You are here

USENIX is fully committed to the Open Access to research movement. To that end, all videos of conference technical session presentations are now available to the general public on the USENIX website shortly after they take place. In addition, we have offered free online access to conference proceedings since 2008. Visit our proceedings page to check out the latest papers.

Interested in helping us support Open Access at USENIX? Become a member today!

To find a specific conference's videos, begin by filtering by conference group and then filter by conference.

Filter by Conference Group

Multimedia

    TitleConferenceSpeaker(s)
    Solving the Next Billion-People Privacy ProblemUSENIX Security '18Monica Lam
    Unveiling and Quantifying Facebook Exploitation of Sensitive Personal Data for Advertising PurposesUSENIX Security '18José González Cabañas, Ángel Cuevas, Rubén Cuevas
    Analysis of Privacy Protections in Fitness Tracking Social Networks -or- You can run, but can you hide?USENIX Security '18Wajih Ul Hassan, Saad Hussain, Adam Bates
    AttriGuard: A Practical Defense Against Attribute Inference Attacks via Adversarial Machine LearningUSENIX Security '18Jinyuan Jia, Neil Zhenqiang Gong
    Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep LearningUSENIX Security '18Hamza Harkous, Kassem Fawaz, Rémi Lebret, Florian Schaub, Kang G. Shin, Karl Aberer
    Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration ChannelsUSENIX Security '18Damian Poddebniak, Christian Dresen, Jens Müller, Fabian Ising, Sebastian Schinzel, Simon Friedberger, Juraj Somorovsky, Jörg Schwenk
    The Dangers of Key Reuse: Practical Attacks on IPsec IKEUSENIX Security '18Dennis Felsch, Martin Grothe, Jörg Schwenk, Adam Czubak, Marcin Szymanek
    One&Done: A Single-Decryption EM-Based Attack on OpenSSL’s Constant-Time Blinded RSAUSENIX Security '18Monjur Alam, Haider Adnan Khan, Moumita Dey, Nishith Sinha, Robert Callan, Alenka Zajic, Milos Prvulovic
    DATA – Differential Address Trace Analysis: Finding Address-based Side-Channels in BinariesUSENIX Security '18Samuel Weiser, Andreas Zankl, Raphael Spreitzer, Katja Miller, Stefan Mangard, Georg Sigl
    Analogy Cyber Security—From 0101 to Mixed SignalsUSENIX Security '18Wenyuan Xu
    Chipmunk or Pepe? Using Acoustical Analysis to Detect Voice-Channel Fraud at ScaleUSENIX Security '18Vijay Balasubramaniyan
    The Battle for New York: A Case Study of Applied Digital Threat Modeling at the Enterprise LevelUSENIX Security '18Rock Stevens, Daniel Votipka, Elissa M. Redmiles, Colin Ahern, Patrick Sweeney, Michelle L. Mazurek
    SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior DetectionUSENIX Security '18Peng Gao, Xusheng Xiao, Ding Li, Zhichun Li, Kangkook Jee, Zhenyu Wu, Chung Hwan Kim, Sanjeev R. Kulkarni, Prateek Mittal
    Practical Accountability of Secret ProcessesUSENIX Security '18Jonathan Frankle, Sunoo Park, Daniel Shaar, Shafi Goldwasser, Daniel Weitzner
    DIZK: A Distributed Zero Knowledge Proof SystemUSENIX Security '18Howard Wu, Wenting Zheng, Alessandro Chiesa, Raluca Ada Popa, Ion Stoica
    NetHide: Secure and Practical Network Topology ObfuscationUSENIX Security '18Roland Meier, Petar Tsankov, Vincent Lenders, Laurent Vanbever, Martin Vechev
    Towards a Secure Zero-rating Framework with Three PartiesUSENIX Security '18Zhiheng Liu, Zhen Zhang, Yinzhi Cao, Zhaohan Xi, Shihao Jing, Humberto La Roche
    MoonShine: Optimizing OS Fuzzer Seed Selection with Trace DistillationUSENIX Security '18Shankara Pailoor, Andrew Aday, Suman Jana
    QSYM : A Practical Concolic Execution Engine Tailored for Hybrid FuzzingUSENIX Security '18Insu Yun, Sangho Lee, Meng Xu, Yeongjin Jang, Taesoo Kim
    Automatic Heap Layout Manipulation for ExploitationUSENIX Security '18Sean Heelan, Tom Melham, Daniel Kroening
    FUZE: Towards Facilitating Exploit Generation for Kernel Use-After-Free VulnerabilitiesUSENIX Security '18Wei Wu, Yueqi Chen, Jun Xu, Xinyu Xing, Xiaorui Gong, Wei Zou
    The Secure Socket API: TLS as an Operating System ServiceUSENIX Security '18Mark O'Neill, Scott Heidbrink, Jordan Whitehead, Tanner Perdue, Luke Dickinson, Torstein Collett, Nick Bonner, Kent Seamons, Daniel Zappala
    Return Of Bleichenbacher’s Oracle Threat (ROBOT)USENIX Security '18Hanno Böck, Juraj Somorovsky, Craig Young
    Bamboozling Certificate Authorities with BGPUSENIX Security '18Henry Birge-Lee, Yixin Sun, Anne Edmundson, Jennifer Rexford, Prateek Mittal
    The Broken Shield: Measuring Revocation Effectiveness in the Windows Code-Signing PKIUSENIX Security '18Doowon Kim, Bum Jun Kwon, Kristián Kozák, Christopher Gates, Tudor Dumitraș