You are here

USENIX is fully committed to the Open Access to research movement. To that end, all videos of conference technical session presentations are now available to the general public on the USENIX website shortly after they take place. In addition, we have offered free online access to conference proceedings since 2008. Visit our proceedings page to check out the latest papers.

Interested in helping us support Open Access at USENIX? Become a member today!

To find a specific conference's videos, begin by filtering by conference group and then filter by conference.

Filter by Conference Group

Multimedia

    TitleConferenceSpeaker(s)
    Wireless Attacks on Aircraft Instrument Landing SystemsUSENIX Security '19Harshad Sathaye, Domien Schepers, Aanjhan Ranganathan, Guevara Noubir
    StrongChain: Transparent and Collaborative Proof-of-Work ConsensusUSENIX Security '19Pawel Szalachowski, Daniël Reijsbergen, Ivan Homoliak, Siwei Sun
    Users Really Do Answer Telephone ScamsUSENIX Security '19Huahong Tu, Adam Doupé, Ziming Zhao, Gail-Joon Ahn
    IODINE: Verifying Constant-Time Execution of HardwareUSENIX Security '19Klaus v. Gleissenthall, Rami Gökhan Kıcı, Deian Stefan, Ranjit Jhala
    Seeing is Not Believing: Camouflage Attacks on Image Scaling AlgorithmsUSENIX Security '19Qixue Xiao, Yufei Chen, Chao Shen, Yu Chen, Kang Li
    PeX: A Permission Check Analysis Framework for Linux KernelUSENIX Security '19Tong Zhang, Wenbo Shen, Dongyoon Lee, Changhee Jung, Ahmed M. Azab, Ruowen Wang
    The CrossPath Attack: Disrupting the SDN Control Channel via Shared LinksUSENIX Security '19Jiahao Cao, Qi Li, Renjie Xie, Kun Sun, Guofei Gu, Mingwei Xu, Yuan Yang
    TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and TimeUSENIX Security '19Feargus Pendlebury, Fabio Pierazzi, Roberto Jordaney, Johannes Kinder, Lorenzo Cavallaro
    The Betrayal At Cloud City: An Empirical Analysis Of Cloud-Based Mobile BackendsUSENIX Security '19Omar Alrawi, Chaoshun Zuo, Ruian Duan, Ranjita Pai Kasturi, Zhiqiang Lin, Brendan Saltaformaggio
    CSI NN: Reverse Engineering of Neural Network Architectures Through Electromagnetic Side ChannelUSENIX Security '19Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek
    Devils in the Guidance: Predicting Logic Vulnerabilities in Payment Syndication Services through Automated Documentation AnalysisUSENIX Security '19Yi Chen, Luyi Xing, Yue Qin, Xiaojing Liao, XiaoFeng Wang, Kai Chen, Wei Zou
    CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep LearningUSENIX Security '19Yisroel Mirsky, Tom Mahler, Ilan Shelef, Yuval Elovici
    EnTrust: Regulating Sensor Access by Cooperating Programs via Delegation GraphsUSENIX Security '19Giuseppe Petracca, Yuqiong Sun, Ahmad-Atamli Reineh, Patrick McDaniel, Jens Grossklags, Trent Jaeger
    50 Ways to Leak Your Data: An Exploration of Apps' Circumvention of the Android Permissions SystemUSENIX Security '19Joel Reardon, Álvaro Feal, Primal Wijesekera, Amit Elazari Bar On, Narseo Vallina-Rodriguez, Serge Egelman
    Pythia: Remote Oracles for the MassesUSENIX Security '19Shin-Yeh Tsai, Mathias Payer, Yiying Zhang
    Computer Security and Privacy in the Interactions Between Victim Service Providers and Human Trafficking SurvivorsUSENIX Security '19Christine Chen, Nicola Dell, Franziska Roesner
    A Billion Open Interfaces for Eve and Mallory: MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wireless Direct LinkUSENIX Security '19Milan Stute, Sashank Narain, Alex Mariotto, Alexander Heinrich, David Kreitschmann, Guevara Noubir, Matthias Hollick
    Please Pay Inside: Evaluating Bluetooth-based Detection of Gas Pump SkimmersUSENIX Security '19Nishant Bhaskar, Maxwell Bland, Kirill Levchenko, Aaron Schulman
    A Systematic Evaluation of Transient Execution Attacks and DefensesUSENIX Security '19Claudio Canella, Jo Van Bulck, Michael Schwarz, Moritz Lipp, Benjamin von Berg, Philipp Ortner, Frank Piessens, Dmitry Evtyushkin, Daniel Gruss
    Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning AttacksUSENIX Security '19Ambra Demontis, Marco Melis, Maura Pintor, Matthew Jagielski, Battista Biggio, Alina Oprea, Cristina Nita-Rotaru, Fabio Roli
    Terminal Brain Damage: Exposing the Graceless Degradation in Deep Neural Networks Under Hardware Fault AttacksUSENIX Security '19Sanghyun Hong, Pietro Frigo, Yiğitcan Kaya, Cristiano Giuffrida, Tudor Dumitraș
    Origin-sensitive Control Flow IntegrityUSENIX Security '19Mustakimur Rahman Khandaker, Wenqing Liu, Abu Naser, Zhi Wang, Jie Yang
    HideMyApp: Hiding the Presence of Sensitive Apps on AndroidUSENIX Security '19Anh Pham, Italo Dacosta, Eleonora Losiouk, John Stephan, Kévin Huguenin, Jean-Pierre Hubaux
    Understanding and Improving Security and Privacy in Multi-User Smart Homes: A Design Exploration and In-Home User StudyUSENIX Security '19Eric Zeng, Franziska Roesner
    Robust Website Fingerprinting Through the Cache Occupancy ChannelUSENIX Security '19Anatoly Shusterman, Lachlan Kang, Yarden Haskal, Yosef Meltser, Prateek Mittal, Yossi Oren, Yuval Yarom