| How Should We Ops? | LISA16 | Courtney Eckhardt |
| Capturing All of Stack Overflow's Logs | LISA16 | George Beech |
| Traps and Cookies: A Mystery Package from Your Former Self | LISA16 | Tanya Reilly |
| Stop Lying to Your Customers—the Cloud Is Neither Private Nor Secure: What Your Customers Need to Do for Privacy and Security, and How You Can Help Them | LISA16 | James "Brad" Whitehead |
| Sensu and the Art of Monitoring | LISA16 | Sean Porter |
| Strategic Storytelling | LISA16 | Jessica Hilt |
| Modern Cryptography Concepts: Hype or Hope | LISA16 | Radia Perlman |
| UAVs, IoT, and Cybersecurity | LISA16 | David Kovar |
| Building a Billion User Load Balancer | LISA16 | Patrick Shuff |
| The Evolution of People, Process, and Technology in the Digital Age | LISA16 | John Roese |
| 2016 Test of Time Award Panel | USENIX Security '16 | |
| When Governments Attack: Malware Targeting Activists, Lawyers, and Journalists | USENIX Security '16 | Eva Galperin |
| Making HTTPS the Default in the World's Largest Bureaucracy | USENIX Security '16 | Eric Mill |
| The Moral Character of Cryptographic Work | USENIX Security '16 | Phillip Rogaway |
| Privacy and Threat in Practice: Mobile Messaging by Low-Income New Yorkers | USENIX Security '16 | Ame Elliot |
| The Unfalsifiability of Security Claims | USENIX Security '16 | Cormac Herley |
| Teaching Computer Security: Thoughts from the Field | USENIX Security '16 | David Evans, Zachary Peterson, Colleen Lewis, Tadayoshi Kohno |
| Report from the Field: A CDN's Role in Repelling Attacks against Banking Industry Web Sites | USENIX Security '16 | Bruce Maggs |
| Finding and Fixing Security Bugs in Flash | USENIX Security '16 | Natalie Silvanovich |
| AMD x86 Memory Encryption Technologies | USENIX Security '16 | David Kaplan |
| Security Competitions | USENIX Security '16 | Adam Doupé, William Robertson, Dave Levin, Sophia D'Antoine |
| Crashing Drones and Hijacked Cameras: CyberTrust Meets CyberPhysical | USENIX Security '16 | Jeannette M. Wing |
| The Ever-Changing Labyrinth: A Large-Scale Analysis of Wildcard DNS Powered Blackhat SEO | USENIX Security '16 | Kun Du, Hao Yang, Zhou Li, Haixin Duan, Kehuan Zhang |
| UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware | USENIX Security '16 | Amin Kharaz, Sajjad Arshad, Collin Mulliner, William Robertson, Engin Kirda |
| Screen after Previous Screens: Spatial-Temporal Recreation of Android App Displays from Memory Images | USENIX Security '16 | Brendan Saltaformaggio, Rohit Bhatia, Xiangyu Zhang, Dongyan Xu, Golden G. Richard III |