You are here

USENIX is fully committed to the Open Access to research movement. To that end, all videos of conference technical session presentations are now available to the general public on the USENIX website shortly after they take place. In addition, we have offered free online access to conference proceedings since 2008. Visit our proceedings page to check out the latest papers.

Interested in helping us support Open Access at USENIX? Become a member today!

To find a specific conference's videos, begin by filtering by conference group and then filter by conference.

Filter by Conference Group


    Active Hardware Metering for Intellectual Property Protection and SecurityUSENIX Security '07Yousra M. Alkabani, Farinaz Koushanfar
    Report of the California Voting Systems ReviewUSENIX Security '07David Wagner
    OSLO: Improving the Security of Trusted ComputingUSENIX Security '07Bernhard Kauer
    Secretly Monopolizing the CPU Without Superuser PrivilegesUSENIX Security '07Dan Tsafrir, Yoav Etsion, Dror G. Feitelson
    Memory Performance Attacks: Denial of Memory Service in Multi-Core SystemsUSENIX Security '07Thomas Moscibroda, Onur Mutlu
    Computer Security and VotingUSENIX Security '07David Dill
    PANELUSENIX Security '07Ron Buskey, John Larson, Simon Mizikovsky, Thomas La Porta, Patrick Traynor
    Mobile MalwareUSENIX Security '07Mikko Hypponen
    Integrity Checking in Cryptographic File Systems with Constant Trusted StorageUSENIX Security '07Alina Oprea, Michael K. Reiter
    Discoverer: Automatic Protocol Reverse Engineering from Network TracesUSENIX Security '07Weidong Cui, Jayanthkumar Kannan, Helen J. Wang
    Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint GenerationUSENIX Security '07David Brumley, Juan Caballero, Zhenkai Liang, James Newsome
    Computer Security in a Large EnterpriseUSENIX Security '07Jerry Brady
    Spamscatter: Characterizing Internet Scam Hosting InfrastructureUSENIX Security '07David S. Anderson, Chris Fleizach, Stefan Savage, Geoffrey M. Voelker
    Exploiting Network Structure for Proactive Spam MitigationUSENIX Security '07Shobha Venkataraman, Subhabrata Sen, Oliver Spatscheck, Patrick Haffner, Dawn Song
    Exploiting Online Games USENIX Security '07Gary McGraw
    BotHunter: Detecting Malware Infection Through IDS-Driven Dialog CorrelationUSENIX Security '07Guofei Gu, Phillip Porras, Vinod Yegneswaran, Martin Fong
    Keep Your Enemies Close: Distance Bounding Against Smartcard Relay AttacksUSENIX Security '07Saar Drimer, Steven J. Murdoch
    Human-Seeded Attacks and Exploiting Hot-Spots in Graphical PasswordsUSENIX Security '07Julie Thorpe, P.C. van Oorschot
    Halting Password Puzzles: Hard-to-break Encryption from Human-memorable KeysUSENIX Security '07Xavier Boyen
    How to Obtain and Assert Composable SecurityUSENIX Security '07Ran Canetti
    Language Identification of Encrypted VoIP Traffic: Alejandra y Roberto or Alice and Bob?USENIX Security '07Charles V. Wright, Lucas Ballard, Fabian Monrose, Gerald M. Masson
    Devices That Tell on You: Privacy Trends in Consumer Ubiquitous ComputingUSENIX Security '07T. Scott Saponas, Jonathan Lester, Carl Hartung, Sameer Agarwal, Tadayoshi Kohno
    Web-Based Inference DetectionUSENIX Security '07Jessica Staddon, Philippe Golle, Bryce Zimny
    SIF: Enforcing Confidentiality and Integrity in Web ApplicationsUSENIX Security '07Stephen Chong, K. Vikram, Andrew C. Myers
    Combating Click Fraud via Premium ClicksUSENIX Security '07Ari Juels, Sid Stamm, Markus Jakobsson