You are here

USENIX is fully committed to the Open Access to research movement. To that end, all videos of conference technical session presentations are now available to the general public on the USENIX website shortly after they take place. In addition, we have offered free online access to conference proceedings since 2008. Visit our proceedings page to check out the latest papers.

Interested in helping us support Open Access at USENIX? Become a member today!

To find a specific conference's videos, begin by filtering by conference group and then filter by conference.

Filter by Conference Group

Multimedia

    TitleConferenceSpeaker(s)
    Debloating Software through Piece-Wise Compilation and LoadingUSENIX Security '18Anh Quach, Aravind Prakash, Lok Yan
    Precise and Accurate Patch Presence Test for BinariesUSENIX Security '18Hang Zhang, Zhiyun Qian
    From Patching Delays to Infection Symptoms: Using Risk Profiles for an Early Discovery of Vulnerabilities Exploited in the WildUSENIX Security '18Chaowei Xiao, Armin Sarabi, Yang Liu, Bo Li, Mingyan Liu, Tudor Dumitras
    Understanding the Reproducibility of Crowd-reported Security VulnerabilitiesUSENIX Security '18Dongliang Mu, Alejandro Cuevas, Limin Yang, Hang Hu, Xinyu Xing, Bing Mao, Gang Wang
    Malicious Management Unit: Why Stopping Cache Attacks in Software is Harder Than You ThinkUSENIX Security '18Stephan van Schaik, Cristiano Giuffrida, Herbert Bos, Kaveh Razavi
    Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB AttacksUSENIX Security '18Ben Gras, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida
    Meltdown: Reading Kernel Memory from User SpaceUSENIX Security '18Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Anders Fogh, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg
    Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order ExecutionUSENIX Security '18Jo Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas F. Wenisch, Yuval Yarom, Raoul Strackx
    Plug and Prey? Measuring the Commoditization of Cybercrime via Online Anonymous MarketsUSENIX Security '18Rolf van Wegberg, Samaneh Tajalizadehkhoob, Kyle Soska, Ugur Akyazi, Carlos Hernandez Ganan, Bram Klievink, Nicolas Christin, Michel van Eeten
    Reading Thieves' Cant: Automatically Identifying and Understanding Dark Jargons from Cybercrime MarketplacesUSENIX Security '18Kan Yuan, Haoran Lu, Xiaojing Liao, XiaoFeng Wang
    Schrödinger’s RAT: Profiling the Stakeholders in the Remote Access Trojan EcosystemUSENIX Security '18Mohammad Rezaeirad, Brown Farinholt, Hitesh Dharmdasani, Paul Pearce, Kirill Levchenko, Damon McCoy
    The aftermath of a crypto-ransomware attack at a large academic institutionUSENIX Security '18Leah Zhang-Kennedy, Hala Assal, Jessica Rocheleau, Reham Mohamed, Khadija Baig, Sonia Chiasson
    The Law and Economics of Bug BountiesUSENIX Security '18Amit Elazari Bar On
    End-to-End Measurements of Email Spoofing AttacksUSENIX Security '18Hang Hu, Gang Wang
    Who Is Answering My Queries: Understanding and Characterizing Interception of the DNS Resolution PathUSENIX Security '18Baojun Liu, Chaoyi Lu, Haixin Duan, Ying Liu, Zhou Li, Shuang Hao, Min Yang
    End-Users Get Maneuvered: Empirical Analysis of Redirection Hijacking in Content Delivery NetworksUSENIX Security '18Shuai Hao, Yubao Zhang, Haining Wang, Angelos Stavrou
    SAD THUG: Structural Anomaly Detection for Transmissions of High-value Information Using GraphicsUSENIX Security '18Jonathan P. Chapman
    FANCI : Feature-based Automated NXDomain Classification and IntelligenceUSENIX Security '18Samuel Schüppen, Dominik Teubert, Patrick Herrmann, Ulrike Meyer
    An Empirical Study of Web Resource Manipulation in Real-world Mobile ApplicationsUSENIX Security '18Xiaohan Zhang, Yuan Zhang, Qianqian Mo, Hao Xia, Zhemin Yang, Min Yang, Xiaofeng Wang, Long Lu, Haixin Duan
    Fast and Service-preserving Recovery from Malware Infections Using CRIUUSENIX Security '18Ashton Webster, Ryan Eckenrod, James Purtilo
    The Second Crypto War—What's Different NowUSENIX Security '18Susan Landau
    Medical Device Cybersecurity through the FDA LensUSENIX Security '18Suzanne B. Schwartz
    The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGXUSENIX Security '18Andrea Biondo, Mauro Conti, Lucas Davi, Tommaso Frassetto, Ahmad-Reza Sadeghi
    A Bad Dream: Subverting Trusted Platform Module While You Are SleepingUSENIX Security '18Seunghun Han, Wook Shin, Jun-Hyeok Park, HyoungChun Kim
    Tackling runtime-based obfuscation in Android with TIROUSENIX Security '18Michelle Y. Wong, David Lie