dolan-Gavitt
Damon McCoy
Nasir D. Memon
2018
conf/uss
Schrödinger's RAT: Profiling the Stakeholders in the Remote Access Trojan Ecosystem.
Mohammad Rezaeirad
Brown Farinholt
Hitesh Dharmdasani
Paul Pearce
Kirill Levchenko
Damon McCoy
2018
conf/sp
Tracking Ransomware End-to-end.
Danny Yuxing Huang
Maxwell Matthaios Aliapoulios
Vector Guo Li
Luca Invernizzi
Elie Bursztein
Kylie McRoberts
Jonathan Levin
Kirill Levchenko
Alex C. Snoeren
Damon McCoy
2018
conf/sp
The Spyware Used in Intimate Partner Violence.
Rahul Chatterjee
Periwinkle Doerfler
Hadas Orgad
Sam Havron
Jackeline Palmer
Diana Freed
Karen Levy
Nicola Dell
Damon McCoy
Thomas Ristenpart
2017
journals/popets
Editors' Introduction.
Claudia Díaz
Rachel Greenstadt
Damon McCoy
2017
journals/popets
Editors' Introduction.
Claudia Díaz
Rachel Greenstadt
Damon McCoy
2017
journals/popets
Editors' Introduction.
Claudia Díaz
Rachel Greenstadt
Damon McCoy
2017
journals/popets
Editors' Introduction.
Claudia Díaz
Rachel Greenstadt
Damon McCoy
2017
conf/uss
Measuring the Effectiveness of Embedded Phishing Exercises.
Hossein Siadati
Sean Palka
Avi Siegel
Damon McCoy
2017
conf/sp
Under the Shadow of Sunshine: Understanding and Detecting Bulletproof Hosting on Legitimate Service Provider Networks.
Sumayah A. Alrwais
Xiaojing Liao
Xianghang Mi
Peng Wang
Xiaofeng Wang
Feng Qian
Raheem A. Beyah
Damon McCoy
2017
conf/sp
To Catch a Ratter: Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild.
Brown Farinholt
Mohammad Rezaeirad
Paul Pearce
Hitesh Dharmdasani
Haikuo Yin
Stevens Le Blond
Damon McCoy
Kirill Levchenko
2016
conf/uss
You've Got Vulnerability: Exploring Effective Vulnerability Notifications.
Frank Li
Zakir Durumeric
Jakub Czyz
Mohammad Karami
Michael D. Bailey
Damon McCoy
Stefan Savage
Vern Paxson
2016
conf/uss
Investigating Commercial Pay-Per-Install and the Distribution of Unwanted Software.
Kurt Thomas
Juan A. Elices Crespo
Ryan Rasti
Jean-Michel Picod
Cait Phillips
Marc-André Decoste
Chris Sharp
Fabio Tirelo
Ali Tofigh
Marc-Antoine Courteau
Lucas Ballard
Robert Shield
Nav Jagpal
Moheeb Abu Rajab
Panayiotis Mavrommatis
Niels Provos
Elie Bursztein
Damon McCoy
2016
conf/fc
Stressing Out: Bitcoin "Stress Testing".
Khaled Baqer
Danny Yuxing Huang
Damon McCoy
Nicholas Weaver
2016
conf/fc
Understanding Craigslist Rental Scams.
Youngsam Park
Damon McCoy
Elaine Shi
2016
conf/ndss
Do You See What I See? Differential Treatment of Anonymous Users.
Sheharbano Khattak
David Fifield
Sadia Afroz
Mobin Javed
Srikanth Sundaresan
Damon McCoy
Vern Paxson
Steven J. Murdoch
2015
conf/sp
Ad Injection at Scale: Assessing Deceptive Advertisement Modifications.
Kurt Thomas
Elie Bursztein
Chris Grier
Grant Ho
Nav Jagpal
Alexandros Kapravelos
Damon McCoy
Antonio Nappa
Vern Paxson
Paul Pearce
Niels Provos
Moheeb Abu Rajab
2014
conf/ccs
Characterizing Large-Scale Click Fraud in ZeroAccess.
Paul Pearce
Vacha Dave
Chris Grier
Kirill Levchenko
Saikat Guha
Damon McCoy
Vern Paxson
Stefan Savage
Geoffrey M. Voelker
2014
conf/ccs
Dialing Back Abuse on Phone Verified Accounts.
Kurt Thomas
Dmytro Iatskiv
Elie Bursztein
Tadek Pietraszek
Chris Grier
Damon McCoy
2014
conf/sp
Constructing and Analyzing Criminal Networks.
Hamed Sarvari
Ehab Atif Abozinadah
Alex Mbaziira
Damon McCoy
2014
conf/sp
Doppelgänger Finder: Taking Stylometry to the Underground.
Sadia Afroz
Aylin Caliskan Islam
Ariel Stolerman
Rachel Greenstadt
Damon McCoy
2014
conf/ndss
Botcoin: Monetizing Stolen Cycles.
