Experimental security analysis of a modern automobile K Koscher, A Czeskis, F Roesner, S Patel, T Kohno, S Checkoway, ... IEEE Symposium on Security and Privacy (SP), 2010 | 2519 | 2010 |
Comprehensive experimental analyses of automotive attack surfaces S Checkoway, D McCoy, B Kantor, D Anderson, H Shacham, S Savage, ... 20th USENIX security symposium (USENIX Security 11), 2011 | 2238 | 2011 |
A fistful of bitcoins: characterizing payments among men with no names S Meiklejohn, M Pomarole, G Jordan, K Levchenko, D McCoy, ... Proceedings of the 2013 conference on Internet measurement conference, 127-140, 2013 | 1845 | 2013 |
{Trafficking} Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse K Thomas, D McCoy, C Grier, A Kolcz, V Paxson 22nd USENIX Security Symposium (USENIX Security 13), 195-210, 2013 | 634* | 2013 |
Shining light in dark places: Understanding the Tor network D McCoy, K Bauer, D Grunwald, T Kohno, D Sicker Privacy Enhancing Technologies: 8th International Symposium, PETS 2008 …, 2008 | 568 | 2008 |
Low-resource routing attacks against Tor K Bauer, D McCoy, D Grunwald, T Kohno, D Sicker Proceedings of the 2007 ACM workshop on Privacy in electronic society, 11-20, 2007 | 484 | 2007 |
An analysis of underground forums M Motoyama, D McCoy, K Levchenko, S Savage, GM Voelker Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement …, 2011 | 398 | 2011 |
Click trajectories: End-to-end analysis of the spam value chain K Levchenko, A Pitsillidis, N Chachra, B Enright, M Félegyházi, C Grier, ... 2011 ieee symposium on security and privacy, 431-446, 2011 | 373 | 2011 |
Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting. J Franklin, D McCoy, P Tabriz, V Neagoe, JV Randwyk, D Sicker USENIX Security Symposium 3 (2006), 16-89, 2006 | 359 | 2006 |
Re:{CAPTCHAs—Understanding}{CAPTCHA-Solving} Services in an Economic Context M Motoyama, K Levchenko, C Kanich, D McCoy, GM Voelker, S Savage 19th USENIX Security Symposium (USENIX Security 10), 2010 | 308 | 2010 |
Manufacturing compromise: the emergence of exploit-as-a-service C Grier, L Ballard, J Caballero, N Chachra, CJ Dietrich, K Levchenko, ... Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 305 | 2012 |
Tracking ransomware end-to-end DY Huang, MM Aliapoulios, VG Li, L Invernizzi, E Bursztein, K McRoberts, ... 2018 IEEE Symposium on Security and Privacy (SP), 618-631, 2018 | 255 | 2018 |
The Spyware Used in Intimate Partner Violence R Chatterjee, T Ristenpart, P Doerfler, H Orgad, S Havron, J Palmer, ... The Spyware Used in Intimate Partner Violence, 0, 2018 | 201 | 2018 |
Improving wireless privacy with an identifier-free link layer protocol B Greenstein, D McCoy, J Pang, T Kohno, S Seshan, D Wetherall Proceedings of the 6th international conference on Mobile systems …, 2008 | 189 | 2008 |
Pharmaleaks: Understanding the business of online pharmaceutical affiliate programs D McCoy, A Pitsillidis, G Jordan, N Weaver, C Kreibich, B Krebs, ... Proceedings of USENIX Security, 2012 | 178 | 2012 |
Doppelgänger finder: Taking stylometry to the underground S Afroz, AC Islam, A Stolerman, R Greenstadt, D McCoy 2014 IEEE Symposium on Security and Privacy, 212-226, 2014 | 176 | 2014 |
Show me the money: Characterizing spam-advertised revenue C Kanich, N Weaver, D McCoy, T Halvorson, C Kreibich, K Levchenko, ... 20th USENIX Security Symposium (USENIX Security 11), 2011 | 167 | 2011 |
You've got vulnerability: Exploring effective vulnerability notifications F Li, Z Durumeric, J Czyz, M Karami, M Bailey, D McCoy, S Savage, ... 25th USENIX Security Symposium (USENIX Security 16), 1033-1050, 2016 | 166 | 2016 |
Ad injection at scale: Assessing deceptive advertisement modifications K Thomas, E Bursztein, C Grier, G Ho, N Jagpal, A Kapravelos, D McCoy, ... 2015 IEEE Symposium on Security and Privacy, 151-167, 2015 | 160 | 2015 |
Sok: Hate, harassment, and the changing landscape of online abuse K Thomas, D Akhawe, M Bailey, D Boneh, E Bursztein, S Consolvo, ... 2021 IEEE Symposium on Security and Privacy (SP), 247-267, 2021 | 150 | 2021 |