2011
An Analysis of Underground Forums
Marti Motoyama, Damon McCoy, Stefan Savage, and Geoffrey M. Voelker
Proceedings of the ACM Internet Measurement Conference, Berlin, CA, November 2011.
Comprehensive Experimental Analysis of Automototive Attack Surfaces
Stephen Checkoway, Damon McCoy, Danny Anderson, Brian Kantor, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, Tadayoshi Kohno
Proceedings of the USENIX Security Symposium, San Francisco, CA, August 2011.
[ New York Times ]
Dirty Jobs: The Role of Freelance Labor in Web Service Abuse
Marti Motoyama, Damon McCoy, Kirill Levchenko, Geoffrey M. Voelker, Stefan Savage
Proceedings of the USENIX Security Symposium, San Francisco, CA, August 2011.
Show Me the Money: Characterizing Spam-advertised Revenue
Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorson, Christian Kreibich, Kirill Levchenko, Vern Paxson, Geoffrey M. Voelker, Stefan Savage
Proceedings of the USENIX Security Symposium, San Francisco, CA, August 2011.
No Plan Survives Contact: Experience with Cybercrime Measurement
Chris Kanich, Neha Chachra, Damon McCoy, Chris Grier, David Wang, Marti Motoyama, Kirill Levchenko, Stefan Savage, Geoffrey M. Veolker
Proceedings of Workshop on Cyber Security Experimentation and Test (CSET), August 2011.
ExperimenTor: A Testbed for Safe and Realistic Tor Experimentation
Kevin Bauer, Micah Sherr, Damon McCoy, Dirk Grunwald
To appear at 4th USENIX Workshop on Cyber Security Experimentation and Test (CSET) San Francisco, CA, August 2011
DefenestraTor: Throwing out Windows in Tor
Mashael AlSabah, Kevin Bauer, Ian Goldberg, Dirk Grunwald, Damon McCoy, Stefan Savage, Geoffrey M. Voelker
Privacy Enhancing Technologies Symposium, Waterloo, Canada, July 2011
Click Trajectories: End-to-End Analysis of the Spam Value Chain
Kirill Levchenko, Neha Chachra, Brandon Enright, Mark Felegyhazi, Chris Grier, Tristan Halvorson, Chris Kanich, Christian Kreibich, He Liu, Damon McCoy, Andreas Pitsillidis, Nicholas Weaver, Vern Paxson, Geoffrey M. Voelker, Stefan Savage
Proceedings of the IEEE Symposium and Security and Privacy, Oakland, CA, May 2011
[ The New York Times, CBS ]
Proximax: A Measurement Based System for Proxies Dissemination
Damon McCoy, Jose Andre Morales, Kirill Levchenko
Financial Cryptography and Data Security, St. Lucia, February 2011

2010
Practical Defenses for Evil Twin Attacks in 802.11
Harold Gonzales, Kevin Bauer, Janne Lindqvist, Damon McCoy, Douglas Sicker
IEEE Globecom Communications and Information Security Symposium, Miami, FL, December 2010
Wifi-Reports: Improving Wireless Network Selection with Collaboration
Jeffrey Pang, Ben Greenstein, Michael Kaminsky, Damon McCoy, Srinivasan Seshan
IEEE Transactions On Mobile Computing, Vol. 9 2010
[ Wifi-Scanner Tool, Crawdad Data Set ]
Re: CAPTCHAs -- Understanding CAPTCHA Solving from an Economic Context
Marti Motoyama, Kirill Levchenko, Chris Kanich, Damon McCoy, Geoffrey M. Voelker, Stefan Savage
Proceedings of the USENIX Security Symposium, Washington, D.C., August 2010.
[ NPR, MIT Technology Review ]
Experimental Security Analysis of a Modern Automobile
Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage
Proceedings of the IEEE Symposium and Security and Privacy, Oakland, CA, May 2010
[ Automotive Security Project Web Page ] [ The New York Times, PC World, Technology Review, Slashdot, Popular Science, BBC ]

