You are here

USENIX is fully committed to the Open Access to research movement. To that end, all videos of conference technical session presentations are now available to the general public on the USENIX website shortly after they take place. In addition, we have offered free online access to conference proceedings since 2008. Visit our proceedings page to check out the latest papers.

Interested in helping us support Open Access at USENIX? Become a member today!

To find a specific conference's videos, begin by filtering by conference group and then filter by conference.

Filter by Conference Group

Multimedia

    TitleConferenceSpeaker(s)
    Shining Light on Internet-based Crimes Against Children USENIX Security '19Brian Levine
    Baby Steps towards the Precipice: How the Web Became a Scary Place and How We Can Fix ItUSENIX Security '19Artur Janc
    Lessons Learned from Evaluating the Robustness of Defenses to Adversarial ExamplesUSENIX Security '19Nicholas Carlini
    The Spies Hacking our Phones are Going Dark, and We're All in TroubleUSENIX Security '19John Scott-Railton, Bill Marczak
    From Privacy by Design to Data Protection by Design: The Challenges of Turning Good Practice into a Legal ObligationUSENIX Security '19Achim Klabunde
    Security Research and Public PolicyUSENIX Security '19Chris Jay Hoofnagle
    Evaluating Mobile Messengers for Implementation VulnerabilitiesUSENIX Security '19Natalie Silvanovich
    Embracing the "Hack." A Better Strategy for Team-DefenseUSENIX Security '19Haroon Meer
    Rendered Private: Making GLSL Execution Uniform to Prevent WebGL-based Browser FingerprintingUSENIX Security '19Shujiang Wu, Song Li, Yinzhi Cao, Ningfei Wang
    Fuzzification: Anti-Fuzzing TechniquesUSENIX Security '19Jinho Jung, Hong Hu, David Solodukhin, Daniel Pagan, Kyu Hyung Lee, Taesoo Kim
    AntiFuzz: Impeding Fuzzing Audits of Binary ExecutablesUSENIX Security '19Emre Güler, Cornelius Aschermann, Ali Abbasi, Thorsten Holz
    Less is More: Quantifying the Security Benefits of Debloating Web ApplicationsUSENIX Security '19Babak Amin Azad, Pierre Laperdrix, Nick Nikiforakis
    GRIMOIRE: Synthesizing Structure while FuzzingUSENIX Security '19Tim Blazytko, Cornelius Aschermann, Moritz Schlögel, Ali Abbasi, Sergej Schumilo, Simon Wörner, Thorsten Holz
    EnFuzz: Ensemble Fuzzing with Seed Synchronization among Diverse FuzzersUSENIX Security '19Yuanliang Chen, Yu Jiang, Fuchen Ma, Jie Liang, Mingzhe Wang, Chijin Zhou, Xun Jiao, Zhuo Su
    Evaluating Differentially Private Machine Learning in PracticeUSENIX Security '19Bargav Jayaraman, David Evans
    Detecting Missing-Check Bugs via Semantic- and Context-Aware Criticalness and Constraints InferencesUSENIX Security '19Kangjie Lu, Aditya Pakki, Qiushi Wu
    MOPT: Optimized Mutation Scheduling for FuzzersUSENIX Security '19Chenyang Lyu, Shouling Ji, Chao Zhang, Yuwei Li, Wei-Han Lee, Yu Song, Raheem Beyah
    Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic TechniquesUSENIX Security '19Fabio Pagani, Davide Balzarotti
    On (The Lack Of) Location Privacy in Crowdsourcing ApplicationsUSENIX Security '19Spyros Boukoros, Mathias Humbert, Stefan Katzenbeisser, Carmela Troncoso
    The Art of The Scam: Demystifying Honeypots in Ethereum Smart ContractsUSENIX Security '19Christof Ferreira Torres, Mathis Steichen, Radu State
    DEEPVSA: Facilitating Value-set Analysis with Deep Learning for Postmortem Program AnalysisUSENIX Security '19Wenbo Guo, Dongliang Mu, Xinyu Xing, Min Du, Dawn Song
    No Right to Remain Silent: Isolating Malicious MixesUSENIX Security '19Hemi Leibowitz, Ania M. Piotrowska, George Danezis, Amir Herzberg
    Site Isolation: Process Separation for Web Sites within the BrowserUSENIX Security '19Charles Reis, Alexander Moshchuk, Nasko Oskov
    The Web's Identity Crisis: Understanding the Effectiveness of Website Identity IndicatorsUSENIX Security '19Christopher Thompson, Martin Shelton, Emily Stark, Maximilian Walker, Emily Schechter, Adrienne Porter Felt
    The Anatomy of a Cryptocurrency Pump-and-Dump SchemeUSENIX Security '19Jiahua Xu, Benjamin Livshits