Damon McCoy

ORCID: 0000-0001-7386-7260
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Spam and Phishing Detection
  • Cybercrime and Law Enforcement Studies
  • Internet Traffic Analysis and Secure E-voting
  • Advanced Malware Detection Techniques
  • Crime, Illicit Activities, and Governance
  • Network Security and Intrusion Detection
  • Hate Speech and Cyberbullying Detection
  • Social Media and Politics
  • Sexuality, Behavior, and Technology
  • Wireless Networks and Protocols
  • User Authentication and Security Systems
  • Privacy, Security, and Data Protection
  • Gender, Feminism, and Media
  • Blockchain Technology Applications and Security
  • Vehicular Ad Hoc Networks (VANETs)
  • Sex work and related issues
  • Misinformation and Its Impacts
  • Bullying, Victimization, and Aggression
  • Advanced Steganography and Watermarking Techniques
  • Privacy-Preserving Technologies in Data
  • Opportunistic and Delay-Tolerant Networks
  • Bluetooth and Wireless Communication Technologies
  • Authorship Attribution and Profiling
  • Veterinary Equine Medical Research
  • Stock Market Forecasting Methods

New York University
2015-2024

Drexel University
2022

International Computer Science Institute
2015-2020

IMDEA Networks
2020

Universidad Carlos III de Madrid
2020

University of California, Davis
2020

University of Iowa
2020

Max Planck Institute for Software Systems
2017

University of California, Berkeley
2015-2017

Carnegie Mellon University
2017

Modern automobiles are no longer mere mechanical devices; they pervasively monitored and controlled by dozens of digital computers coordinated via internal vehicular networks. While this transformation has driven major advancements in efficiency safety, it also introduced a range new potential risks. In paper we experimentally evaluate these issues on modern automobile demonstrate the fragility underlying system structure. We that an attacker who is able to infiltrate virtually any...

10.1109/sp.2010.34 article EN IEEE Symposium on Security and Privacy 2010-01-01

Bitcoin is a purely online virtual currency, unbacked by either physical commodities or sovereign obligation; instead, it relies on combination of cryptographic protection and peer-to-peer protocol for witnessing settlements. Consequently, has the unintuitive property that while ownership money implicitly anonymous, its flow globally visible. In this paper we explore unique characteristic further, using heuristic clustering to group wallets based evidence shared authority, then...

10.1145/2504730.2504747 article EN 2013-10-22

Tor has become one of the most popular overlay networks for anonymizing TCP traffic. Its popularity is due in part to its perceived strong anonymity properties and relatively low latency service. Low achieved through Tor's ability balance traffic load by optimizing router selection probabilistically favor routers with high bandwidth capabilities.

10.1145/1314333.1314336 article EN 2007-10-29

Underground forums, where participants exchange information on abusive tactics and engage in the sale of illegal goods services, are a form online social network (OSN). However, unlike traditional OSNs such as Facebook, underground forums pattern communications does not simply encode pre-existing relationships, but instead captures dynamic trust relationships forged between mutually distrustful parties. In this paper, we empirically characterize six different --- BlackHatWorld, Carders,...

10.1145/2068816.2068824 article EN 2011-11-02

Bitcoin is a purely online virtual currency, unbacked by either physical commodities or sovereign obligation; instead, it relies on combination of cryptographic protection and peer-to-peer protocol for witnessing settlements. Consequently, has the unintuitive property that while ownership money implicitly anonymous, its flow globally visible. In this paper we explore unique characteristic further, using heuristic clustering to group wallets based evidence shared authority, then...

10.1145/2896384 article EN Communications of the ACM 2016-03-23

Ransomware is a type of malware that encrypts the files infected hosts and demands payment, often in crypto-currency like Bitcoin. In this paper, we create measurement framework use to perform large-scale, two-year, end-to-end ransomware payments, victims, operators. By combining an array data sources, including binaries, seed ransom victim telemetry from infections, large database bitcoin addresses annotated with their owners, sketch outlines burgeoning ecosystem associated third-party...

