You are here

USENIX is fully committed to the Open Access to research movement. To that end, all videos of conference technical session presentations are now available to the general public on the USENIX website shortly after they take place. In addition, we have offered free online access to conference proceedings since 2008. Visit our proceedings page to check out the latest papers.

Interested in helping us support Open Access at USENIX? Become a member today!

To find a specific conference's videos, begin by filtering by conference group and then filter by conference.

Filter by Conference Group

Multimedia

    TitleConferenceSpeaker(s)
    Q: Why Do Keynote Speakers Keep Suggesting That Improving Security Is Possible? A: Because Keynote Speakers Make Bad Life Decisions and Are Poor Role ModelsUSENIX Security '18James Mickens
    Fear the Reaper: Characterization and Fast Detection of Card SkimmersUSENIX Security '18Nolen Scaife, Christian Peeters, Patrick Traynor
    BlackIoT: IoT Botnet of High Wattage Devices Can Disrupt the Power GridUSENIX Security '18Saleh Soltan, Prateek Mittal, H. Vincent Poor
    Skill Squatting Attacks on Amazon AlexaUSENIX Security '18Deepak Kumar, Riccardo Paccagnella, Paul Murley, Eric Hennenfent, Joshua Mason, Adam Bates, Michael Bailey
    CommanderSong: A Systematic Approach for Practical Adversarial Voice RecognitionUSENIX Security '18Xuejing Yuan, Yuxuan Chen, Yue Zhao, Yunhui Long, Xiaokang Liu, Kai Chen, Shengzhi Zhang, Heqing Huang, Xiaofeng Wang, Carl A. Gunter
    ACES: Automatic Compartments for Embedded SystemsUSENIX Security '18Abraham A Clements, Naif Saleh Almakhdhub, Saurabh Bagchi, Mathias Payer
    IMIX: In-Process Memory Isolation EXtensionUSENIX Security '18Tommaso Frassetto, Patrick Jauernig, Christopher Liebchen, Ahmad-Reza Sadeghi
    HeapHopper: Bringing Bounded Model Checking to Heap Implementation SecurityUSENIX Security '18Moritz Eckert, Antonio Bianchi, Ruoyu Wang, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna
    Guarder: A Tunable Secure AllocatorUSENIX Security '18Sam Silvestro, Hongyu Liu, Tianyi Liu, Zhiqiang Lin, Tongping Liu
    Fp-Scanner: The Privacy Implications of Browser Fingerprint InconsistenciesUSENIX Security '18Antoine Vastel, Pierre Laperdrix, Walter Rudametkin, Romain Rouvoy
    Who Left Open the Cookie Jar? A Comprehensive Evaluation of Third-Party Cookie PoliciesUSENIX Security '18Gertjan Franken, Tom Van Goethem, Wouter Joosen
    Effective Detection of Multimedia Protocol Tunneling using Machine LearningUSENIX Security '18Diogo Barradas, Nuno Santos, Luís Rodrigues
    Quack: Scalable Remote Measurement of Application-Layer CensorshipUSENIX Security '18Benjamin VanderSloot, Allison McDonald, Will Scott, J. Alex Halderman, Roya Ensafi
    Better managed than memorized? Studying the Impact of Managers on Password Strength and ReuseUSENIX Security '18Sanam Ghorbani Lyastani, Michael Schilling, Sascha Fahl, Michael Backes, Sven Bugiel
    Forgetting of Passwords: Ecological Theory and DataUSENIX Security '18Xianyi Gao, Yulong Yang, Can Liu, Christos Mitropoulos, Janne Lindqvist, Antti Oulasvirta
    The Rewards and Costs of Stronger Passwords in a University: Linking Password Lifetime to StrengthUSENIX Security '18Ingolf Becker, Simon Parkin, M. Angela Sasse
    Rethinking Access Control and Authentication for the Home Internet of Things (IoT)USENIX Security '18Weijia He, Maximilian Golla, Roshni Padhi, Jordan Ofek, Markus Dürmuth, Earlence Fernandes, Blase Ur
    ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands Within the Android EcosystemUSENIX Security '18Dave (Jing) Tian, Grant Hernandez, Joseph I. Choi, Vanessa Frost, Christie Raules, Patrick Traynor, Hayawardh Vijayakumar, Lee Harrison, Amir Rahmati, Michael Grace, Kevin R. B. Butler
    Charm: Facilitating Dynamic Analysis of Device Drivers of Mobile SystemsUSENIX Security '18Seyed Mohammadjavad Seyed Talebi, Hamid Tavakoli, Hang Zhang, Zheng Zhang, Ardalan Amiri Sani, Zhiyun Qian
    Inception: System-Wide Security Testing of Real-World Embedded Systems SoftwareUSENIX Security '18Nassim Corteggiani, Giovanni Camurati, Aurélien Francillon
    Acquisitional Rule-based Engine for Discovering Internet-of-Things DevicesUSENIX Security '18Xuan Feng, Qiang Li, Haining Wang, Limin Sun
    A Sense of Time for JavaScript and Node.js: First-Class Timeouts as a Cure for Event Handler PoisoningUSENIX Security '18James C. Davis, Eric R. Williamson, Dongyoon Lee
    Freezing the Web: A Study of ReDoS Vulnerabilities in JavaScript-based Web ServersUSENIX Security '18Cristian-Alexandru Staicu, Michael Pradel
    NAVEX: Precise and Scalable Exploit Generation for Dynamic Web ApplicationsUSENIX Security '18Abeer Alhuzali, Rigel Gjomemo, Birhanu Eshete, V.N. Venkatakrishnan
    Rampart: Protecting Web Applications from CPU-Exhaustion Denial-of-Service AttacksUSENIX Security '18Wei Meng, Chenxiong Qian, Shuang Hao, Kevin Borgolte, Giovanni Vigna, Christopher Kruegel, Wenke Lee