You are here

USENIX is fully committed to the Open Access to research movement. To that end, all videos of conference technical session presentations are now available to the general public on the USENIX Web site shortly after they take place. In addition, we have offered free online access to conference proceedings since 2008. Visit our proceedings page to check out the latest papers.

Interested in helping us support Open Access at USENIX? Become a member today!

To find a specific conference's videos, begin by filtering by conference group and then filter by conference.

Filter by Conference Group

Multimedia

    TitleConferenceSpeaker(s)
    Reliability at Massive Scale: Lessons Learned at FacebookLISA '10Robert Johnson, Sanjeev Kumar
    PUBCRAWL: Protecting Users and Businesses from CRAWLersUSENIX Security '12Gregoire Jacob, Engin Kirda, Christopher Kruegel, Giovanni Vigna
    Using Set Cover to Optimize a Large-Scale Low Latency Distributed GraphHotCloud '13Rui Wang, Christopher Conrad, Sam Shah
    Scaling User Security: Lessons Learned from Shipping Security Features at EtsyLISA '13
    Enterprise Architecture Beyond the PerimeterLISA '13
    Understanding the Emerging Threat of DDoS-as-a-ServiceLEET '13Mohammad Karami, Damon McCoy
    Five Incidents, One Theme: Twitter Spam as a Weapon to Drown Voices of ProtestFOCI '13John-Paul Verkamp, Minaxi Gupta
    Take This Personally: Pollution Attacks on Personalized ServicesUSENIX Security '13Xingyu Xing, Wei Meng, Dan Doozan, Alex C. Snoeren, Nick Feamster, Wenke Lee
    The Velocity of Censorship: High-Fidelity Detection of Microblog Post DeletionsUSENIX Security '13Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall, Dan S. Wallach
    Impression Fraud in On-line Advertising via Pay-Per-View NetworksUSENIX Security '13Kevin Springborn, Paul Barford
    Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and AbuseUSENIX Security '13Kurt Thomas, Damon McCoy, Chris Grier, Alek Kolcz, Vern Paxson
    TTL of a PenetrationLISA '12Branson Matheson
    SinkMiner: Mining Botnet Sinkholes for Fun and ProfitLEET '13Babak Rahbarinia, Roberto Perdisci, Manos Antonakakis, David Dagon
    Implementing IPv6 on a Global Scale: Experiences at AkamaiLISA '11Erik Nygren
    Making Geo-Replicated Systems Fast as Possible, Consistent when NecessaryOSDI '12Cheng Li, Daniel Porto, Allen Clement, Johannes Gehrke, Nuno Preguiça, Rodrigo Rodrigues
    CNN.com: Facing a World CrisisLISA 2001William LeFebvre
    "Overcoming My Biggest Roadblock, Myself" PresentationWiAC '12
    Computational ZenWiAC '13Allison Randal
    What Your CDN Won't Tell You: Optimizing a News Website for Speed and StabilityLISA '12Julian Dunn, Blake Crosby
    BlueSky: A Cloud-Backed File System for the EnterpriseFAST '12
    On the Fragility and Limitations of Current Browser-Provided Clickjacking Protection SchemesWOOT '12
    BOSS: Building Operating System ServicesNSDI '13Stephen Dawson-Haggerty, Andrew Krioukov, Jay Taneja, Sagar Karandikar, Gabe Fierro, Nikita Kitaev, David Culler
    Treehouse: Javascript Sandboxes to Help Web Developers Help ThemselvesUSENIX ATC '12Lon ingram, Michael Walfish
    WAFFle: Fingerprinting Filter Rules of Web Application FirewallsWOOT '12
    Serving Large-scale Batch Computed Data with Project VoldemortFAST '12