Conferences

Search results

    TitleConferenceSpeaker(s)
    How Should We Ops?LISA16Courtney Eckhardt
    Capturing All of Stack Overflow's LogsLISA16George Beech
    Traps and Cookies: A Mystery Package from Your Former SelfLISA16Tanya Reilly
    Stop Lying to Your Customers—the Cloud Is Neither Private Nor Secure: What Your Customers Need to Do for Privacy and Security, and How You Can Help ThemLISA16James "Brad" Whitehead
    Sensu and the Art of MonitoringLISA16Sean Porter
    Strategic StorytellingLISA16Jessica Hilt
    Modern Cryptography Concepts: Hype or HopeLISA16Radia Perlman
    UAVs, IoT, and CybersecurityLISA16David Kovar
    Building a Billion User Load BalancerLISA16Patrick Shuff
    The Evolution of People, Process, and Technology in the Digital AgeLISA16John Roese
    2016 Test of Time Award PanelUSENIX Security '16
    When Governments Attack: Malware Targeting Activists, Lawyers, and JournalistsUSENIX Security '16Eva Galperin
    Making HTTPS the Default in the World's Largest BureaucracyUSENIX Security '16Eric Mill
    The Moral Character of Cryptographic WorkUSENIX Security '16Phillip Rogaway
    Privacy and Threat in Practice: Mobile Messaging by Low-Income New YorkersUSENIX Security '16Ame Elliot
    The Unfalsifiability of Security ClaimsUSENIX Security '16Cormac Herley
    Teaching Computer Security: Thoughts from the FieldUSENIX Security '16David Evans, Zachary Peterson, Colleen Lewis, Tadayoshi Kohno
    Report from the Field: A CDN's Role in Repelling Attacks against Banking Industry Web SitesUSENIX Security '16Bruce Maggs
    Finding and Fixing Security Bugs in FlashUSENIX Security '16Natalie Silvanovich
    AMD x86 Memory Encryption TechnologiesUSENIX Security '16David Kaplan
    Security CompetitionsUSENIX Security '16Adam Doupé, William Robertson, Dave Levin, Sophia D'Antoine
    Crashing Drones and Hijacked Cameras: CyberTrust Meets CyberPhysicalUSENIX Security '16Jeannette M. Wing
    The Ever-Changing Labyrinth: A Large-Scale Analysis of Wildcard DNS Powered Blackhat SEOUSENIX Security '16Kun Du, Hao Yang, Zhou Li, Haixin Duan, Kehuan Zhang
    UNVEIL: A Large-Scale, Automated Approach to Detecting RansomwareUSENIX Security '16Amin Kharaz, Sajjad Arshad, Collin Mulliner, William Robertson, Engin Kirda
    Screen after Previous Screens: Spatial-Temporal Recreation of Android App Displays from Memory ImagesUSENIX Security '16Brendan Saltaformaggio, Rohit Bhatia, Xiangyu Zhang, Dongyan Xu, Golden G. Richard III

Pages