You are here

USENIX is fully committed to the Open Access to research movement. To that end, all videos of conference technical session presentations are now available to the general public on the USENIX Web site shortly after they take place. In addition, we have offered free online access to conference proceedings since 2008. Visit our proceedings page to check out the latest papers.

Interested in helping us support Open Access at USENIX? Become a member today!

To find a specific conference's videos, begin by filtering by conference group and then filter by conference.

Filter by Conference Group

Multimedia

    TitleConferenceSpeaker(s)
    "I Have No Idea What I'm Doing" - On the Usability of Deploying HTTPSUSENIX Security '17Katharina Krombholz, Wilfried Mayer, Martin Schmiedecker, Edgar Weippl
    Phoenix: Rebirth of a Cryptographic Password-Hardening ServiceUSENIX Security '17Russell W. F. Lai, Christoph Egger, Dominique Schröder, Sherman S. M. Chow
    CAn’t Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel MemoryUSENIX Security '17Ferdinand Brasser, Lucas Davi, David Gens, Christopher Liebchen, Ahmad-Reza Sadeghi
    Hacking in Darkness: Return-oriented Programming against Secure EnclavesUSENIX Security '17Jaehyuk Lee, Jinsoo Jang, Yeongjin Jang, Nohyun Kwak, Yeseul Choi, Changho Choi, Taesoo Kim, Marcus Peinado, Brent Byunghoon Kang
    Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch ShadowingUSENIX Security '17Sangho Lee, Ming-Wei Shih, Prasun Gera, Taesoo Kim, Hyesoon Kim, Marcus Peinado
    DeTor: Provably Avoiding Geographic Regions in TorUSENIX Security '17Zhihao Li, Stephen Herwig, Dave Levin
    Measuring the Insecurity of Mobile Deep Links of AndroidUSENIX Security '17Fang Liu, Chun Wang, Andres Pico, Danfeng Yao, Gang Wang
    SmartPool: Practical Decentralized Pooled MiningUSENIX Security '17Loi Luu, Yaron Velner, Jason Teutsch, Prateek Saxena
    MPI: Multiple Perspective Attack Investigation with Semantic Aware Execution PartitioningUSENIX Security '17Shiqing Ma, Juan Zhai, Fei Wang, Kyu Hyung Lee, Xiangyu Zhang, Dongyan Xu
    DR. CHECKER: A Soundy Analysis for Linux Kernel DriversUSENIX Security '17Aravind Machiry, Chad Spensky, Jake Corina, Nick Stephens, Christopher Kruegel, Giovanni Vigna
    PDF Mirage: Content Masking Attack Against Information-Based Online ServicesUSENIX Security '17Ian Markwood, Dakun Shen, Yao Liu, Zhuo Lu
    ROTE: Rollback Protection for Trusted ExecutionUSENIX Security '17Sinisa Matetic, Mansoor Ahmed, Kari Kostiainen, Aritra Dhar, David Sommer, Arthur Gervais, Ari Juels, Srdjan Capkun
    Towards Practical Tools for Side Channel Aware Software Engineering: 'Grey Box' Modelling for Instruction LeakagesUSENIX Security '17David McCann, Elisabeth Oswald, Carolyn Whitnall
    When the Weakest Link is Strong: Secure Collaboration in the Case of the Panama PapersUSENIX Security '17Susan E. McGregor, Elizabeth Anne Watkins, Mahdi Nasrullah Al-Ameen, Kelly Caine, Franziska Roesner
    Qapla: Policy compliance for database-backed systemsUSENIX Security '17Aastha Mehta, Eslam Elnikety, Katura Harvey, Deepak Garg, Peter Druschel
    BinSim: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence CheckingUSENIX Security '17Jiang Ming, Dongpeng Xu, Yufei Jiang, Dinghao Wu
    Vale: Verifying High-Performance Cryptographic Assembly CodeUSENIX Security '17Barry Bond, Chris Hawblitzel, Manos Kapritsos, K. Rustan M. Leino, Jacob R. Lorch, Bryan Parno, Ashay Rane, Srinath Setty, Laure Thompson
    Game of Registrars: An Empirical Analysis of Post-Expiration Domain Name TakeoversUSENIX Security '17Tobias Lauinger, Abdelberi Chaabane, Ahmet Salih Buyukkayhan, Kaan Onarlioglu, William Robertson
    CCSP: Controlled Relaxation of Content Security Policies by Runtime Policy CompositionUSENIX Security '17Stefano Calzavara, Alvise Rabitti, Michele Bugliesi
    Adaptive Android Kernel Live PatchingUSENIX Security '17Yue Chen, Yulong Zhang, Zhi Wang, Liangzhao Xia, Chenfu Bao, Tao Wei
    Neural Nets Can Learn Function Type Signatures From BinariesUSENIX Security '17Zheng Leong Chua, Shiqi Shen, Prateek Saxena, Zhenkai Liang
    A Longitudinal, End-to-End View of the DNSSEC EcosystemUSENIX Security '17Taejoong Chung, Roland van Rijswijk-Deij, Balakrishnan Chandrasekaran, David Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Christo Wilson
    Oscar: A Practical Page-Permissions-Based Scheme for Thwarting Dangling PointersUSENIX Security '17Thurston H.Y. Dang, Petros Maniatis, David Wagner
    Efficient Protection of Path-Sensitive Control SecurityUSENIX Security '17Ren Ding, Chenxiong Qian, Chengyu Song, Bill Harris, Taesoo Kim, Wenke Lee
    Prime+Abort: A Timer-Free High-Precision L3 Cache Attack using Intel TSXUSENIX Security '17Craig Disselkoen, David Kohlbrenner, Leo Porter, Dean Tullsen