10.1109/sp.2018.00047 article EN 2022 IEEE Symposium on Security and Privacy (SP) 2018-05-01

We investigate the emergence of exploit-as-a-service model for driveby browser compromise. In this regime, attackers pay an exploit kit or service to do "dirty work" exploiting a victim's browser, decoupling complexities and plugin vulnerabilities from challenges generating traffic website under attacker's control. Upon successful exploit, these kits load execute binary provided by attacker, effectively transferring control machine attacker.

10.1145/2382196.2382283 article EN Proceedings of the ACM Conference on Computer and Communications Security 2012-10-15

Survivors of intimate partner violence increasingly report that abusers install spyware on devices to track their location, monitor communications, and cause emotional physical harm. To date there has been only cursory investigation into the used in such surveillance (IPS). We provide first in-depth study IPS ecosystem. design, implement, evaluate a measurement pipeline combines web app store crawling with machine learning find label apps are potentially dangerous contexts. Ultimately we...

10.1109/sp.2018.00061 article EN 2022 IEEE Symposium on Security and Privacy (SP) 2018-05-01

Stylometry is a method for identifying anonymous authors of texts by analyzing their writing style. While stylometric methods have produced impressive results in previous experiments, we wanted to explore performance on challenging dataset particular interest the security research community. Analysis underground forums can provide key information about who controls given bot network or sells service, and size scope cybercrime underworld. Previous analyses been accomplished primarily through...

10.1109/sp.2014.21 article EN IEEE Symposium on Security and Privacy 2014-05-01

Today, web injection manifests in many forms, but fundamentally occurs when malicious and unwanted actors tamper directly with browser sessions for their own profit. In this work we illuminate the scope negative impact of one these ad injection, which users have ads imposed on them addition to, or different from, those that websites originally sent them. We develop a multi-staged pipeline identifies wild captures its distribution revenue chains. find has entrenched itself as cross-browser...

10.1109/sp.2015.17 article EN IEEE Symposium on Security and Privacy 2015-05-01

We argue that existing security, privacy, and antiabuse protections fail to address the growing threat of online hate harassment. In order for our community understand this gap, we propose a taxonomy reasoning about Our draws on over 150 interdisciplinary research papers cover disparate threats ranging from intimate partner violence coordinated mobs. process, identify seven classes attacks—such as toxic content surveillance—that each stem different attacker capabilities intents. also provide...

10.1109/sp40001.2021.00028 article EN 2022 IEEE Symposium on Security and Privacy (SP) 2021-05-01

We present the design and evaluation of an 802.11-like wireless link layer protocol that obfuscates all transmitted bits to increase privacy. This includes explicit identifiers such as MAC addresses, contents management messages, other fields existing 802.11 relies on be sent in clear. By obscuring these fields, we greatly difficulty identifying or profiling users from their transmissions ways are otherwise straightforward. Our design, called SlyFi, is nearly efficient schemes WPA for...

10.1145/1378600.1378607 article EN 2008-06-17

Underground forums are widely used by criminals to buy and sell a host of stolen items, datasets, resources, criminal services. These contain important resources for understanding cybercrime. However, the number forums, their size, domain expertise required understand markets makes manual exploration these unscalable. In this work, we propose an automated, top-down approach analyzing underground forums. Our uses natural language processing machine learning automatically generate high-level...

10.1145/3038912.3052600 article EN 2017-04-03

At the current stratospheric value of Bitcoin, miners with access to significant computational horsepower are literally printing money.For example, first operator a USD $1,500 custom ASIC mining platform claims have recouped his investment in less than three weeks early February 2013, and bitcoin has more tripled since then.Not surprisingly, cybercriminals also been drawn this potentially lucrative endeavor, but instead leveraging resources available them: stolen CPU hours form botnets.We...

10.14722/ndss.2014.23044 article EN 2014-01-01
Coming Soon ...