You are here

USENIX is fully committed to the Open Access to research movement. To that end, all videos of conference technical session presentations are now available to the general public on the USENIX website shortly after they take place. In addition, we have offered free online access to conference proceedings since 2008. Visit our proceedings page to check out the latest papers.

Interested in helping us support Open Access at USENIX? Become a member today!

To find a specific conference's videos, begin by filtering by conference group and then filter by conference.

Filter by Conference Group


    Mobile Private Contact Discovery at ScaleUSENIX Security '19Daniel Kales, Christian Rechberger, Thomas Schneider, Matthias Senker, Christian Weinert
    Protecting accounts from credential stuffing with password breach alertingUSENIX Security '19Kurt Thomas, Jennifer Pullman, Kevin Yeo, Ananth Raghunathan, Patrick Gage Kelley, Luca Invernizzi, Borbala Benko, Tadek Pietraszek, Sarvar Patel, Dan Boneh, Elie Bursztein
    Iframes/Popups Are Dangerous in Mobile WebView: Studying and Mitigating Differential Context VulnerabilitiesUSENIX Security '19GuangLiang Yang, Jeff Huang, Guofei Gu
    Discovering and Understanding the Security Hazards in the Interactions between IoT Devices, Mobile Apps, and Clouds on Smart Home PlatformsUSENIX Security '19Wei Zhou, Yan Jia, Yao Yao, Lipeng Zhu, Le Guan, Yuhang Mao, Peng Liu, Yuqing Zhang
    Leaky Images: Targeted Privacy Attacks in the WebUSENIX Security '19Cristian-Alexandru Staicu, Michael Pradel
    WAVE: A Decentralized Authorization Framework with Transitive DelegationUSENIX Security '19Michael P Andersen, Sam Kumar, Moustafa AbdelBaky, Gabe Fierro, John Kolb, Hyung-Sin Kim, David E. Culler, Raluca Ada Popa
    EverParse: Verified Secure Zero-Copy Parsers for Authenticated Message FormatsUSENIX Security '19Tahina Ramananandro, Antoine Delignat-Lavaud, Cédric Fournet, Nikhil Swamy, Tej Chajed, Nadim Kobeissi, Jonathan Protzenko
    JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoTUSENIX Security '19Sam Kumar, Yuncong Hu, Michael P Andersen, Raluca Ada Popa, David E. Culler
    Protecting Cloud Virtual Machines from Hypervisor and Host Operating System ExploitsUSENIX Security '19Shih-Wei Li, John S. Koh, Jason Nieh
    ATTACK2VEC: Leveraging Temporal Word Embeddings to Understand the Evolution of CyberattacksUSENIX Security '19Yun Shen, Gianluca Stringhini
    Everyone is Different: Client-side Diversification for Defending Against Extension FingerprintingUSENIX Security '19Erik Trickel, Oleksii Starov, Alexandros Kapravelos, Nick Nikiforakis, Adam Doupé
    Birthday, Name and Bifacial-security: Understanding Passwords of Chinese Web UsersUSENIX Security '19Ding Wang, Ping Wang, Debiao He, Yuan Tian
    Tracing Transactions Across Cryptocurrency LedgersUSENIX Security '19Haaroon Yousaf, George Kappos, Sarah Meiklejohn
    Small World with High Risks: A Study of Security Threats in the npm EcosystemUSENIX Security '19Markus Zimmermann, Cristian-Alexandru Staicu, Cam Tenny, Michael Pradel
    Towards the Detection of Inconsistencies in Public Security Vulnerability ReportsUSENIX Security '19Ying Dong, Wenbo Guo, Yueqi Chen, Xinyu Xing, Yuqing Zhang, Gang Wang
    Scalable Scanning and Automatic Classification of TLS Padding Oracle VulnerabilitiesUSENIX Security '19Robert Merget, Juraj Somorovsky, Nimrod Aviram, Craig Young, Janis Fliegenschmidt, Jörg Schwenk, Yuval Shavitt
    Probability Model Transforming Encoders Against Encoding AttacksUSENIX Security '19Haibo Cheng, Zhixiong Zheng, Wenting Li, Ping Wang, Chao-Hsien Chu
    Not Everything is Dark and Gloomy: Power Grid Protections Against IoT Demand AttacksUSENIX Security '19Bing Huang, Alvaro A. Cardenas, Ross Baldick
    All Things Considered: An Analysis of IoT Devices on Home NetworksUSENIX Security '19Deepak Kumar, Kelly Shen, Benton Case, Deepali Garg, Galina Alperovich, Dmitry Kuznetsov, Rajarshi Gupta, Zakir Durumeric
    What Are You Searching For? A Remote Keylogging Attack on Search Engine AutocompleteUSENIX Security '19John V. Monaco
    Cognitive Triaging of Phishing AttacksUSENIX Security '19Amber van der Heijden, Luca Allodi
    Looking from the Mirror: Evaluating IoT Device Security through Mobile Companion AppsUSENIX Security '19Xueqiang Wang, Yuqiong Sun, Susanta Nanda, XiaoFeng Wang
    BITE: Bitcoin Lightweight Client Privacy using Trusted ExecutionUSENIX Security '19Sinisa Matetic, Karl Wüst, Moritz Schneider, Kari Kostiainen, Ghassan Karame, Srdjan Capkun
    High Precision Detection of Business Email CompromiseUSENIX Security '19Asaf Cidon, Lior Gavish, Itay Bleier, Nadia Korshun, Marco Schweighauser, Alexey Tsitkin
    Exploiting Unprotected I/O Operations in AMD’s Secure Encrypted VirtualizationUSENIX Security '19Mengyuan Li, Yinqian Zhang, Zhiqiang Lin, Yan Solihin