Damon's Photo

Damon McCoy


Associate Professor
Computer Science and Engineering Department
Tandon School of Engineering
New York University

E-Mail: mccoy@nyu.edu
Office: 10.082 2 Metro Tech
Mail: 2 Metro Tech, Brooklyn, NY 11201 USA

NYU

My research focuses on empirically measuring the security and privacy of technology systems and their intersections with society. Some of my current projects explore the socio-economics of e-crime, censorship evasion, anonymous communication, cyber-physical systems. More generally, I am interested in exploring and improving the security and privacy of large-scale systems.

Recent Publications
Swiped: Analyzing Ground-truth Data of a Marketplace for Stolen Debit and Credit Cards
Maxwell Aliapoulios, Cameron Ballard, Rasika Bhalerao, Tobias Lauinger, Damon McCoy
Proceedings of the USENIX Security Symposium, August 2021

SoK: Hate, Harassment, and the Changing Landscape of Online Abuse
Kurt Thomas, Devdatta Akhawe, Michael Bailey, Dan Boneh, Elie Bursztein, Sunny Consolvo, Nicola Dell, Zakir Durumeric, Patrick Gage Kelley, Deepak Kumar, Damon McCoy, Sarah Meiklejohn, Thomas Ristenpart, Gianluca Stringhini.
IEEE Symposium on Security and Privacy (Oakland), May 2021

Understanding Incentivized Mobile App Installs on Google Play Store
Shehroze Farooqi, Alvaro Feal, Tobias Lauinger, Damon McCoy, Zubair Shafiq, Narseo Vallina-Rodriguez
Proceedings of the ACM Internet Measurement Conference (IMC), October 2020

"So-called privacy breeds evil": Narrative Justifications for Intimate Partner Surveillance in Online Forums.
Rosanna Bellini, Emily Tseng, Nora McDonald, Rachel Greenstadt, Damon McCoy, Thomas Ristenpart, Nicola Dell
Proceedings of the ACM on Human-Computer Interaction, Issue CSCW, October 2020

The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums
Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, Thomas Ristenpart
Proceedings of the USENIX Security Symposium, August 2020

A Security Analysis of the Facebook Ad Library
Laura Edelson, Tobias Lauinger, Damon McCoy
IEEE Symposium on Security & Privacy (Oakland), San Francisco, CA, May 2020

The Many Kinds of Creepware Used for Interpersonal Attacks
Kevin A. Roundy, Paula Barmaimon Mendelberg, Nicola Dell, Damon McCoy, Daniel Nissani, Thomas Ristenpart, and Acar Tamersoy
IEEE Symposium on Security & Privacy (Oakland), San Francisco, CA, May 2020

The Pod People: Understanding Manipulation of Social Media Popularity via Reciprocity Abuse
Janith Weerasinghe, Bailey Flanigan, Aviel Stein, Damon McCoy, and Rachel Greenstadt
Proceedings of the Web Conference (WWW), April 2020

Dark Matter: Uncovering the DarkComet RAT Ecosystem
Brown Farinholt, Mohammad Rezaeirad, Damon McCoy, and Kirill Levchenko
Proceedings of the Web Conference (WWW), April 2020

Mapping the Underground: Supervised Discovery of Cybercrime Supply Chains
Rasika Bhalerao, Maxwell Aliapoulios, Ilia Shumailov, Sadia Afroz, Damon McCoy
IEEE APWG Symposium on Electronic Crime Research (eCrime), Pittsburgh, PA, November 2019

Platforms in Everything: Analyzing Ground-Truth Data on the Anatomy and Economics of Bullet-Proof Hosting
Arman Noroozian, Jan Koenders, Eelco van Veldhuizen, Carlos H. Ganan, Sumayah Alrwais, Damon McCoy, and Michel van Eeten
Proceedings of the USENIX Security Symposium, Santa Clara, CA, August 2019

Clinical Computer Security for Victims of Intimate Partner Violence
Sam Havron, Diana Freed, Rahul Chatterjee, Damon McCoy, Nicola Dell, and Thomas Ristenpart
Proceedings of the USENIX Security Symposium, Santa Clara, CA, August 2019

Reading the Tea Leaves: A Comparative Analysis of Threat Intelligence
Vector Guo Li, Matthew Dunn, Paul Pearce, Damon McCoy, Geoffrey M. Voelker, Stefan Savage, and Kirill Levchenko
Proceedings of the USENIX Security Symposium, Santa Clara, CA, August 2019

Iniquitous Cord-Cutting:An Analysis of Infringing IPTV Services
Prakhar Pandey, Maxwell Aliapoulios and Damon McCoy
Proceedings of the Workshop on Attackers and Cyber-Crime Operations (WACCO), Stockholm, Sweden, June 2019

Evaluating Login Challenges as a Defense Against Account Takeover
Periwinkle Doerfler, Maija Marincenko, Juri Ranieri, Yu Jiang, Angelika Moscicki, Damon McCoy, and Kurt Thomas
Proceedings of the Web Conference (WWW), San Francisco, CA, May 2019

Full Publication List
Students
PhD
Maxwell Aliapoulios
Cameron Ballard
Rasika Bhalerao
Periwinkle Doerfler
Laura Edelson
Ian Goldstein
Paz Grimberg

Graduated
Ryan Brunt (MS 2019) Goldman Sacks
Mohammad Rezaeirad (PhD 2019) Blue Cross Blue Shield -> Goldman Sacks
Mohammad Karami (PhD 2016) Google
Sean Palka (PhD 2015) Booz Allen Hamilton -> CrowdStrike
Jason Clark (PhD 2014) CMU SEI->Raytheon
Hitesh Dharmdasani (MS 2013) FireEye -> Informant Networks
Teaching
CS 468 (Secure Programming and Systems) Spring 2014 (GMU)
ISA 656 (Network Security) Fall 2013 (GMU)
ISA 656 (Network Security) Spring 2013 (GMU)
CS 795-004/ISA 797-002 (Cyber Crime) Fall 2012
ISA 656 (Network Security) Spring 2012