You are here

USENIX is fully committed to the Open Access to research movement. To that end, all videos of conference technical session presentations are now available to the general public on the USENIX Web site shortly after they take place. In addition, we have offered free online access to conference proceedings since 2008. Visit our proceedings page to check out the latest papers.

Interested in helping us support Open Access at USENIX? Become a member today!

To find a specific conference's videos, begin by filtering by conference group and then filter by conference.

Filter by Conference Group


    Secure Software Updates: Not ReallyUSENIX Security '06Kevin Fu
    The Utility vs. Strength Tradeoff: Anonymization for Log SharingUSENIX Security '06Kiran Lakkaraju
    Malware Prevalence in the KaZaA File-Sharing NetworkUSENIX Security '06Jaeyeon Jung
    Election AuditsUSENIX Security '06Arel Cordero
    The Joe-E Subset of JavaUSENIX Security '06Adrian Mettler
    Prerendered User Interfaces for Higher-Assurance Electronic VotingUSENIX Security '06Ka-Ping Yee
    Fine-Grained Secure Localization for 802.11 NetworksUSENIX Security '06Patrick Traynor
    KernelSecNetUSENIX Security '06Manigandan Radhakrishnan, Jon A. Solworth
    Taking Malware Detection To The Next Level (Down)USENIX Security '06Adrienne Felt, Nathanael Paul, David Evans, Sudhanva Gurumurthi
    Data Sandboxing for ConfidentialityUSENIX Security '06Tejas Khatiwala, Raj Swaminathan
    An Architecture for Specification-Based Detection of Semantic Integrity Violations in Kernel Dynamic DataUSENIX Security '06Nick L. Petroni, Jr., Timothy Fraser, AAron Walters, William A. Arbaugh
    vTPM: Virtualizing the Trusted Platform ModuleUSENIX Security '06Stefan Berger, Ramón Cáceres, Kenneth A. Goldman, Ronald Perez, Reiner Sailer, Leendert van Doorn
    Designing Voting Machines for VerificationUSENIX Security '06Naveen Sastry
    Academic Department or Corporate Lab, Which Fits?USENIX Security '06Bill Aiello
    DRM Wars: The Next GenerationUSENIX Security '06Ed Felten
    SigFree: A Signature-free Buffer Overflow Attack BlockerUSENIX Security '06Xinran Wang, Chi-Chun Pan
    Polymorphic Blending AttacksUSENIX Security '06Prahlad Fogla, Monirul Sharif, Roberto Perdisci, Oleg Kolesnikov, Wenke Lee
    Dynamic Application-Layer Protocol Analysis for Network Intrusion DetectionUSENIX Security '06Holger Dreger, Anja Feldmann
    Behavior-based Spyware DetectionUSENIX Security '06Engin Kirda, Christopher Kruegel
    Static Detection of Security Vulnerabilities in Scripting LanguagesUSENIX Security '06Yichen Xie, Alex Aiken
    Rule-Based Static Analysis of Network Protocol ImplementationsUSENIX Security '06Octavian Udrea, Cristian Lumezanu
    Evaluating SFI for a CISC ArchitectureUSENIX Security '06Stephen McCamant, Greg Morrisett
    Surviving Moore's Law: Security, AI, and Last Mover AdvantageUSENIX Security '06Paul Kocher
    Major Security Blunders of the Past 30 YearsUSENIX Security '06Virgil Gligor, Peter Neumann
    Aspect-Oriented Programming: Radical Research in ModularityUSENIX Security '06Gregor Kiczales