You are here

USENIX is fully committed to the Open Access to research movement. To that end, all videos of conference technical session presentations are now available to the general public on the USENIX website shortly after they take place. In addition, we have offered free online access to conference proceedings since 2008. Visit our proceedings page to check out the latest papers.

Interested in helping us support Open Access at USENIX? Become a member today!

To find a specific conference's videos, begin by filtering by conference group and then filter by conference.

Filter by Conference Group


    Formal Security Analysis of Neural Networks using Symbolic IntervalsUSENIX Security '18Shiqi Wang, Kexin Pei, Justin Whitehouse, Junfeng Yang, Suman Jana
    Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by BackdooringUSENIX Security '18Yossi Adi, Carsten Baum, Moustapha Cisse, Benny Pinkas, Joseph Keshet
    A4NT: Author Attribute Anonymity by Adversarial Training of Neural Machine TranslationUSENIX Security '18Rakshith Shetty, Bernt Schiele, Mario Fritz
    GAZELLE: A Low Latency Framework for Secure Neural Network InferenceUSENIX Security '18Chiraag Juvekar, Vinod Vaikuntanathan, Anantha Chandrakasan
    FlowCog: Context-aware Semantics Extraction and Analysis of Information Flow Leaks in Android AppsUSENIX Security '18Xiang Pan, Yinzhi Cao, Xuechao Du, Boyuan He, Gan Fang, Rui Shao, Yan Chen
    Sensitive Information Tracking in Commodity IoTUSENIX Security '18Z. Berkay Celik, Leonardo Babun, Amit Kumar Sikder, Hidayet Aksu, Gang Tan, Patrick McDaniel, A. Selcuk Uluagac
    Enabling Refinable Cross-Host Attack Investigation with Efficient Data Flow Tagging and TrackingUSENIX Security '18Yang Ji, Sangho Lee, Mattia Fazzini, Joey Allen, Evan Downing, Taesoo Kim, Alessandro Orso, Wenke Lee
    Dependence-Preserving Data Compaction for Scalable Forensic AnalysisUSENIX Security '18Md Nahid Hossain, Junao Wang, R. Sekar, Scott D. Stoller
    HeapHopper: Bringing Bounded Model Checking to Heap Implementation SecurityUSENIX Security '18Moritz Eckert, Antonio Bianchi, Ruoyu Wang, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna
    Chaos EngineeringLISA18Nora Jones
    Throwhammer: Rowhammer Attacks over the Network and DefensesUSENIX ATC '18Andrei Tatar, Radhesh Krishnan Konoth, Elias Athanasopoulos, Cristiano Giuffrida, Herbert Bos, Kaveh Razavi
    Privacy for TigersUSENIX ATC '18Ross Anderson
    Mental Models for SREsSREcon18 AsiaMohit Suley
    Production Engineering: Connect the DotsSREcon18 AsiaEspen Roth
    A Theory and Practice of Alerting with Service Level ObjectivesSREcon18 AsiaJamie Wilkinson
    Blame. Language. Sharing: Three Tips for Learning from Incidents in Your OrganisationSREcon18 AsiaLindsay Holmwood
    Mentoring: A Newcomer's PerspectiveSREcon18 AsiaLeoren Tanyag
    You Get What You Measure—Why Metrics Are ImportantSREcon18 AsiaKumar Srinivasamurthy
    Scaling Yourself for Managing Distributed Teams Delivering Reliable ServicesSREcon18 AsiaPaul Greig
    Scaling a Distributed Stateful System: A LinkedIn Case StudySREcon18 AsiaSai Kiran Kanuri
    Characterizing and Understanding Phases of SRE PracticesSREcon18 AsiaKurt Andersen
    Interviewing for Systems Design SkillsSREcon18 AsiaSebastian Kirsch
    Automatic Traffic Scheduling for Internet Connectivity FailuresSREcon18 AsiaLiuqing Zhang
    Do Docs Better: Practical Tips on Delivering Value to Your Business through Better DocumentationSREcon18 AsiaRiona MacNamara
    PV Monitoring Based on Linear RegressionSREcon18 AsiaWang Bo