You are here

USENIX is fully committed to the Open Access to research movement. To that end, all videos of conference technical session presentations are now available to the general public on the USENIX website shortly after they take place. In addition, we have offered free online access to conference proceedings since 2008. Visit our proceedings page to check out the latest papers.

Interested in helping us support Open Access at USENIX? Become a member today!

To find a specific conference's videos, begin by filtering by conference group and then filter by conference.

Filter by Conference Group


    The Second Crypto War—What's Different NowUSENIX Security '18Susan Landau
    Medical Device Cybersecurity through the FDA LensUSENIX Security '18Suzanne B. Schwartz
    The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGXUSENIX Security '18Andrea Biondo, Mauro Conti, Lucas Davi, Tommaso Frassetto, Ahmad-Reza Sadeghi
    A Bad Dream: Subverting Trusted Platform Module While You Are SleepingUSENIX Security '18Seunghun Han, Wook Shin, Jun-Hyeok Park, HyoungChun Kim
    Tackling runtime-based obfuscation in Android with TIROUSENIX Security '18Michelle Y. Wong, David Lie
    Discovering Flaws in Security-Focused Static Analysis Tools for Android using Systematic MutationUSENIX Security '18Richard Bonett, Kaushal Kafle, Kevin Moran, Adwait Nadkarni, Denys Poshyvanyk
    With Great Training Comes Great Vulnerability: Practical Attacks against Transfer LearningUSENIX Security '18Bolun Wang, Yuanshun Yao, Bimal Viswanath, Haitao Zheng, Ben Y. Zhao
    When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning AttacksUSENIX Security '18Octavian Suciu, Radu Marginean, Yigitcan Kaya, Hal Daume III, Tudor Dumitras
    teEther: Gnawing at Ethereum to Automatically Exploit Smart ContractsUSENIX Security '18Johannes Krupp, Christian Rossow
    Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart ContractsUSENIX Security '18Lorenz Breindenbach, Phil Daian, Florian Tramer, Ari Juels
    Arbitrum: Scalable, private smart contractsUSENIX Security '18Harry Kalodner, Steven Goldfeder, Xiaoqi Chen, S. Matthew Weinberg, Edward W. Felten
    Erays: Reverse Engineering Ethereum's Opaque Smart ContractsUSENIX Security '18Yi Zhou, Deepak Kumar, Surya Bakshi, Joshua Mason, Andrew Miller, Michael Bailey
    DelegaTEE: Brokered Delegation Using Trusted Execution EnvironmentsUSENIX Security '18Sinisa Matetic, Moritz Schneider, Andrew Miller, Ari Juels, Srdjan Capkun
    Simple Password-Hardened Encryption ServicesUSENIX Security '18Russell W. F. Lai, Christoph Egger, Manuel Reinert, Sherman S. M. Chow, Matteo Maffei, Dominique Schröder
    Security Namespace: Making Linux Security Frameworks Available to ContainersUSENIX Security '18Yuqiong Sun, David Safford, Mimi Zohar, Dimitrios Pendarakis, Zhongshu Gu, Trent Jaeger
    Shielding Software From Privileged Side-Channel AttacksUSENIX Security '18Xiaowan Dong, Zhuojia Shen, John Criswell, Alan L. Cox, Sandhya Dwarkadas
    Vetting Single Sign-On SDK Implementations via Symbolic ReasoningUSENIX Security '18Ronghai Yang, Wing Cheong Lau, Jiongyi Chen, Kehuan Zhang
    O Single Sign-Off, Where Art Thou? An Empirical Analysis of Single Sign-On Account Hijacking and Session Management on the WebUSENIX Security '18Mohammad Ghasemisharif, Amrutha Ramesh, Stephen Checkoway, Chris Kanich, Jason Polakis
    WPSE: Fortifying Web Protocols via Browser-Side Security MonitoringUSENIX Security '18Stefano Calzavara, Riccardo Focardi, Matteo Maffei, Clara Schneidewind, Marco Squarcina, Mauro Tempesta
    Man-in-the-Machine: Exploiting Ill-Secured Communication Inside the ComputerUSENIX Security '18Thanh Bui, Siddharth Prakash Rao, Markku Antikainen, Viswanathan Manihatty Bojan, Tuomas Aura
    All Your GPS Are Belong To Us: Towards Stealthy Manipulation of Road Navigation SystemsUSENIX Security '18Kexiong (Curtis) Zeng, Shinan Liu, Yuanchao Shu, Dong Wang, Haoyu Li, Yanzhi Dou, Gang Wang, Yaling Yang
    Injected and Delivered: Fabricating Implicit Control over Actuation Systems by Spoofing Inertial SensorsUSENIX Security '18Yazhou Tu, Zhiqiang Lin, Insup Lee, Xiali Hei
    Modelling and Analysis of a Hierarchy of Distance Bounding AttacksUSENIX Security '18Tom Chothia, Joeri de Ruiter, Ben Smyth
    We Still Don’t Have Secure Cross-Domain Requests: an Empirical Study of CORSUSENIX Security '18Jianjun Chen, Jian Jiang, Haixin Duan, Tao Wan, Shuo Chen, Vern Paxson, Min Yang
    Off-Path TCP Exploit: How Wireless Routers Can Jeopardize Your SecretsUSENIX Security '18Weiteng Chen, Zhiyun Qian