Danny Yuxing Huang
Hitesh Dharmdasani
Sarah Meiklejohn
Vacha Dave
Chris Grier
Damon McCoy
Stefan Savage
Nicholas Weaver
Alex C. Snoeren
Kirill Levchenko
2014
conf/ndss
Scambaiter: Understanding Targeted Nigerian Scams on Craigslist.
Youngsam Park
Jackie Jones
Damon McCoy
Elaine Shi
Markus Jakobsson
2013
conf/uss
Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse.
Kurt Thomas
Damon McCoy
Chris Grier
Alek Kolcz
Vern Paxson
2013
conf/uss
OCTANE (Open Car Testbed and Network Experiments): Bringing Cyber-Physical Security Research to Researchers and Students.
Christopher E. Everett
Damon McCoy
2012
conf/ccs
Manufacturing compromise: the emergence of exploit-as-a-service.
Chris Grier
Lucas Ballard
Juan Caballero
Neha Chachra
Christian J. Dietrich
Kirill Levchenko
Panayiotis Mavrommatis
Damon McCoy
Antonio Nappa
Andreas Pitsillidis
Niels Provos
M. Zubair Rafique
Moheeb Abu Rajab
Christian Rossow
Kurt Thomas
Vern Paxson
Stefan Savage
Geoffrey M. Voelker
2012
conf/ccs
Priceless: the role of payments in abuse-advertised goods.
Damon McCoy
Hitesh Dharmdasani
Christian Kreibich
Geoffrey M. Voelker
Stefan Savage
2012
conf/uss
PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs.
Damon McCoy
Andreas Pitsillidis
Grant Jordan
Nicholas Weaver
Christian Kreibich
Brian Krebs
Geoffrey M. Voelker
Stefan Savage
Kirill Levchenko
2011
conf/uss
Show Me the Money: Characterizing Spam-advertised Revenue.
Chris Kanich
Nicholas Weaver
Damon McCoy
Tristan Halvorson
Christian Kreibich
Kirill Levchenko
Vern Paxson
Geoffrey M. Voelker
Stefan Savage
2011
conf/uss
No Plan Survives Contact: Experience with Cybercrime Measurement.
Chris Kanich
Neha Chachra
Damon McCoy
Chris Grier
David Y. Wang
Marti Motoyama
Kirill Levchenko
Stefan Savage
Geoffrey M. Voelker
2011
conf/uss
Dirty Jobs: The Role of Freelance Labor in Web Service Abuse.
Marti Motoyama
Damon McCoy
Kirill Levchenko
Stefan Savage
Geoffrey M. Voelker
2011
conf/uss
Comprehensive Experimental Analyses of Automotive Attack Surfaces.
Stephen Checkoway
Damon McCoy
Brian Kantor
Danny Anderson
Hovav Shacham
Stefan Savage
Karl Koscher
Alexei Czeskis
Franziska Roesner
Tadayoshi Kohno
2011
conf/fc
Proximax: Measurement-Driven Proxy Dissemination (Short Paper).
Damon McCoy
Jose Andre Morales
Kirill Levchenko
2011
conf/sp
Click Trajectories: End-to-End Analysis of the Spam Value Chain.
Kirill Levchenko
Andreas Pitsillidis
Neha Chachra
Brandon Enright
Márk Félegyházi
Chris Grier
Tristan Halvorson
Chris Kanich
Christian Kreibich
He Liu
Damon McCoy
Nicholas Weaver
Vern Paxson
Geoffrey M. Voelker
Stefan Savage
2010
conf/uss
Re: CAPTCHAs-Understanding CAPTCHA-Solving Services in an Economic Context.
Marti Motoyama
Kirill Levchenko
Chris Kanich
Damon McCoy
Geoffrey M. Voelker
Stefan Savage
2010
conf/sp
Experimental Security Analysis of a Modern Automobile.
Karl Koscher
Alexei Czeskis
Franziska Roesner
Shwetak N. Patel
Tadayoshi Kohno
Stephen Checkoway
Damon McCoy
Brian Kantor
Danny Anderson
Hovav Shacham
Stefan Savage
2006
conf/uss
Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting.
