You are here

USENIX is fully committed to the Open Access to research movement. To that end, all videos of conference technical session presentations are now available to the general public on the USENIX website shortly after they take place. In addition, we have offered free online access to conference proceedings since 2008. Visit our proceedings page to check out the latest papers.

Interested in helping us support Open Access at USENIX? Become a member today!

To find a specific conference's videos, begin by filtering by conference group and then filter by conference.

Filter by Conference Group


    Rampart: Protecting Web Applications from CPU-Exhaustion Denial-of-Service AttacksUSENIX Security '18Wei Meng, Chenxiong Qian, Shuang Hao, Kevin Borgolte, Giovanni Vigna, Christopher Kruegel, Wenke Lee
    How Do Tor Users Interact With Onion Services?USENIX Security '18Philipp Winter, Anne Edmundson, Laura M. Roberts, Agnieszka Dutkowska-Żuk, Marshini Chetty, Nick Feamster
    Towards Predicting Efficient and Anonymous Tor CircuitsUSENIX Security '18Armon Barton, Matthew Wright, Jiang Ming, Mohsen Imani
    BurnBox: Self-Revocable Encryption in a World Of Compelled AccessUSENIX Security '18Nirvan Tyagi, Muhammad Haris Mughees, Thomas Ristenpart, Ian Miers
    An Empirical Analysis of Anonymity in ZcashUSENIX Security '18George Kappos, Haaroon Yousaf, Mary Maller, Sarah Meiklejohn
    Solving the Next Billion-People Privacy ProblemUSENIX Security '18Monica Lam
    Unveiling and Quantifying Facebook Exploitation of Sensitive Personal Data for Advertising PurposesUSENIX Security '18José González Cabañas, Ángel Cuevas, Rubén Cuevas
    Analysis of Privacy Protections in Fitness Tracking Social Networks -or- You can run, but can you hide?USENIX Security '18Wajih Ul Hassan, Saad Hussain, Adam Bates
    AttriGuard: A Practical Defense Against Attribute Inference Attacks via Adversarial Machine LearningUSENIX Security '18Jinyuan Jia, Neil Zhenqiang Gong
    Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep LearningUSENIX Security '18Hamza Harkous, Kassem Fawaz, Rémi Lebret, Florian Schaub, Kang G. Shin, Karl Aberer
    Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration ChannelsUSENIX Security '18Damian Poddebniak, Christian Dresen, Jens Müller, Fabian Ising, Sebastian Schinzel, Simon Friedberger, Juraj Somorovsky, Jörg Schwenk
    The Dangers of Key Reuse: Practical Attacks on IPsec IKEUSENIX Security '18Dennis Felsch, Martin Grothe, Jörg Schwenk, Adam Czubak, Marcin Szymanek
    One&Done: A Single-Decryption EM-Based Attack on OpenSSL’s Constant-Time Blinded RSAUSENIX Security '18Monjur Alam, Haider Adnan Khan, Moumita Dey, Nishith Sinha, Robert Callan, Alenka Zajic, Milos Prvulovic
    DATA – Differential Address Trace Analysis: Finding Address-based Side-Channels in BinariesUSENIX Security '18Samuel Weiser, Andreas Zankl, Raphael Spreitzer, Katja Miller, Stefan Mangard, Georg Sigl
    Analogy Cyber Security—From 0101 to Mixed SignalsUSENIX Security '18Wenyuan Xu
    Chipmunk or Pepe? Using Acoustical Analysis to Detect Voice-Channel Fraud at ScaleUSENIX Security '18Vijay Balasubramaniyan
    The Battle for New York: A Case Study of Applied Digital Threat Modeling at the Enterprise LevelUSENIX Security '18Rock Stevens, Daniel Votipka, Elissa M. Redmiles, Colin Ahern, Patrick Sweeney, Michelle L. Mazurek
    SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior DetectionUSENIX Security '18Peng Gao, Xusheng Xiao, Ding Li, Zhichun Li, Kangkook Jee, Zhenyu Wu, Chung Hwan Kim, Sanjeev R. Kulkarni, Prateek Mittal
    Practical Accountability of Secret ProcessesUSENIX Security '18Jonathan Frankle, Sunoo Park, Daniel Shaar, Shafi Goldwasser, Daniel Weitzner
    DIZK: A Distributed Zero Knowledge Proof SystemUSENIX Security '18Howard Wu, Wenting Zheng, Alessandro Chiesa, Raluca Ada Popa, Ion Stoica
    NetHide: Secure and Practical Network Topology ObfuscationUSENIX Security '18Roland Meier, Petar Tsankov, Vincent Lenders, Laurent Vanbever, Martin Vechev
    Towards a Secure Zero-rating Framework with Three PartiesUSENIX Security '18Zhiheng Liu, Zhen Zhang, Yinzhi Cao, Zhaohan Xi, Shihao Jing, Humberto La Roche
    MoonShine: Optimizing OS Fuzzer Seed Selection with Trace DistillationUSENIX Security '18Shankara Pailoor, Andrew Aday, Suman Jana
    QSYM : A Practical Concolic Execution Engine Tailored for Hybrid FuzzingUSENIX Security '18Insu Yun, Sangho Lee, Meng Xu, Yeongjin Jang, Taesoo Kim
    Automatic Heap Layout Manipulation for ExploitationUSENIX Security '18Sean Heelan, Tom Melham, Daniel Kroening