You are here

USENIX is fully committed to the Open Access to research movement. To that end, all videos of conference technical session presentations are now available to the general public on the USENIX website shortly after they take place. In addition, we have offered free online access to conference proceedings since 2008. Visit our proceedings page to check out the latest papers.

Interested in helping us support Open Access at USENIX? Become a member today!

To find a specific conference's videos, begin by filtering by conference group and then filter by conference.

Filter by Conference Group

Multimedia

    TitleConferenceSpeaker(s)
    Does Your House Have Lions? Controlling for the Risk from Trusted InsidersLISA '08Marcel Simon
    Spine: Automating Systems Configuration and ManagementLISA '08Rafi Khardalian
    How to Proceed When 1000 Call Agents Tell You, "My Computer Is Slow": Creating a User Experience Monitoring SystemLISA '08Tobias Oetiker
    How to Stop Hating MySQL: Fixing Common Mistakes and MythsLISA '08Sheeri K. Cabral
    Integrating Linux (and UNIX and Mac) Identity Management in Microsoft Active DirectoryLISA '08Mike Patnode
    Programming the Virtual InfrastructureLISA '08Paul Anderson
    Keynote Address Implementing Intellipedia Within a "Need to Know" CultureLISA '08Sean Dennehy
    An Empirical Security Study of the Native Code in the JDKUSENIX Security '08Gang Tan, Jason Croft
    AutoISES: Automatically Inferring Security Specification and Detecting ViolationsUSENIX Security '08Lin Tan, Xiaolan Zhang, Xiao Ma, Weiwei Xiong, Yuanyuan Zhou
    Real-World Buffer Overflow Protection for Userspace & KernelspaceUSENIX Security '08Michael Dalton, Hari Kannan, Christos Kozyrakis
    Managing Insecurity: Practitioner Reflections on Social Costs of SecurityUSENIX Security '08Darren Lacey
    Verifying Compliance of Trusted ProgramsUSENIX Security '08Sandra Rueda, Dave King, Trent Jaeger
    Helios: Web-based Open-Audit VotingUSENIX Security '08Ben Adida
    VoteBox: A Tamper-evident, Verifiable Electronic Voting SystemUSENIX Security '08Daniel Sandler, Kyle Derr, Dan S. Wallach
    The Ghost in the Browser and Other Frightening Stories About Web MalwareUSENIX Security '08Niels Provos
    Setting DNS's Hair on FireUSENIX Security '08David Dagon, Paul Vixie
    Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTsUSENIX Security '08Thomas Ristenpart, Gabriel Maganis, Arvind Krishnamurthy
    Panalyst: Privacy-Aware Remote Error Analysis on Commodity SoftwareUSENIX Security '08Rui Wang, XiaoFeng Wang, Zhuowei Li
    Multi-flow Attacks Against Network Flow Watermarking SchemesUSENIX Security '08Negar Kiyavash, Amir Houmansadr, Nikita Borisov
    NetAuth: Supporting User-Based Network ServicesUSENIX Security '08Manigandan Radhakrishnan, Jon A. Solworth
    Hypervisor Support for Identifying Covertly Executing BinariesUSENIX Security '08Lionel Litty, H. Andrés Lagar-Cavilla, David Lie
    Selective Versioning in a Secure Disk SystemUSENIX Security '08Swaminathan Sundararaman, Gopalan Sivathanu, Erez Zadok
    HackernomicsUSENIX Security '08Hugh Thompson
    Reverse-Engineering a Cryptographic RFID TagUSENIX Security '08Starbug , Henryk Plötz
    Practical Symmetric Key Cryptography on Modern Graphics HardwareUSENIX Security '08Owen Harrison, John Waldron