You are here

USENIX is fully committed to the Open Access to research movement. To that end, all videos of conference technical session presentations are now available to the general public on the USENIX Web site shortly after they take place. In addition, we have offered free online access to conference proceedings since 2008. Visit our proceedings page to check out the latest papers.

Interested in helping us support Open Access at USENIX? Become a member today!

To find a specific conference's videos, begin by filtering by conference group and then filter by conference.

Filter by Conference Group

Multimedia

    TitleConferenceSpeaker(s)
    Ensuring Authorized Updates in Multi-user Database-Backed ApplicationsUSENIX Security '17Kevin Eykholt, Atul Prakash, Barzan Mozafari
    Measuring HTTPS Adoption on the WebUSENIX Security '17Adrienne Porter Felt, Richard Barnes, April King, Chris Palmer, Chris Bentzel, Parisa Tabriz
    Constant-Time Callees with Variable-Time CallersUSENIX Security '17Cesar Pereida García, Billy Bob Brumley
    Detecting Android Root Exploits by Learning from Root ProvidersUSENIX Security '17Ioannis Gasparis, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy
    HELP: Helper-Enabled In-Band Device Pairing Resistant Against Signal CancellationUSENIX Security '17Nirnimesh Ghose, Loukas Lazos, Ming Li
    AutoLock: Why Cache Attacks on ARM Are Harder Than You ThinkUSENIX Security '17Marc Green, Leandro Rodrigues-Lima, Andreas Zankl, Gorka Irazoqui, Johann Heyszl, Thomas Eisenbarth
    Strong and Efficient Cache Side-Channel Protection using Hardware Transactional MemoryUSENIX Security '17Daniel Gruss, Julian Lettner, Felix Schuster, Olya Ohrimenko, Istvan Haller, Manuel Costa
    Detecting Credential Spearphishing in Enterprise SettingsUSENIX Security '17Grant Ho, Aashish Sharma, Mobin Javed, Vern Paxson, David Wagner
    SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit DataUSENIX Security '17Md Nahid Hossain, Sadegh M. Milajerdi, Junao Wang, Birhanu Eshete, Rigel Gjomemo, R. Sekar, Scott Stoller, V.N. Venkatakrishnan
    vTZ: Virtualizing ARM TrustZoneUSENIX Security '17Zhichao Hua, Jinyu Gu, Yubin Xia, Haibo Chen, Binyu Zang, Haibing Guan
    Identifier Binding Attacks and Defenses in Software-Defined NetworksUSENIX Security '17Samuel Jero, William Koch, Richard Skowyra, Hamed Okhravi, Cristina Nita-Rotaru, David Bigelow
    MCMix: Anonymous Messaging via Secure Multiparty ComputationUSENIX Security '17Nikolaos Alexopoulos, Aggelos Kiayias, Riivo Talviste, Thomas Zacharias
    Understanding the Mirai BotnetUSENIX Security '17Manos Antonakakis, Tim April, Michael Bailey, Matt Bernhard, Elie Bursztein, Jaime Cochran, Zakir Durumeric, J. Alex Halderman, Luca Invernizzi, Michalis Kallitsis, Deepak Kumar, Chaz Lever, Zane Ma, Joshua Mason, Damian Menscher, Chad Seaman, Nick Sullivan, Kurt Thomas, Yi Zhou
    BLENDER: Enabling Local Search with a Hybrid Differential Privacy ModelUSENIX Security '17Brendan Avent, Aleksandra Korolova, David Zeber, Torgeir Hovden, Benjamin Livshits
    Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile PaymentUSENIX Security '17Xiaolong Bai, Zhe Zhou, XiaoFeng Wang, Zhou Li, Xianghang Mi, Nan Zhang, Tongxin Li, Shi-Min Hu, Kehuan Zhang
    Predicting the Resilience of Obfuscated Code Against Symbolic Execution Attacks via Machine LearningUSENIX Security '17Sebastian Banescu, Christian Collberg, Alexander Pretschner
    See No Evil, Hear No Evil, Feel No Evil, Print No Evil? Malicious Fill Patterns Detection in Additive ManufacturingUSENIX Security '17Christian Bayens, Tuan Le, Luis Garcia, Raheem Beyah, Mehdi Javanmard, Saman Zonouz
    Venerable Variadic Vulnerabilities VanquishedUSENIX Security '17Priyam Biswas, Alessandro Di Federico, Scott A. Carr, Prabhu Rajasekaran, Stijn Volckaert, Yeoul Na, Michael Franz, Mathias Payer
    Syntia: Synthesizing the Semantics of Obfuscated CodeUSENIX Security '17Tim Blazytko, Moritz Contag, Cornelius Aschermann, Thorsten Holz
    Performance Superpowers with Enhanced BPFUSENIX ATC '17Brendan Gregg
    Visualizing Performance with Flame GraphsUSENIX ATC '17Brendan Gregg
    Scaling Reliability at Dropbox: Our Journey towards a Distributed Ownership ModelSREcon17 AsiaSat Kriya Khalsa
    Operationalizing DevOps TeachingSREcon17 AsiaJohn Contad, Matt Witherow
    SRE Your gRPC—Building Reliable Distributed Systems (Illustrated with gRPC)SREcon17 AsiaGrainne Sheerin, Gabe Krabbe
    Distributed Scheduler HellSREcon17 AsiaMatthew Campbell