You are here

USENIX is fully committed to the Open Access to research movement. To that end, all videos of conference technical session presentations are now available to the general public on the USENIX Web site shortly after they take place. In addition, we have offered free online access to conference proceedings since 2008. Visit our proceedings page to check out the latest papers.

Interested in helping us support Open Access at USENIX? Become a member today!

To find a specific conference's videos, begin by filtering by conference group and then filter by conference.

Filter by Conference Group


    Differential Privacy: From Theory to DeploymentUSENIX Security '17Abhradeep Guha Thakurta
    Computer Security, Privacy, and DNA Sequencing: Compromising Computers with Synthesized DNA, Privacy Leaks, and MoreUSENIX Security '17Peter Ney, Karl Koscher, Lee Organick, Luis Ceze, Tadayoshi Kohno
    CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified BuildsUSENIX Security '17Kirill Nikitin, Eleftherios Kokoris-Kogias, Philipp Jovanovic, Nicolas Gailly, Linus Gasser, Ismail Khoffi, Justin Cappos, Bryan Ford
    Ninja: Towards Transparent Tracing and Debugging on ARMUSENIX Security '17Zhenyu Ning, Fengwei Zhang
    TrustBase: An Architecture to Repair and Strengthen Certificate-based AuthenticationUSENIX Security '17Mark O'Neill, Scott Heidbrink, Scott Ruoti, Jordan Whitehead, Dan Bunker, Luke Dickinson, Travis Hendershot, Joshua Reynolds, Kent Seamons, Daniel Zappala
    Digtool: A Virtualization-Based Framework for Detecting Kernel VulnerabilitiesUSENIX Security '17Jianfeng Pan, Guanglu Yan, Xiaocao Fan
    Global Measurement of DNS ManipulationUSENIX Security '17Paul Pearce, Ben Jones, Frank Li, Roya Ensafi, Nick Feamster, Nick Weaver, Vern Paxson
    AWare: Preventing Abuse of Privacy-Sensitive Sensors via Operation BindingsUSENIX Security '17Giuseppe Petracca, Ahmad-Atamli Reineh, Yuqiong Sun, Jens Grossklags, Trent Jaeger
    ORide: A Privacy-Preserving yet Accountable Ride-Hailing ServiceUSENIX Security '17Anh Pham, Italo Dacosta, Guillaume Endignoux, Juan Ramon Troncoso Pastoriza, Kevin Huguenin, Jean-Pierre Hubaux
    The Loopix Anonymity SystemUSENIX Security '17Ania M. Piotrowska, Jamie Hayes, Tariq Elahi, Sebastian Meiser, George Danezis
    Exploring User Perceptions of Discrimination in Online Targeted AdvertisingUSENIX Security '17Angelisa C. Plane, Elissa M. Redmiles, Michelle L. Mazurek, Michael Carl Tschantz
    AuthentiCall: Efficient Identity and Content Authentication for Phone CallsUSENIX Security '17Bradley Reaves, Logan Blue, Hadi Abdullah, Luis Vargas, Patrick Traynor, Thomas Shrimpton
    BootStomp: On the Security of Bootloaders in Mobile DevicesUSENIX Security '17Nilo Redini, Aravind Machiry, Dipanjan Das, Yanick Fratantonio, Antonio Bianchi, Eric Gustafson, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna
    Extension Breakdown: Security Analysis of Browsers Extension Resources Control PoliciesUSENIX Security '17Iskander Sanchez-Rola, Igor Santos, Davide Balzarotti
    kAFL: Hardware-Assisted Feedback Fuzzing for OS KernelsUSENIX Security '17Sergej Schumilo, Cornelius Aschermann, Robert Gawlik, Sebastian Schinzel, Thorsten Holz
    Beauty and the Burst: Remote Identification of Encrypted Video StreamsUSENIX Security '17Roei Schuster, Vitaly Shmatikov, Eran Tromer
    Same-Origin Policy: Evaluation in Modern BrowsersUSENIX Security '17Jörg Schwenk, Marcus Niemietz, Christian Mainka
    6thSense: A Context-aware Sensor-based Attack Detector for Smart DevicesUSENIX Security '17Amit Kumar Sikder, Hidayet Aksu, A. Selcuk Uluagac
    Characterizing the Nature and Dynamics of Tor Exit BlockingUSENIX Security '17Rachee Singh, Rishab Nithyanand, Sadia Afroz, Paul Pearce, Michael Carl Tschantz, Phillipa Gill, Vern Paxson
    Speeding up detection of SHA-1 collision attacks using unavoidable attack conditionsUSENIX Security '17Marc Stevens, Daniel Shumow
    How the Web Tangled Itself: Uncovering the History of Client-Side Web (In)SecurityUSENIX Security '17Ben Stock, Martin Johns, Marius Steffens, Michael Backes
    Towards Efficient Heap Overflow DiscoveryUSENIX Security '17Xiangkun Jia, Chao Zhang, Purui Su, Yi Yang, Huafeng Huang, Dengguo Feng
    Transcend: Detecting Concept Drift in Malware Classification ModelsUSENIX Security '17Roberto Jordaney, Kumar Sharad, Santanu K. Dash, Zhi Wang, Davide Papini, Ilia Nouretdinov, Lorenzo Cavallaro
    On the effectiveness of mitigations against floating-point timing channelsUSENIX Security '17David Kohlbrenner, Hovav Shacham
    Reverse Engineering x86 Processor MicrocodeUSENIX Security '17Philipp Koppe, Benjamin Kollenda, Marc Fyrbiak, Christian Kison, Robert Gawlik, Christof Paar, Thorsten Holz