2009
BitStalker: Accurately and Efficiently Monitoring BitTorrent Traffic
Kevin Bauer, Damon McCoy, Dirk Grunwald, Douglas Sicker
Proceedings of the 1st IEEE Workshop on Information Forensics and Security , London, United Kingdom, December, 2009
[Slashdot]
The Directional Attack on Wireless Localization - or - How to Spoof your Location with a Tin Can
Kevin Bauer, Damon McCoy, Eric Anderson, Markus Breitenbach, Greg Grudic, Dirk Grunwald, Douglas Sicker
Proceedings of the IEEE Globecom Communications and Information Security Symposium , Honolulu, HI, USA, November, 2009
[ Crawdad Data Set]
Physical Layer Attacks on Unlinkability in Wireless LANs
Kevin Bauer, Damon McCoy, Ben Greenstein, Dirk Grunwald, Douglas Sicker
Proceedings of the 9th Privacy Enhancing Technologies Symposium (PETS 2009) , Seattle, WA, USA, August, 2009
[ Crawdad Data Set]
Wifi-Reports: Improving Wireless Network Selection with Collaboration
Jeffrey Pang, Ben Greenstein, Michael Kaminsky, Damon McCoy, Srinivasan Seshan
MobiSys '09: 7th International Conference on Mobile Systems, Applications, and Services, 2009, Krakow, Poland
[ Wifi-Scanner Tool Crawdad Data Set]

2008
Mitigating Evil Twin Attacks in 802.11
Kevin Bauer, Harold Gonzales, Damon McCoy
Proceedings of 1st IEEE International Workshop on Information and Data Assurance (WIDA 2008) in conjunction with the 27th IEEE International Performance Computing and Communications Conference (IPCCC 2008) , Austin, TX, USA, December, 2008
BitBlender: Light-Weight Anonymity for BitTorrent
Kevin Bauer, Damon McCoy, Dirk Grunwald, Douglas Sicker
Proceedings of the Workshop on Applications of Private and Anonymous Communications (AlPACa 2008) in conjunction with SecureComm 2008 , Istanbul, Turkey, September, 2008
Shining Light in Dark Places: Understanding the Tor Network
Damon McCoy, Kevin Bauer, Dirk Grunwald, Tadayoshi Kohno, Douglas Sicker
Proceedings of the 8th Privacy Enhancing Technologies Symposium (PETS 2008) , Leuven, Belgium, July, 2008
Improving Wireless Privacy with an Identifier-Free Link Layer Protocol (Best Paper Award.)
Ben Greenstein, Damon McCoy, Jeffrey Pang, Tadayoshi Kohno, Srinivasan Seshan, David Wetherall
MobiSys '08: 6th International Conference on Mobile Systems, Application, and Services , Breckenridge, CO, USA, June, 2008
[ More information (including SlyFi code) ]

2007
Tryst: The Case for Confidential Service Discovery
Jeffrey Pang, Ben Greenstein, Damon McCoy, Srinivasan Seshan, David Wetherall
HotNets VI: The Sixth Workshop on Hot Topics in Networks , Atlanta, GA, USA, October, 2007
Low-Resource Routing Attacks Against Tor
Kevin Bauer, Damon McCoy, Dirk Grunwald, Tadayoshi Kohno, Douglas Sicker
Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2007) , Alexandria, VA, USA, October, 2007
[ Slashdot FAQ Technical Report ]
A Mechanism for Detecting and Responding to Misbehaving Nodes in Wireless Networks
Damon McCoy, Douglas Sicker, Dirk Grunwald
SDR Workshop, IEEE SECON , 2007

2006
Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting
Jason Franklin, Damon McCoy, Parisa Tabriz, Vicentiu Neagoe, Jamie Van Randwyk, Douglas Sicker
Proceedings of the 15th USENIX Security Symposium , Vancouver, BC, Canada, August, 2006
[Slashdot Sandia Labs CNBC (WMV Video)]