You are here

USENIX is fully committed to the Open Access to research movement. To that end, all videos of conference technical session presentations are now available to the general public on the USENIX Web site shortly after they take place. In addition, we have offered free online access to conference proceedings since 2008. Visit our proceedings page to check out the latest papers.

Interested in helping us support Open Access at USENIX? Become a member today!

To find a specific conference's videos, begin by filtering by conference group and then filter by conference.

Filter by Conference Group

Multimedia

    TitleConferenceSpeaker(s)
    WAN Optimized Replication of Backup Datasets Using Stream-Informed Delta CompressionFAST '12
    How Does Your Password Measure Up? The Effect of Strength Meters on Password CreationUSENIX Security '12Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle L. Mazurek, Timothy Passaro, Richard Shay, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor
    PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate ProgramsUSENIX Security '12Damon McCoy, Andreas Pitsillidis, Jordan Grant, Nicholas Weaver, Christian Kreibich, Brian Krebs, Geoffrey Voelker, Stefan Savage, Kirill Levchenko
    Clickjacking: Attacks and DefensesUSENIX Security '12Lin-Shung Huang, Alex Moshchuk, Helen J. Wang, Stuart Schecter, Collin Jackson
    Combating Click Fraud via Premium ClicksUSENIX Security '07Ari Juels, Sid Stamm, Markus Jakobsson
    Social Networks Profile Mapping Using GamesWebApps '12Mohamed Shehab, Moo Nam Ko, Hakim Touati
    Let's Parse to Prevent PwnageLEET '12Mike Samuel, Ulfar Erlingsson
    Building Access Oblivious Storage Cloud for EnterpriseHot-ICE '12Hyunseok Chang, Murali Kodialam, T.V. Lakshman, Sarit Mukherjee, Limin Wang
    Detecting and Defending Against Third-Party Tracking on the WebNSDI '12Franziska Roesner, Tadayoshi Kohno, David Wetherall
    MemC3: Compact and Concurrent MemCache with Dumber Caching and Smarter HashingNSDI '13Bin Fan, David G. Andersen, Michael Kaminsky
    Spamscatter: Characterizing Internet Scam Hosting InfrastructureUSENIX Security '07David S. Anderson, Chris Fleizach, Stefan Savage, Geoffrey M. Voelker
    The Evolution of the Flash Security ModelUSENIX Security '10Peleus Uhley
    LiveJournal's Backend TechnologiesUSENIX ATC '07Brad Fitzpatrick
    Deploying a Sensor Network on an Active Volcano USENIX ATC '06Matt Welsh
    Leveraging the IT CommunityLISA '06Patrick McGovern
    UsenetDHT: A Low-Overhead Design for UsenetNSDI '08Emil Sit, Robert Morris, M. Frans Kaashoek
    Eucalyptus: An Open Source Infrastructure for Cloud ComputingLISA '09Rich Wolski
    Securing Electronic Mail on the National Research and Academic Network of Italy LISA '06Roberto Cecchini, Fulvia Costa, Alberto D'Ambrosio, Domenico Diacono, Giacomo Fazio, Antonio Forte, Matteo Genghini, Michele Michelotto, Ombretta Pinazza, Alfonso Sparano
    "Standard Deviations" of the "Average" System AdministratorLISA '08Alva L. Couch
    Designing, Building, and Populating a 10-Megawatt DatacenterLISA '08Doug Hughes
    Ostra: Leveraging Trust to Thwart Unwanted CommunicationNSDI '08Alan Mislove, Ansley Post, Peter Druschel, Krishna P. Gummadi
    Events Can Make SenseUSENIX ATC '07Maxwell Krohn, Eddie Kohler, M. Frans Kaashoek
    Detecting In-Flight Page Changes with Web TripwiresNSDI '08Charles Reis, Steven D. Gribble, Tadayoshi Kohno, Nicholas C. Weaver
    The NMI Build & Test Laboratory: Continuous Integration Framework for Distributed Computing Software LISA '06Andrew Pavlo, Peter Couvares, Rebekah Gietzel, Anatoly Karp, Ian D. Alderman, Miron Livny, Charles Bacon
    The Last, Best Hope: Sysadmins and DBAs as the Last Guardians of PrivacyLISA '06Danny O'Brien