You are here

USENIX is fully committed to the Open Access to research movement. To that end, all videos of conference technical session presentations are now available to the general public on the USENIX website shortly after they take place. In addition, we have offered free online access to conference proceedings since 2008. Visit our proceedings page to check out the latest papers.

Interested in helping us support Open Access at USENIX? Become a member today!

To find a specific conference's videos, begin by filtering by conference group and then filter by conference.

Filter by Conference Group

Multimedia

    TitleConferenceSpeaker(s)
    PolicyLint: Investigating Internal Privacy Policy Contradictions on Google PlayUSENIX Security '19Benjamin Andow, Samin Yaseer Mahmud, Wenyu Wang, Justin Whitaker, William Enck, Bradley Reaves, Kapil Singh, Tao Xie
    The Secret Sharer: Evaluating and Testing Unintended Memorization in Neural NetworksUSENIX Security '19Nicholas Carlini, Chang Liu, Úlfar Erlingsson, Jernej Kos, Dawn Song
    Clinical Computer Security for Victims of Intimate Partner ViolenceUSENIX Security '19Sam Havron, Diana Freed, Rahul Chatterjee, Damon McCoy, Nicola Dell, Thomas Ristenpart
    RVFuzzer: Finding Input Validation Bugs in Robotic Vehicles through Control-Guided TestingUSENIX Security '19Taegyu Kim, Chung Hwan Kim, Junghwan Rhee, Fan Fei, Zhan Tu, Gregory Walkup, Xiangyu Zhang, Xinyan Deng, Dongyan Xu
    uXOM: Efficient eXecute-Only Memory on ARM Cortex-MUSENIX Security '19Donghyun Kwon, Jangseop Shin, Giyeol Kim, Byoungyoung Lee, Yeongpil Cho, Yunheung Paek
    ALOHA: Auxiliary Loss Optimization for Hypothesis AugmentationUSENIX Security '19Ethan M. Rudd, Felipe N. Ducau, Cody Wild, Konstantin Berlin, Richard Harang
    Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved FeaturesUSENIX Security '19Liang Tong, Bo Li, Chen Hajaj, Chaowei Xiao, Ning Zhang, Yevgeniy Vorobeychik
    ScatterCache: Thwarting Cache Attacks via Cache Set RandomizationUSENIX Security '19Mario Werner, Thomas Unterluggauer, Lukas Giner, Michael Schwarz, Daniel Gruss, Stefan Mangard
    UWB-ED: Distance Enlargement Attack Detection in Ultra-WidebandUSENIX Security '19Mridula Singh, Patrick Leu, AbdelRahman Abdou, Srdjan Capkun
    Evaluating the Contextual Integrity of Privacy Regulation: Parents' IoT Toy Privacy Norms Versus COPPAUSENIX Security '19Noah Apthorpe, Sarah Varghese, Nick Feamster
    Stack Overflow Considered Helpful! Deep Learning Security Nudges Towards Stronger CryptographyUSENIX Security '19Felix Fischer, Huang Xiao, Ching-Yu Kao, Yannick Stachelscheid, Benjamin Johnson, Danial Razar, Paul Fawkesley, Nat Buckley, Konstantin Böttinger, Paul Muntean, Jens Grossklags
    simTPM: User-centric TPM for Mobile DevicesUSENIX Security '19Dhiman Chakraborty, Lucjan Hanzlik, Sven Bugiel
    HardFails: Insights into Software-Exploitable Hardware BugsUSENIX Security '19Ghada Dessouky, David Gens, Patrick Haney, Garrett Persyn, Arun Kanuparthi, Hareesh Khattri, Jason M. Fung, Ahmad-Reza Sadeghi, Jeyavijayan Rajendran
    SPOILER: Speculative Load Hazards Boost Rowhammer and Cache AttacksUSENIX Security '19Saad Islam, Ahmad Moghimi, Ida Bruhns, Moritz Krebbel, Berk Gulmezoglu, Thomas Eisenbarth, Berk Sunar
    Misleading Authorship Attribution of Source Code using Adversarial LearningUSENIX Security '19Erwin Quiring, Alwin Maier, Konrad Rieck
    Secure Multi-User Content Sharing for Augmented Reality ApplicationsUSENIX Security '19Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner
    Hiding in Plain Signal: Physical Signal Overshadowing Attack on LTEUSENIX Security '19Hojoon Yang, Sangwook Bae, Mincheol Son, Hongil Kim, Song Min Kim, Yongdae Kim
    Losing the Car Keys: Wireless PHY-Layer Insecurity in EV ChargingUSENIX Security '19Richard Baker, Ivan Martinovic
    CANvas: Fast and Inexpensive Automotive Network MappingUSENIX Security '19Sekar Kulandaivel, Tushar Goyal, Arnav Kumar Agrawal, Vyas Sekar
    A Study of the Feasibility of Co-located App Attacks against BLE and a Large-Scale Analysis of the Current Application-Layer Security LandscapeUSENIX Security '19Pallavi Sivakumaran, Jorge Blasco
    Identifying Cache-Based Side Channels through Secret-Augmented Abstract InterpretationUSENIX Security '19Shuai Wang, Yuyan Bao, Xiao Liu, Pei Wang, Danfeng Zhang, Dinghao Wu
    Tackling the Trust and Safety CrisisUSENIX Security '19Alex Stamos
    When the Signal is in the Noise: Exploiting Diffix's Sticky NoiseUSENIX Security '19Andrea Gadotti, Florimond Houssiau, Luc Rocher, Benjamin Livshits, Yves-Alexandre de Montjoye
    PAC it up: Towards Pointer Integrity using ARM Pointer AuthenticationUSENIX Security '19Hans Liljestrand, Thomas Nyman, Kui Wang, Carlos Chinea Perez, Jan-Erik Ekberg, N. Asokan
    All Your Clicks Belong to Me: Investigating Click Interception on the WebUSENIX Security '19Mingxue Zhang, Wei Meng, Sangho Lee, Byoungyoung Lee, Xinyu Xing