Jason Franklin
Damon McCoy
Coauthors
Acar Tamersoy
(1)
Alek Kolcz
(1)
Alex C. Snoeren
(2)
Alex Mbaziira
(1)
Alexandros Kapravelos
(1)
Alexei Czeskis
(2)
Ali Tofigh
(1)
Andrea Forte
(2)
Andreas Pitsillidis
(3)
Antonio Nappa
(2)
Ariel Stolerman
(1)
Arman Noroozian
(1)
Arthur Borem
(1)
Athanasios Andreou
(2)
Avi Siegel
(1)
Aylin Caliskan Islam
(1)
Blase Ur
(1)
Brandon Enright
(1)
Brendan Dolan-Gavitt
(1)
Brian Kantor
(2)
Brian Krebs
(1)
Brown Farinholt
(2)
Bruno Coelho
(1)
Cait Phillips
(1)
Cameron Ballard
(1)
Carlos Hernandez Gañán
(1)
Carmela Troncoso
(4)
Cat Mai
(1)
ChangSeok Oh
(1)
Chris Geeng
(2)
Chris Grier
(8)
Chris Kanich
(5)
Chris Sharp
(1)
Christian J. Dietrich
(1)
Christian Kreibich
(4)
Christian Rossow
(1)
Christopher E. Everett
(1)
Claudia Díaz
(4)
Damon McCoy
(60)
Dan Boneh
(1)
Daniel Nissani
(1)
Danny Anderson
(2)
Danny Yuxing Huang
(3)
David Fifield
(1)
David Y. Wang
(1)
Deepak Kumar
(1)
Devdatta Akhawe
(1)
Diana Freed
(2)
Dmytro Iatskiv
(1)
Eelco van Veldhuizen
(1)
Ehab Atif Abozinadah
(1)
Elaine Shi
(2)
Elie Bursztein
(5)
Emily Tseng
(1)
Enze Liu
(1)
Eric Yang
(1)
Fabio Tirelo
(1)
Feng Qian
(1)
Frank Li
(1)
Franziska Roesner
(2)
Geoffrey M. Voelker
(11)
Gianluca Stringhini
(1)
Grant Ho
(2)
Grant Jordan
(1)
Hadas Orgad
(1)
Haikuo Yin
(1)
Hamed Sarvari
(1)
He Liu
(1)
Hitesh Dharmdasani
(4)
Hossein Siadati
(1)
Hovav Shacham
(2)
Jackeline Palmer
(1)
Jackie Jones
(1)
Jakub Czyz
(1)
Jan Koenders
(1)
Jason Franklin
(1)
Jean-Michel Picod
(1)
Jevan A. Hutson
(1)
Jonathan Levin
(1)
Jordyn Young
(1)
Jose Andre Morales
(1)
Juan A. Elices Crespo
(1)
Juan Caballero
(1)
Julia B. Kieserman
(2)
Karen Levy
(1)
Karl Koscher
(2)
Kejsi Take
(2)
Kevin A. Roundy
(1)
Kevin Bryson
(1)
Kevin Gallagher
(3)
Khaled Baqer
(1)
Kieron Ivy Turk
(1)
Kirill Levchenko
(13)
Kurt Thomas
(6)
Kyle Spinelli
(1)
Kylie McRoberts
(1)
Laura Edelson
(3)
Lexie Matsumoto
(1)
Luca Invernizzi
(1)
Lucas Ballard
(2)
M. Zubair Rafique
(1)
Marc-André Decoste
(1)
Marc-Antoine Courteau
(1)
Márk Félegyházi
(1)
Markus Jakobsson
(1)
Marti Motoyama
(3)
Matan Danos
(1)
Matthew Dunn
(1)
Maxwell Aliapoulios
(2)
Maxwell Matthaios Aliapoulios
(1)
Michael D. Bailey
(2)
Michel van Eeten
(1)
Michelle L. Mazurek
(1)
Mobin Javed
(1)
Mohammad Karami
(1)
Mohammad Rezaeirad
(2)
Moheeb Abu Rajab
(3)
Nasir D. Memon
(1)
Natalie Chen
(1)
Nav Jagpal
(2)
Neha Chachra
(3)
Nicholas Weaver
(5)
Nicola Dell
(5)
Niels Provos
(3)
Nora McDonald
(1)
Omer Akgul
(1)
Panayiotis Mavrommatis
(2)
Patrick Gage Kelley
(1)
Paul Pearce
(6)
Paula Barmaimon Mendelberg
(1)
Peng Wang
(1)
Periwinkle Doerfler
(1)
Phoebe Moh
(1)
Prakhar Pandey
(1)
Rachel Greenstadt
(13)
Raheem A. Beyah
(1)
Rahul Chatterjee
(2)
Rasika Bhalerao
(3)
Robert Shield
(1)
Rosanna Bellini
(1)
Ryan Rasti
(1)
Sadia Afroz
(2)
Saikat Guha
(1)
Sam Havron
(3)
Sameer Patil
(1)
Sarah Meiklejohn
(2)
Sean Palka
(1)
Sheharbano Khattak
(1)
Shwetak N. Patel
(1)
Srikanth Sundaresan
(1)
Stefan Savage
(15)
Stephen Checkoway
(2)
Steven J. Murdoch
(1)
Stevens Le Blond
(1)
Sumanth Rao
(1)
Sumayah A. Alrwais
(2)
Sunny Consolvo
(1)
Tadayoshi Kohno
(2)
Tadek Pietraszek
(1)
Thomas Ristenpart
(5)
Tobias Lauinger
(6)
Tom van Goethem
(1)
Tristan Halvorson
(2)
Vacha Dave
(2)
Vector Guo Li
(2)
Vern Paxson
(8)
Victor Le Pochat
(1)
Wouter Joosen
(1)
Xianghang Mi
(1)
Xiaofeng Wang
(1)
Xiaojing Liao
(1)
Youngsam Park
(2)
Zakir Durumeric
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to