You are here

USENIX is fully committed to the Open Access to research movement. To that end, all videos of conference technical session presentations are now available to the general public on the USENIX website shortly after they take place. In addition, we have offered free online access to conference proceedings since 2008. Visit our proceedings page to check out the latest papers.

Interested in helping us support Open Access at USENIX? Become a member today!

To find a specific conference's videos, begin by filtering by conference group and then filter by conference.

Filter by Conference Group

Multimedia

    TitleConferenceSpeaker(s)
    The Anatomy of a Cryptocurrency Pump-and-Dump SchemeUSENIX Security '19Jiahua Xu, Benjamin Livshits
    CONFIRM: Evaluating Compatibility and Relevance of Control-flow Integrity Protections for Modern SoftwareUSENIX Security '19Xiaoyang Xu, Masoud Ghaffarinia, Wenhao Wang, Kevin W. Hamlen, Zhiqiang Lin
    Lessons Learned About Building Secure Software: It's About the Developers!USENIX Security '19Steve Lipner
    Point Break: A Study of Bandwidth Denial-of-Service Attacks against TorUSENIX Security '19Rob Jansen, Tavish Vaidya, Micah Sherr
    Reading the Tea leaves: A Comparative Analysis of Threat IntelligenceUSENIX Security '19Vector Guo Li, Matthew Dunn, Paul Pearce, Damon McCoy, Geoffrey M. Voelker, Stefan Savage
    Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet ScaleUSENIX Security '19Hugo L.J. Bijmans, Tim M. Booij, Christian Doerr
    Blind Bernoulli Trials: A Noninteractive Protocol For Hidden-Weight Coin FlipsUSENIX Security '19R. Joseph Connor, Max Schuchard
    Utility-Optimized Local Differential Privacy Mechanisms for Distribution EstimationUSENIX Security '19Takao Murakami, Yusuke Kawamoto
    RAZOR: A Framework for Post-deployment Software DebloatingUSENIX Security '19Chenxiong Qian, Hong Hu, Mansour Alharthi, Pak Ho Chung, Taesoo Kim, Wenke Lee
    ERIM: Secure, Efficient In-process Isolation with Protection Keys (MPK)USENIX Security '19Anjo Vahldiek-Oberwagner, Eslam Elnikety, Nuno O. Duarte, Michael Sammler, Peter Druschel, Deepak Garg
    SafeHidden: An Efficient and Secure Information Hiding Technique Using Re-randomizationUSENIX Security '19Zhe Wang, Chenggang Wu, Yinqian Zhang, Bowen Tang, Pen-Chung Yew, Mengyao Xie, Yuanming Lai, Yan Kang, Yueqiang Cheng, Zhiping Shi
    XONN: XNOR-based Oblivious Deep Neural Network InferenceUSENIX Security '19M. Sadegh Riazi, Mohammad Samragh, Hao Chen, Kim Laine, Kristin Lauter, Farinaz Koushanfar
    Understanding and Securing Device Vulnerabilities through Automated Bug Report AnalysisUSENIX Security '19Xuan Feng, Xiaojing Liao, XiaoFeng Wang, Haining Wang, Qiang Li, Kai Yang, Hongsong Zhu, Limin Sun
    From IP ID to Device ID and KASLR BypassUSENIX Security '19Amit Klein, Benny Pinkas
    Understanding iOS-based Crowdturfing Through Hidden UI AnalysisUSENIX Security '19Yeonjoon Lee, Xueqiang Wang, Kwangwuk Lee, Xiaojing Liao, XiaoFeng Wang, Tongxin Li, Xianghang Mi
    Platforms in Everything: Analyzing Ground-Truth Data on the Anatomy and Economics of Bullet-Proof HostingUSENIX Security '19Arman Noroozian, Jan Koenders, Eelco van Veldhuizen, Carlos H. Ganan, Sumayah Alrwais, Damon McCoy, Michel van Eeten
    in-toto: Providing farm-to-table guarantees for bits and bytesUSENIX Security '19Santiago Torres-Arias, Hammad Afzali, Trishank Karthik Kuppusamy, Reza Curtmola, Justin Cappos
    KEPLER: Facilitating Control-flow Hijacking Primitive Evaluation for Linux Kernel VulnerabilitiesUSENIX Security '19Wei Wu, Yueqi Chen, Xinyu Xing, Wei Zou
    FIRM-AFL: High-Throughput Greybox Fuzzing of IoT Firmware via Augmented Process EmulationUSENIX Security '19Yaowen Zheng, Ali Davanian, Heng Yin, Chengyu Song, Hongsong Zhu, Limin Sun
    Security Educational PanelUSENIX Security '19Elissa Redmiles, Matt Bishop, Justin Cappos, Raheem Beyah
    The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR/EDRUSENIX Security '19Daniele Antonioli, Nils Ole Tippenhauer, Kasper B. Rasmussen
    FastKitten: Practical Smart Contracts on BitcoinUSENIX Security '19Poulami Das, Lisa Eckey, Tommaso Frassetto, David Gens, Kristina Hostáková, Patrick Jauernig, Sebastian Faust, Ahmad-Reza Sadeghi
    “Johnny, you are fired!” – Spoofing OpenPGP and S/MIME Signatures in EmailsUSENIX Security '19Jens Müller, Marcus Brinkmann, Damian Poddebniak, Hanno Böck, Sebastian Schinzel, Juraj Somorovsky, Jörg Schwenk
    VRASED: A Verified Hardware/Software Co-Design for Remote AttestationUSENIX Security '19Ivan De Oliveira Nunes, Karim Eldefrawy, Norrathep Rattanavipanon, Michael Steiner, Gene Tsudik
    Detecting and Characterizing Lateral Phishing at ScaleUSENIX Security '19Grant Ho, Asaf Cidon, Lior Gavish, Marco Schweighauser, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David Wagner