Skip to main content

Showing 1–16 of 16 results for author: McCoy, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.04906  [pdf, other

    cs.CR

    Privacy or Transparency? Negotiated Smartphone Access as a Signifier of Trust in Romantic Relationships

    Authors: Periwinkle Doerfler, Kieron Ivy Turk, Chris Geeng, Damon McCoy, Jeffrey Ackerman, Molly Dragiewicz

    Abstract: In this work, we analyze two large-scale surveys to examine how individuals think about sharing smartphone access with romantic partners as a function of trust in relationships. We find that the majority of couples have access to each others' devices, but may have explicit or implicit boundaries on how this access is to be used. Investigating these boundaries and related social norms, we find that… ▽ More

    Submitted 5 July, 2024; originally announced July 2024.

  2. arXiv:2401.17839  [pdf, other

    cs.CL cs.AI cs.IR

    Global-Liar: Factuality of LLMs over Time and Geographic Regions

    Authors: Shujaat Mirza, Bruno Coelho, Yuyuan Cui, Christina Pöpper, Damon McCoy

    Abstract: The increasing reliance on AI-driven solutions, particularly Large Language Models (LLMs) like the GPT series, for information retrieval highlights the critical need for their factuality and fairness, especially amidst the rampant spread of misinformation and disinformation online. Our study evaluates the factual accuracy, stability, and biases in widely adopted GPT models, including GPT-3.5 and G… ▽ More

    Submitted 31 January, 2024; originally announced January 2024.

    Comments: 24 pages, 12 figures, 9 tables

  3. arXiv:2304.11681  [pdf, other

    cs.CR

    Money Over Morals: A Business Analysis of Conti Ransomware

    Authors: Ian W. Gray, Jack Cable, Benjamin Brown, Vlad Cuiujuclu, Damon McCoy

    Abstract: Ransomware operations have evolved from relatively unsophisticated threat actors into highly coordinated cybercrime syndicates that regularly extort millions of dollars in a single attack. Despite dominating headlines and crippling businesses across the globe, there is relatively little in-depth research into the modern structure and economics of ransomware operations. In this paper, we leverage… ▽ More

    Submitted 23 April, 2023; originally announced April 2023.

    Comments: To be published in 2022 APWG Symposium on Electronic Crime Research (eCrime)

  4. arXiv:2301.02737  [pdf, other

    cs.SI

    Understanding the (In)Effectiveness of Content Moderation: A Case Study of Facebook in the Context of the U.S. Capitol Riot

    Authors: Ian Goldstein, Laura Edelson, Minh-Kha Nguyen, Oana Goga, Damon McCoy, Tobias Lauinger

    Abstract: Social media networks commonly employ content moderation as a tool to limit the spread of harmful content. However, the efficacy of this strategy in limiting the delivery of harmful content to users is not well understood. In this paper, we create a framework to quantify the efficacy of content moderation and use our metrics to analyze content removal on Facebook within the U.S. news ecosystem. In… ▽ More

    Submitted 21 February, 2023; v1 submitted 6 January, 2023; originally announced January 2023.

  5. Conspiracy Brokers: Understanding the Monetization of YouTube Conspiracy Theories

    Authors: Cameron Ballard, Ian Goldstein, Pulak Mehta, Genesis Smothers, Kejsi Take, Victoria Zhong, Rachel Greenstadt, Tobias Lauinger, Damon McCoy

    Abstract: Conspiracy theories are increasingly a subject of research interest as society grapples with their rapid growth in areas such as politics or public health. Previous work has established YouTube as one of the most popular sites for people to host and discuss different theories. In this paper, we present an analysis of monetization methods of conspiracy theorist YouTube creators and the types of adv… ▽ More

    Submitted 31 May, 2022; originally announced May 2022.

