| Spyglass: Demand-Provisioned Linux Containers for Private Network Access | LISA15 | Patrick T. Cable II, Nabil Schear |
| Q&A Video Only | LISA15 | James Mickens |
| Perspectives on Securing Cyberspace | USENIX Security '15 | Deborah A. Frincke |
| Using Formal Methods to Eliminate Exploitable Bugs | USENIX Security '15 | Kathleen Fisher |
| EVILCOHORT: Detecting Communities of Malicious Accounts on Online Services | USENIX Security '15 | Gianluca Stringhini, Pierre Mourlanne, Gregoire Jacob, Manuel Egele, Christopher Kruegel, Giovanni Vigna |
| Preventing Security Bugs through Software Design | USENIX Security '15 | Christoph Kern |
| Why Johnny and Janie Can’t Code Safely: Bringing Software Assurance to the Masses | USENIX Security '15 | Bart Miller |
| Conducting Usable Security Studies: It's Complicated | USENIX Security '15 | Lorrie Faith Cranor |
| De-anonymizing Programmers via Code Stylometry | USENIX Security '15 | Aylin Caliskan-Islam, Richard Harang, Andrew Liu, Arvind Narayanan, Clare Voss, Fabian Yamaguchi, Rachel Greenstadt |
| Attacks Only Get Better: Password Recovery Attacks Against RC4 in TLS | USENIX Security '15 | Christina Garman, Kenneth G. Paterson, Thyla Van der Merwe |
| Transforming Innovative Security Concepts into Disruptive Security Companies | USENIX Security '15 | Rick Gordon |
| Machine vs. Machine: Lessons from the First Year of Cyber Grand Challenge | USENIX Security '15 | Mike Walker |
| Inherent Cyber Insecurity and Our National Security: Surviving on a Diet of Poisoned Fruit | USENIX Security '15 | Dr. Richard J. Danzig |
| Post-Mortem of a Zombie: Conficker Cleanup After Six Years | USENIX Security '15 | Hadi Asghari, Michael Ciere, Michel J.G. van Eeten |
| Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications in the Developing World | USENIX Security '15 | Bradley Reaves, Nolen Scaife, Adam Bates, Patrick Traynor, Kevin R.B. Butler |
| Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem | USENIX Security '15 | Kyle Soska, Nicolas Christin |
| All Your Biases Belong to Us: Breaking RC4 in WPA-TKIP and TLS | USENIX Security '15 | Mathy Vanhoef, Frank Piessens |
| Eclipse Attacks on Bitcoin’s Peer-to-Peer Network | USENIX Security '15 | Ethan Heilman, Alison Kendler, Aviv Zohar, Sharon Goldberg |
| Protocol State Fuzzing of TLS Implementations | USENIX Security '15 | Joeri de Ruiter, Erik Poll |
| Verified Correctness and Security of OpenSSL HMAC | USENIX Security '15 | Lennart Beringer, Adam Petcher, Katherine Q. Ye, Andrew W. Appel |
| Not-Quite-So-Broken TLS: Lessons in Re-Engineering a Security Protocol Specification and Implementation | USENIX Security '15 | David Kaloper-Meršinjak, Hannes Mehnert, Anil Madhavapeddy, Peter Sewell |
| To Pin or Not to Pin—Helping App Developers Bullet Proof Their TLS Connections | USENIX Security '15 | Marten Oltrogge, Yasemin Acar, Sergej Dechand, Matthew Smith, Sascha Fahl |
| Trustworthy Whole-System Provenance for the Linux Kernel | USENIX Security '15 | Adam Bates, Dave (Jing) Tian, Kevin R.B. Butler, Thomas Moyer |
| Securing Self-Virtualizing Ethernet Devices | USENIX Security '15 | Igor Smolyar, Muli Ben-Yehuda, Dan Tsafrir |
| EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced Android via Large-Scale Semi-Supervised Learning | USENIX Security '15 | Ruowen Wang, William Enck, Douglas Reeves, Xinwen Zhang, Peng Ning, Dingbang Xu, Wu Zhou, Ahmed M. Azab |