You are here

USENIX is fully committed to the Open Access to research movement. To that end, all videos of conference technical session presentations are now available to the general public on the USENIX website shortly after they take place. In addition, we have offered free online access to conference proceedings since 2008. Visit our proceedings page to check out the latest papers.

Interested in helping us support Open Access at USENIX? Become a member today!

To find a specific conference's videos, begin by filtering by conference group and then filter by conference.

Filter by Conference Group


    An Improved Clock-skew Measurement Technique for Revealing Hidden ServicesUSENIX Security '08Sebastian Zander, Steven J. Murdoch
    Enterprise Security in the Brave New (Virtual) WorldUSENIX Security '08Tal Garfinkel
    BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet DetectionUSENIX Security '08Guofei Gu, Roberto Perdisci, Junjie Zhang, Wenke Lee
    Measurement and Classification of Humans and Bots in Internet ChatUSENIX Security '08Steven Gianvecchio, Mengjun Xie, Zhengyu Wu, Haining Wang
    To Catch a Predator: A Natural Language Approach for Eliciting Malicious PayloadsUSENIX Security '08Sam Small, Joshua Mason, Niels Provos, Adam Stubblefield
    Security Analysis of Network ProtocolsUSENIX Security '08John Mitchell
    CloudAV: N-Version Antivirus in the Network CloudUSENIX Security '08Jon Oberheide, Evan Cooke, Farnam Jahanian
    Highly Predictive BlacklistingUSENIX Security '08Jian Zhang, Phillip Porras, Johannes Ullrich
    Proactive Surge Protection: A Defense Mechanism for Bandwidth-Based AttacksUSENIX Security '08Jerry Chou, Bill Lin, Subhabrata Sen, Oliver Spatscheck
    From the Casebooks of . . .USENIX Security '08Mark Seiden
    Lest We Remember: Cold Boot Attacks on Encryption KeysUSENIX Security '08J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandrino, Ariel J. Feldman, Jacob Appelbaum, Edward W. Felten
    The Practical Subtleties of Biometric Key GenerationUSENIX Security '08Lucas Ballard, Seny Kamara, Michael K. Reiter
    Unidirectional Key Distribution Across Time and Space with Applications to RFID SecurityUSENIX Security '08Ari Juels, Ravikanth Pappu, Bryan Parno
    Building the Successful Security Software CompanyUSENIX Security '08Ted Schlein
    All Your iFRAMEs Point to UsUSENIX Security '08Niels Provos, Panayiotis Mavrommatis, Moheeb Abu Rajab, Fabian Monrose
    Securing Frame Communication in BrowsersUSENIX Security '08Adam Barth, Collin Jackson, John C. Mitchell
    Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model CheckingUSENIX Security '08Michael Martin, Monica S. Lam
    Political DDoS: Estonia and BeyondUSENIX Security '08Jose Nazario
    Keynote Address Dr. Strangevote or: How I Learned to Stop Worrying and Love the Paper BallotUSENIX Security '08Debra Bowen
    The Columbia Accident Investigation and Returning NASA's Space Shuttle to FlightUSENIX ATC '08Matthew Melis
    Free Factories: Unified Infrastructure for Data Intensive Web ServicesUSENIX ATC '08Alexander Wait Zaranek, Tom Clegg, Ward Vandewege, George M. Church
    Wide-Scale Data Stream ManagementUSENIX ATC '08Dionysios Logothetis, Kenneth Yocum
    Experiences with Client-based Speculative Remote DisplayUSENIX ATC '08John R. Lange, Peter A. Dinda, Samuel Rossoff
    Current and Next-Generation Digital ForensicsUSENIX ATC '08Golden G. Richard
    A Compacting Real-Time Memory Management SystemUSENIX ATC '08Silviu S. Craciunas, Christoph M. Kirsch, Hannes Payer, Ana Sokolova, Horst Stadler, Robert Staudinger