D
Damon McCoy
Researcher at New York University
Publications - Â 131
Citations - Â 9631
Damon McCoy is an academic researcher from New York University. The author has contributed to research in topics: Computer science & Wireless network. The author has an hindex of 40, co-authored 120 publications receiving 8316 citations. Previous affiliations of Damon McCoy include University of Colorado Boulder & Institute of Company Secretaries of India.
Papers
More filters
Proceedings ArticleDOI
Experimental Security Analysis of a Modern Automobile
Karl Koscher,Alexei Czeskis,Franziska Roesner,Shwetak N. Patel,Tadayoshi Kohno,Stephen Checkoway,Damon McCoy,Brian Kantor,Danny Anderson,Hovav Shacham,Stefan Savage +10 more
TL;DR: It is demonstrated that an attacker who is able to infiltrate virtually any Electronic Control Unit (ECU) can leverage this ability to completely circumvent a broad array of safety-critical systems and present composite attacks that leverage individual weaknesses.
Proceedings Article
Comprehensive experimental analyses of automotive attack surfaces
Stephen Checkoway,Damon McCoy,Brian Kantor,Danny Anderson,Hovav Shacham,Stefan Savage,Karl Koscher,Alexei Czeskis,Franziska Roesner,Tadayoshi Kohno +9 more
TL;DR: This work discovers that remote exploitation is feasible via a broad range of attack vectors (including mechanics tools, CD players, Bluetooth and cellular radio), and further, that wireless communications channels allow long distance vehicle control, location tracking, in-cabin audio exfiltration and theft.
Proceedings ArticleDOI
A fistful of bitcoins: characterizing payments among men with no names
Sarah Meiklejohn,Marjori Pomarole,Grant Jordan,Kirill Levchenko,Damon McCoy,Geoffrey M. Voelker,Stefan Savage +6 more
TL;DR: From this analysis, longitudinal changes in the Bitcoin market are characterized, the stresses these changes are placing on the system, and the challenges for those seeking to use Bitcoin for criminal or fraudulent purposes at scale are defined.
Proceedings ArticleDOI
Low-resource routing attacks against tor
TL;DR: The extent to which routing performance optimizations have left the system vulnerable to end-to-end traffic analysis attacks from non-global adversaries with minimal resources is shown.
Book ChapterDOI
Shining Light in Dark Places: Understanding the Tor Network
TL;DR: A survey of how Tor is being misused, both by clients and by Tor router operators is provided, and a method for detecting exit router logging is developed.