You are here

USENIX is fully committed to the Open Access to research movement. To that end, all videos of conference technical session presentations are now available to the general public on the USENIX website shortly after they take place. In addition, we have offered free online access to conference proceedings since 2008. Visit our proceedings page to check out the latest papers.

Interested in helping us support Open Access at USENIX? Become a member today!

To find a specific conference's videos, begin by filtering by conference group and then filter by conference.

Filter by Conference Group

Multimedia

    TitleConferenceSpeaker(s)
    SLM-DB: Single-Level Key-Value Store with Persistent MemoryFAST '19Olzhas Kaiyrakhmet, Songyi Lee, Beomseok Nam, Sam H. Noh, Young-ri Choi
    Ziggurat: A Tiered File System for Non-Volatile Main Memories and DisksFAST '19Shengan Zheng, Morteza Hoseinzadeh, Steven Swanson
    Orion: A Distributed File System for Non-Volatile Main Memory and RDMA-Capable NetworksFAST '19Jian Yang, Joseph Izraelevitz, Steven Swanson
    INSTalytics: Cluster Filesystem Co-design for Big-data AnalyticsFAST '19Muthian Sivathanu, Midhul Vuppalapati, Bhargav S. Gulavani, Kaushik Rajan, Jyoti Leeka, Jayashree Mohan, Piyus Kedia
    GraphOne: A Data Store for Real-time Analytics on Evolving GraphsFAST '19Pradeep Kumar, H. Howie Huang
    Automatic, Application-Aware I/O Forwarding Resource AllocationFAST '19Xu Ji, Bin Yang, Tianyu Zhang, Xiaosong Ma, Xiupeng Zhu, Xiyang Wang, Nosayba El-Sayed, Jidong Zhai, Weiguo Liu, Wei Xue
    Design Tradeoffs for SSD ReliabilityFAST '19Bryan S. Kim, Jongmoo Choi, Sang Lyul Min
    Fully Automatic Stream Management for Multi-Streamed SSDs Using Program ContextsFAST '19Taejin Kim, Duwon Hong, Sangwook Shane Hahn, Myoungjun Chun, Sungjin Lee, Jooyoung Hwang, Jongyoul Lee, Jihong Kim
    Large-Scale Graph Processing on Emerging Storage DevicesFAST '19Nima Elyasi, Changho Choi, Anand Sivasubramaniam
    Fast Erasure Coding for Data Storage: A Comprehensive Study of the Acceleration TechniquesFAST '19Tianli Zhou, Chao Tian
    OpenEC: Toward Unified and Configurable Erasure Coding Management in Distributed Storage SystemsFAST '19Xiaolu Li, Runhui Li, Patrick P. C. Lee, Yuchong Hu
    ScaleCheck: A Single-Machine Approach for Discovering Scalability Bugs in Large Distributed SystemsFAST '19Cesar A. Stuardo, Tanakorn Leesatapornwongsa, Riza O. Suminto, Huan Ke, Jeffrey F. Lukman, Wei-Chiu Chuang, Shan Lu, Haryadi S. Gunawi
    Cluster storage systems gotta have HeART: improving storage efficiency by exploiting disk-reliability heterogeneityFAST '19Saurabh Kadekodi, K. V. Rashmi, Gregory R. Ganger
    Something You Have and Someone You Know—Designing for Interpersonal SecurityEnigma 2019Periwinkle Doerfler
    Physical OPSEC as a Metaphor for InfosecEnigma 2019Mark Loveless
    How to Predict Which Vulnerabilities Will Be ExploitedEnigma 2019Tudor Dumitras
    Why Even Experienced and Highly Intelligent Developers Write Vulnerable Code and What We Should Do about ItEnigma 2019Daniela Seabra Oliveira
    If Red Teaming Is Easy: You're Doing It WrongEnigma 2019Aaron Grattafiori
    When the Magic Wears Off: Flaws in ML for Security Evaluations (and What to Do about It)Enigma 2019Lorenzo Cavallaro
    Stethoscope: Securely Configuring Devices without Systems ManagementEnigma 2019Andrew M. White
    Moving Fast and Breaking Things: Security MisconfigurationsEnigma 2019Kevin Borgolte
    Convincing the Loser: Securing Elections against Modern ThreatsEnigma 2019Ben Adida
    Mr. Lord Goes to Washington, or Applying Security outside the Tech WorldEnigma 2019Bob Lord
    Digital Authoritarianism, Data Protection, and the Battle over Information ControlEnigma 2019Andrea Little Limbago
    Insider Attack Resistance in the Android EcosystemEnigma 2019René Mayrhofer