You are here

USENIX is fully committed to the Open Access to research movement. To that end, all videos of conference technical session presentations are now available to the general public on the USENIX website shortly after they take place. In addition, we have offered free online access to conference proceedings since 2008. Visit our proceedings page to check out the latest papers.

Interested in helping us support Open Access at USENIX? Become a member today!

To find a specific conference's videos, begin by filtering by conference group and then filter by conference.

Filter by Conference Group

Multimedia

    TitleConferenceSpeaker(s)
    Firewall Analysis with Policy-Based Host Classification LISA '06Robert Marmorstein, Phil Kearns
    Secure Mobile Code Execution Service LISA '06Lap-chung Lam, Yang Yu, Tzi-cker Chiueh
    FLAIM: A Multi-level Anonymization Framework for Computer and Network Logs LISA '06Adam Slagell, Kiran Lakkaraju, Katherine Luo
    Site Reliability at Google/My First Year at GoogleLISA '06Tom Limoncelli
    Leveraging the IT CommunityLISA '06Patrick McGovern
    Privilege Messaging: An Authorization Framework over Email Infrastructure LISA '06Brent ByungHoon Kang, Gautam Singaraju, Sumeet Jain
    Securing Electronic Mail on the National Research and Academic Network of Italy LISA '06Roberto Cecchini, Fulvia Costa, Alberto D'Ambrosio, Domenico Diacono, Giacomo Fazio, Antonio Forte, Matteo Genghini, Michele Michelotto, Ombretta Pinazza, Alfonso Sparano
    A Forensic Analysis of a Distributed Two-Stage Web-Based Spam Attack LISA '06Daniel V. Klein
    Teaching Problem Solving: You Can and You ShouldLISA '06Elizabeth Zwicky
    Sysadmins, Network Managers, and Wiretap LawLISA '06Alex Muentz
    Bigtable: A Distributed Storage System for Structured DataOSDI '06Fay Chang, Jeffrey Dean, Sanjay Ghemawat, Wilson C. Hsieh, Deborah A. Wallach, Mike Burrows, Tushar Chandra, Andrew Fikes, Robert E. Gruber
    Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's BatteryUSENIX Security '06Radmilo Racic, Denys Ma, Hao Chen
    Applying Machine-model Based Countermeasure Design to Improve Protection Against Code Injection Attacks USENIX Security '06Yves Younan, Frank Piessens, Wouter Joosen
    Building a Trusted Network Connect Evaluation Test BedUSENIX Security '06Jesus Molina
    The SAAM Project at UBCUSENIX Security '06Jason Crampton, Wing Leung
    ID-SAVE: Incrementally Deployable Source Address Validity EnforcementUSENIX Security '06Toby Ehrenkranz
    Automatic Repair ValidationUSENIX Security '06Michael E. Locasto, Matthew Burnside, Angelos D. Keromytis
    Secure Software Updates: Not ReallyUSENIX Security '06Kevin Fu
    The Utility vs. Strength Tradeoff: Anonymization for Log SharingUSENIX Security '06Kiran Lakkaraju
    Malware Prevalence in the KaZaA File-Sharing NetworkUSENIX Security '06Jaeyeon Jung
    Election AuditsUSENIX Security '06Arel Cordero
    The Joe-E Subset of JavaUSENIX Security '06Adrian Mettler
    Prerendered User Interfaces for Higher-Assurance Electronic VotingUSENIX Security '06Ka-Ping Yee
    Fine-Grained Secure Localization for 802.11 NetworksUSENIX Security '06Patrick Traynor
    KernelSecNetUSENIX Security '06Manigandan Radhakrishnan, Jon A. Solworth