USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 23 results:
Filters: Author is Damon McCoy [Clear All Filters]
An Audit of Facebook's Political Ad Policy Enforcement. 31st USENIX Security Symposium (USENIX Security 22). :607--624.
.
2022. Swiped: Analyzing Ground-truth Data of a Marketplace for Stolen Debit and Credit Cards. 30th USENIX Security Symposium (USENIX Security 21). :4151--4168.
.
2021. The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums. 29th USENIX Security Symposium (USENIX Security 20). :1893--1909.
.
2020. Clinical Computer Security for Victims of Intimate Partner Violence. 28th USENIX Security Symposium (USENIX Security 19). :105--122.
.
2019. Platforms in Everything: Analyzing Ground-Truth Data on the Anatomy and Economics of Bullet-Proof Hosting. 28th USENIX Security Symposium (USENIX Security 19). :1341--1356.
.
2019. Reading the Tea leaves: A Comparative Analysis of Threat Intelligence. 28th USENIX Security Symposium (USENIX Security 19). :851--867.
.
2019. Schrödinger’s RAT: Profiling the Stakeholders in the Remote Access Trojan Ecosystem. 27th USENIX Security Symposium (USENIX Security 18). :1043--1060.
.
2018. Measuring the Effectiveness of Embedded Phishing Exercises. 10th USENIX Workshop on Cyber Security Experimentation and Test (CSET 17).
.
2017. Investigating Commercial Pay-Per-Install and the Distribution of Unwanted Software. 25th USENIX Security Symposium (USENIX Security 16). :721--739.
.
2016. A Security Analysis of an In-Vehicle Infotainment and App Platform. 10th USENIX Workshop on Offensive Technologies (WOOT 16).
.
2016. You've Got Vulnerability: Exploring Effective Vulnerability Notifications. 25th USENIX Security Symposium (USENIX Security 16). :1033--1050.
.
2016. Fuzzing E-mail Filters with Generative Grammars and N-Gram Analysis. 9th USENIX Workshop on Offensive Technologies (WOOT 15).
.
2015. OCTANE (Open Car Testbed and Network Experiments): Bringing Cyber-Physical Security Research to Researchers and Students. 6th Workshop on Cyber Security Experimentation and Test (CSET 13).
.
2013. There Are No Free iPads: An Analysis of Survey Scams as a Business. 6th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 13).
.
2013. Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse. 22nd USENIX Security Symposium (USENIX Security 13). :195--210.
.
2013. Understanding the Emerging Threat of DDoS-as-a-Service. 6th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 13).
.
2013. PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs. 21st USENIX Security Symposium (USENIX Security 12). :1--16.
.
2012. Comprehensive Experimental Analyses of Automotive Attack Surfaces. 20th USENIX Security Symposium (USENIX Security 11).
.
2011. Dirty Jobs: The Role of Freelance Labor in Web Service Abuse. 20th USENIX Security Symposium (USENIX Security 11).
.
2011. No Plan Survives Contact: Experience with Cybercrime Measurement. 4th Workshop on Cyber Security Experimentation and Test (CSET 11).
.
2011. Show Me the Money: Characterizing Spam-advertised Revenue. 20th USENIX Security Symposium (USENIX Security 11).
.
2011. Re: CAPTCHAs—Understanding CAPTCHA-Solving Services in an Economic Context. 19th USENIX Security Symposium (USENIX Security 10).
.
2010. Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting. 15th USENIX Security Symposium (USENIX Security 06).
.
2006.