    Journal ref: WWW 2022 Proceedings of the ACM Web Conference, April 2022, Pages 2707-2718

  6. arXiv:2202.09527  [pdf, other

    cs.CY

    Ethics and Efficacy of Unsolicited Anti-Trafficking SMS Outreach

    Authors: Rasika Bhalerao, Nora McDonald, Hanna Barakat, Vaughn Hamilton, Damon McCoy, Elissa M. Redmiles

    Abstract: The sex industry exists on a continuum based on the degree of work autonomy present in labor conditions: a high degree exists on one side of the continuum where independent sex workers have a great deal of agency, while much less autonomy exists on the other side, where sex is traded under conditions of human trafficking. Organizations across North America perform outreach to sex industry workers… ▽ More

    Submitted 19 February, 2022; originally announced February 2022.

  7. arXiv:2104.11145  [pdf, other

    cs.CY

    "I'm a Professor, which isn't usually a dangerous job": Internet-Facilitated Harassment and its Impact on Researchers

    Authors: Periwinkle Doerfler, Andrea Forte, Emiliano De Cristofaro, Gianluca Stringhini, Jeremy Blackburn, Damon McCoy

    Abstract: While the Internet has dramatically increased the exposure that research can receive, it has also facilitated harassment against scholars. To understand the impact that these attacks can have on the work of researchers, we perform a series of systematic interviews with researchers including academics, journalists, and activists, who have experienced targeted, Internet-facilitated harassment. We pr… ▽ More

    Submitted 22 April, 2021; v1 submitted 22 April, 2021; originally announced April 2021.

  8. arXiv:2102.05470  [pdf, other

    cs.CY cs.SI physics.soc-ph

    The illicit trade of COVID-19 vaccines on the dark web

    Authors: Alberto Bracci, Matthieu Nadini, Maxwell Aliapoulios, Damon McCoy, Ian Gray, Alexander Teytelboym, Angela Gallo, Andrea Baronchelli

    Abstract: Early analyses revealed that dark web marketplaces (DWMs) started offering COVID-19 related products (e.g., masks and COVID-19 tests) as soon as the COVID-19 pandemic started, when these goods were in shortage in the traditional economy. Here, we broaden the scope and depth of previous investigations by analysing 194 DWMs until July 2021, including the crucial period in which vaccines became avail… ▽ More

    Submitted 4 April, 2022; v1 submitted 10 February, 2021; originally announced February 2021.

    Comments: For the "before the vaccine" report see https://doi.org/10.1140/epjds/s13688-021-00259-w

  9. Understanding Incentivized Mobile App Installs on Google Play Store

    Authors: Shehroze Farooqi, Álvaro Feal, Tobias Lauinger, Damon McCoy, Zubair Shafiq, Narseo Vallina-Rodriguez

    Abstract: "Incentivized" advertising platforms allow mobile app developers to acquire new users by directly paying users to install and engage with mobile apps (e.g., create an account, make in-app purchases). Incentivized installs are banned by the Apple App Store and discouraged by the Google Play Store because they can manipulate app store metrics (e.g., install counts, appearance in top charts). Yet, ma… ▽ More

    Submitted 4 October, 2020; originally announced October 2020.

    Journal ref: ACM Internet Measurement Conference (2020)

  10. arXiv:2008.01585  [pdf, other

    cs.CY cs.SI physics.soc-ph

    Dark Web Marketplaces and COVID-19: before the vaccine

    Authors: Alberto Bracci, Matthieu Nadini, Maxwell Aliapoulios, Damon McCoy, Ian Gray, Alexander Teytelboym, Angela Gallo, Andrea Baronchelli

    Abstract: The COVID-19 pandemic has reshaped the demand for goods and services worldwide. The combination of a public health emergency, economic distress, and misinformation-driven panic have pushed customers and vendors towards the shadow economy. In particular, dark web marketplaces (DWMs), commercial websites accessible via free software, have gained significant popularity. Here, we analyse 851,199 listi… ▽ More

    Submitted 26 January, 2021; v1 submitted 4 August, 2020; originally announced August 2020.

