Damon McCoy
Orcid: 0000-0001-7386-7260Affiliations:
- New York University, NY, USA
According to our database1,
Damon McCoy
authored at least 118 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
What to Expect When You're Accessing: An Exploration of User Privacy Rights in People Search Websites.
Proc. Priv. Enhancing Technol., 2024
Proc. ACM Hum. Comput. Interact., 2024
Cyber democracy in the digital age: Characterizing hate networks in the 2022 US midterm elections.
Inf. Fusion, 2024
Privacy or Transparency? Negotiated Smartphone Access as a Signifier of Trust in Romantic Relationships.
CoRR, 2024
"Say I'm in public...I don't want my nudes to pop up." User Threat Models for Using Vault Applications.
Proceedings of the Twentieth Symposium on Usable Privacy and Security, 2024
2023
No Privacy Among Spies: Assessing the Functionality and Insecurity of Consumer Android Spyware Apps.
Proc. Priv. Enhancing Technol., January, 2023
Understanding the (In)Effectiveness of Content Moderation: A Case Study of Facebook in the Context of the U.S. Capitol Riot.
CoRR, 2023
Proceedings of the ACM Web Conference 2023, 2023
2022
"It Feels Like Whack-a-mole": User Experiences of Data Removal from People Search Websites.
Proc. Priv. Enhancing Technol., 2022
Proc. ACM Hum. Comput. Interact., 2022
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the IEEE International Symposium on Technology and Society, 2022
Proceedings of the IEEE European Symposium on Security and Privacy, 2022
Proceedings of the APWG Symposium on Electronic Crime Research, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
"I'm a Professor, which isn't usually a dangerous job": Internet-facilitated Harassment and Its Impact on Researchers.
Proc. ACM Hum. Comput. Interact., 2021
Swiped: Analyzing Ground-truth Data of a Marketplace for Stolen Debit and Credit Cards.
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the IMC '21: ACM Internet Measurement Conference, 2021
Proceedings of the IMC '21: ACM Internet Measurement Conference, 2021
2020
"So-called privacy breeds evil": Narrative Justifications for Intimate Partner Surveillance in Online Forums.
Proc. ACM Hum. Comput. Interact., 2020
CoRR, 2020
The Pod People: Understanding Manipulation of Social Media Popularity via Reciprocity Abuse.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020
The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums.
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020
Proceedings of the Workshop Proceedings of the 14th International AAAI Conference on Web and Social Media, 2020
2019
Proceedings of the World Wide Web Conference, 2019
Platforms in Everything: Analyzing Ground-Truth Data on the Anatomy and Economics of Bullet-Proof Hosting.
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019
Proceedings of the 2019 APWG Symposium on Electronic Crime Research, 2019
2018
CoRR, 2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
Proceedings of the 2018 APWG Symposium on Electronic Crime Research, 2018
Peeling the Onion's User Experience Layer: Examining Naturalistic Use of the Tor Browser.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Proceedings of the 26th International Conference on World Wide Web, 2017
Proceedings of the 10th USENIX Workshop on Cyber Security Experimentation and Test, 2017
To Catch a Ratter: Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Under the Shadow of Sunshine: Understanding and Detecting Bulletproof Hosting on Legitimate Service Provider Networks.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017
Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Halifax, NS, Canada, August 13, 2017
Proceedings of the 2017 Internet Measurement Conference, 2017
Identifying Products in Online Cybercrime Marketplaces: A Dataset for Fine-grained Domain Adaptation.
Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing, 2017
2016
Commun. ACM, 2016
Proceedings of the 25th International Conference on World Wide Web, 2016
Stress Testing the Booters: Understanding and Undermining the Business of DDoS Services.
Proceedings of the 25th International Conference on World Wide Web, 2016
Proceedings of the 10th USENIX Workshop on Offensive Technologies, 2016
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Proceedings of the Financial Cryptography and Data Security, 2016
Proceedings of the Financial Cryptography and Data Security, 2016
Proceedings of the 2016 APWG Symposium on Electronic Crime Research, 2016
Proceedings of the Understanding Social Engineering Based Scams, 2016
Proceedings of the Understanding Social Engineering Based Scams, 2016
Proceedings of the Understanding Social Engineering Based Scams, 2016
2015
Proceedings of the 9th USENIX Workshop on Offensive Technologies, 2015
Proceedings of the 14th Annual Workshop on the Economics of Information Security, 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Proceedings of the Eighth IEEE International Conference on Software Testing, 2015
"I Saw Images I Didn't Even Know I Had": Understanding User Perceptions of Cloud Storage Privacy.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015
2014
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
Proceedings of the 2014 Internet Measurement Conference, 2014
Proceedings of the 2014 APWG Symposium on Electronic Crime Research, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
OCTANE (Open Car Testbed and Network Experiments): Bringing Cyber-Physical Security Research to Researchers and Students.
Proceedings of the 6th Workshop on Cyber Security Experimentation and Test, 2013
Proceedings of the 6th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2013
Proceedings of the 6th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2013
Proceedings of the 2013 APWG eCrime Researchers Summit, 2013
Proceedings of the 2013 APWG eCrime Researchers Summit, 2013
2012
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
Proceedings of the 20th USENIX Security Symposium, 2011
Proceedings of the 20th USENIX Security Symposium, 2011
Proceedings of the 4th Workshop on Cyber Security Experimentation and Test, 2011
Proceedings of the 20th USENIX Security Symposium, 2011
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011
Proceedings of the 11th ACM SIGCOMM Internet Measurement Conference, 2011
Proceedings of the Financial Cryptography and Data Security, 2011
2010
IEEE Trans. Mob. Comput., 2010
Proceedings of the 19th USENIX Security Symposium, 2010
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010
Proceedings of the Global Communications Conference, 2010
2009
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009
Proceedings of the Richard Tapia Celebration of Diversity in Computing Conference 2009: Intellect, 2009
Proceedings of the Privacy Enhancing Technologies, 9th International Symposium, 2009
The Directional Attack on Wireless Localization -or- How to Spoof Your Location with a Tin Can.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009
2008
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008
Proceedings of the Privacy Enhancing Technologies, 2008
Proceedings of the 6th International Conference on Mobile Systems, 2008
Proceedings of the 2008 IEEE International Performance, 2008
2007
Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, 2007
Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, 2007
2006
Proceedings of the 15th USENIX Security Symposium, Vancouver, BC, Canada, July 31, 2006