You are here

USENIX is fully committed to the Open Access to research movement. To that end, all videos of conference technical session presentations are now available to the general public on the USENIX Web site shortly after they take place. In addition, we have offered free online access to conference proceedings since 2008. Visit our proceedings page to check out the latest papers.

Interested in helping us support Open Access at USENIX? Become a member today!

To find a specific conference's videos, begin by filtering by conference group and then filter by conference.

Filter by Conference Group

Multimedia

    TitleConferenceSpeaker(s)
    An Administrator’s Guide to Internet Password ResearchLISA14Dinei Florencio, Cormac Herley, Paul C. van Oorschot
    Release Engineering from the Ground UpURES '14 WestTom Santero
    The Long “Taile” of Typosquatting Domain NamesUSENIX Security '14Janos Szurdi, Balazs Kocso, Gabor Cseh, Jonathan Spring, Mark Felegyhazi, Chris Kanich
    By Their Powers Combined—Monitoring and Automated Releases Are Like Peanut Butter and ChocolateURES '14Caskey Dickson
    Facade: High-Throughput, Deniable Censorship Circumvention Using Web SearchFOCI '14Ben Jones, Sam Burnett, Nick Feamster, Sean Donovan, Sarthak Grover, Sathya Gunasekaran, Karim Habak
    SSOScan: Automated Testing of Web Applications for Single Sign-On VulnerabilitiesUSENIX Security '14Yuchen Zhou, David Evans
    The Fun and Future of CTF3GSE '14Andy Davis, Tim Leek, Michael Zhivich, Kyle Gwinnup, William Leonard
    Brahmastra: Driving Apps to Test the Security of Third-Party ComponentsUSENIX Security '14Ravi Bhoraskar, Seungyeop Han, Jinseong Jeon, Tanzirul Azim, Shuo Chen, Jaeyeon Jung, Suman Nath, Rui Wang, David Wetherall
    Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing WorkersUSENIX Security '14Gang Wang, Tianyi Wang, Haitao Zheng, Ben Y. Zhao
    Effective Attacks and Provable Defenses for Website FingerprintingUSENIX Security '14Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, Ian Goldberg
    Towards a Leaner Geo-distributed Cloud InfrastructureHotCloud '14Iyswarya Narayanan, Aman Kansal, Anand Sivasubramaniam, Bhuvan Urgaonkar, Sriram Govindan
    Installation of an External Lustre Filesystem using Cray esMS management and Lustre 1.8.6LISA '13Patrick Webb
    Practical Comprehensive Bounds on Surreptitious Communication over DNSUSENIX Security '13Vern Paxson, Mihai Christodorescu, Mobin Javed, Josyula Rao, Reiner Sailer, Douglas Lee Schales, Mark Stoecklin, Kurt Thomas, Wietse Venema, Nicholas Weaver
    Adaptive Control of Apache Web ServerFeedback Computing '13Erik Reed, Abe Ishihara, Ole J. Mengshoel
    Off-Path Attacking the WebWOOT '12
    A Working Theory-of-MonitoringLISA '13
    Eroding Trust and the CA DebacleHotSec '13
    Dude, Where’s My Data? Replicating and Migrating Data Across Data Centers and CloudsLISA '12Jeff Darcy
    How Speedy is SPDY?NSDI '14Xiao Sophia Wang, Aruna Balasubramanian, Arvind Krishnamurthy, David Wetherall
    A Case for Parallelizing Web PagesHotPar '12HaoHui Mai, Shuo Tang, Samuel T. King, Calin Cascaval, Pablo Montesinos
    Effective Configuration ManagementLISA '13
    Our Jobs Are Evolving: Can We Keep Up?LISA '13
    PostOps: A Non-Surgical Tale of Software, Fragility, and ReliabilityLISA '13
    Rethinking Voter Coercion: The Realities Imposed by TechnologyEVT/WOTE '13Josh Benaloh
    Surviving The Thundering Hordes: Keeping Engadget Alive During Apple Product AnnouncementsLISA '12Valerie Detweiler, Chris Stolfi