    Journal ref: EPJ Data Sci. 10, 6 (2021)

  11. arXiv:2005.14341  [pdf, other

    cs.CR cs.SI

    The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums

    Authors: Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, Thomas Ristenpart

    Abstract: Abusers increasingly use spyware apps, account compromise, and social engineering to surveil their intimate partners, causing substantial harms that can culminate in violence. This form of privacy violation, termed intimate partner surveillance (IPS), is a profoundly challenging problem to address due to the physical access and trust present in the relationship between the target and attacker. Whi… ▽ More

    Submitted 28 May, 2020; originally announced May 2020.

  12. arXiv:1902.04385  [pdf, other

    cs.SI

    An Analysis of United States Online Political Advertising Transparency

    Authors: Laura Edelson, Shikhar Sakhuja, Ratan Dey, Damon McCoy

    Abstract: During the summer of 2018, Facebook, Google, and Twitter created policies and implemented transparent archives that include U.S. political advertisements which ran on their platforms. Through our analysis of over 1.3 million ads with political content, we show how different types of political advertisers are disseminating U.S. political messages using Facebook, Google, and Twitter's advertising pl… ▽ More

    Submitted 12 February, 2019; originally announced February 2019.

  13. arXiv:1812.00381  [pdf, other

    cs.CR cs.CL cs.LG

    Towards Automatic Discovery of Cybercrime Supply Chains

    Authors: Rasika Bhalerao, Maxwell Aliapoulios, Ilia Shumailov, Sadia Afroz, Damon McCoy

    Abstract: Cybercrime forums enable modern criminal entrepreneurs to collaborate with other criminals into increasingly efficient and sophisticated criminal endeavors. Understanding the connections between different products and services can often illuminate effective interventions. However, generating this understanding of supply chains currently requires time-consuming manual effort. In this paper, we pr… ▽ More

    Submitted 4 December, 2018; v1 submitted 2 December, 2018; originally announced December 2018.

  14. arXiv:1805.04494  [pdf, other

    cs.CR

    Under the Underground: Predicting Private Interactions in Underground Forums

    Authors: Rebekah Overdorf, Carmela Troncoso, Rachel Greenstadt, Damon McCoy

    Abstract: Underground forums where users discuss, buy, and sell illicit services and goods facilitate a better understanding of the economy and organization of cybercriminals. Prior work has shown that in particular private interactions provide a wealth of information about the cybercriminal ecosystem. Yet, those messages are seldom available to analysts, except when there is a leak. To address this problem… ▽ More

    Submitted 11 May, 2018; originally announced May 2018.

  15. Identifying Products in Online Cybercrime Marketplaces: A Dataset for Fine-grained Domain Adaptation

    Authors: Greg Durrett, Jonathan K. Kummerfeld, Taylor Berg-Kirkpatrick, Rebecca S. Portnoff, Sadia Afroz, Damon McCoy, Kirill Levchenko, Vern Paxson

    Abstract: One weakness of machine-learned NLP models is that they typically perform poorly on out-of-domain data. In this work, we study the task of identifying products being bought and sold in online cybercrime forums, which exhibits particularly challenging cross-domain effects. We formulate a task that represents a hybrid of slot-filling information extraction and named entity recognition and annotate d… ▽ More

    Submitted 31 August, 2017; originally announced August 2017.

    Comments: To appear at EMNLP 2017

    ACM Class: I.2.7

    Journal ref: EMNLP (2017) 2598-2607

  16. arXiv:1508.03410  [pdf, other

    cs.CR

    Stress Testing the Booters: Understanding and Undermining the Business of DDoS Services

    Authors: Mohammad Karami, Youngsam Park, Damon McCoy

    Abstract: DDoS-for-hire services, also known as booters, have commoditized DDoS attacks and enabled abusive subscribers of these services to cheaply extort, harass and intimidate businesses and people by knocking them offline. However, due to the underground nature of these booters, little is known about their underlying technical and business structure. In this paper we empirically measure many facets of t… ▽ More

    Submitted 13 August, 2015; originally announced August 2015.