You are here

USENIX is fully committed to the Open Access to research movement. To that end, all videos of conference technical session presentations are now available to the general public on the USENIX Web site shortly after they take place. In addition, we have offered free online access to conference proceedings since 2008. Visit our proceedings page to check out the latest papers.

Interested in helping us support Open Access at USENIX? Become a member today!

To find a specific conference's videos, begin by filtering by conference group and then filter by conference.

Filter by Conference Group


    SRE Your gRPC—Building Reliable Distributed Systems (Illustrated with GRPC)SREcon17 EuropeGrainne Sheerin, Gabe Krabbe
    Diversity and Inclusion in SRE: A PostmortemSREcon17 EuropeNiall Richard Murphy
    Care and Feeding of SRESREcon17 EuropeNarayan Desai
    Lightning Talks VideoSREcon17 Europe
    An Ant in a World of GrasshoppersUSENIX Security '17Ellen Cram Kowalczyk
    OSS-Fuzz - Google's continuous fuzzing service for open source softwareUSENIX Security '17Kostya Serebryany
    Data Hemorrhage, Inequality, and You: How Technology and Data Flows are Changing the Civil Liberties GameUSENIX Security '17Shankar Narayan
    When Your Threat Model Is "Everything": Defensive Security in Modern NewsroomsUSENIX Security '17Erinn Clark
    USB Snooping Made Easy: Crosstalk Leakage Attacks on USB HubsUSENIX Security '17Yang Su, Daniel Genkin, Damith Ranasinghe, Yuval Yarom
    CLKSCREW: Exposing the Perils of Security-Oblivious Energy ManagementUSENIX Security '17Adrian Tang, Simha Sethumadhavan, Salvatore Stolfo
    SmartAuth: User-Centered Authorization for the Internet of ThingsUSENIX Security '17Yuan Tian, Nan Zhang, Yueh-Hsun Lin, Xiaofeng Wang, Blase Ur, Xianzheng Guo, Patrick Tague
    Telling Your Secrets without Page Faults: Stealthy Page Table-Based Attacks on Enclaved ExecutionUSENIX Security '17Jo Van Bulck, Nico Weichbrodt, Rüdiger Kapitza, Frank Piessens, Raoul Strackx
    Loophole: Timing Attacks on Shared Event Loops in ChromeUSENIX Security '17Pepe Vila, Boris Köpf
    Locally Differentially Private Protocols for Frequency EstimationUSENIX Security '17Tianhao Wang, Jeremiah Blocki, Ninghui Li, Somesh Jha
    How Double-Fetch Situations turn into Double-Fetch Vulnerabilities: A Study of Double Fetches in the Linux KernelUSENIX Security '17Pengfei Wang, Jens Krinke, Kai Lu, Gen Li, Steve Dodier-Lazaro
    Walkie-Talkie: An Efficient Defense Against Passive Website Fingerprinting AttacksUSENIX Security '17Tao Wang, Ian Goldberg
    CacheD: Identifying Cache-Based Timing Channels in Production SoftwareUSENIX Security '17Shuai Wang, Pei Wang, Xiao Liu, Danfeng Zhang, Dinghao Wu
    Postmortem Program Analysis with Hardware-Enhanced Post-Crash ArtifactsUSENIX Security '17Jun Xu, Dongliang Mu, Xinyu Xing, Peng Liu, Ping Chen, Bing Mao
    PlatPal: Detecting Malicious Documents with Platform DiversityUSENIX Security '17Meng Xu, Taesoo Kim
    Attacking the Brain: Races in the SDN Control PlaneUSENIX Security '17Lei Xu, Jeff Huang, Sungmin Hong, Jialong Zhang, Guofei Gu
    Malton: Towards On-Device Non-Invasive Mobile Malware Analysis for ARTUSENIX Security '17Lei Xue, Yajin Zhou, Ting Chen, Xiapu Luo, Guofei Gu
    Dead Store Elimination (Still) Considered HarmfulUSENIX Security '17Zhaomo Yang, Brian Johannesmeyer, Anders Trier Olesen, Sorin Lerner, Kirill Levchenko
    REM: Resource-Efficient Mining for BlockchainsUSENIX Security '17Fan Zhang, Ittay Eyal, Robert Escriva, Ari Juels, Robbert van Renesse
    Seeing Through The Same Lens: Introspecting Guest Address Space At Native SpeedUSENIX Security '17Siqi Zhao, Xuhua Ding, Wen Xu, Dawu Gu
    A Privacy Analysis of Cross-device TrackingUSENIX Security '17Sebastian Zimmeck, Jie S. Li, Hyungtae Kim, Steven M. Bellovin, Tony Jebara