Sched.com Conference Mobile Apps
25th USENIX Security Symposium has ended
Create Your Own Event
25th USENIX Security Symposium
Schedule
Simple
Expanded
Grid
By Venue
Speakers
Sponsors
Exhibitors
Attendees
Map
Search
or browse by date + venue
ASE '16
BoFs
CSET '16
FOCI '16
HotSec '16
Security '16
Social
WOOT '16
Popular
menu
Menu
Log in
Sign up
Schedule
Speakers
Sponsors
Exhibitors
Attendees
Map
Search
Popular Events
#1
Crashing Drones and Hijacked Cameras: CyberTrust Meets CyberPhysical
#2
One Bit Flips, One Cloud Flops: Cross-VM Row Hammer Attacks and Privilege Escalation
#3
Flip Feng Shui: Hammering a Needle in the Software Stack
#4
Continental Breakfast
#5
When Governments Attack: Malware Targeting Activists, Lawyers, and Journalists
#6
PIkit: A New Kernel-Independent Processor-Interconnect Rootkit
#7
USENIX Security '16 Reception
#8
Daily Lightning Talks
#9
Opening Remarks and Awards
#10
Break with Refreshments
#11
What Cannot Be Read, Cannot Be Leveraged? Revisiting Assumptions of JIT-ROP Defenses
#12
USENIX Security '16 Work-in-Progress Reports (WiPs)
#13
Making HTTPS the Default in the World's Largest Bureaucracy
#14
Poking Holes in Information Hiding
#15
Break with Refreshments
#16
Lunch (on your own)
#17
zxcvbn: Low-Budget Password Strength Estimation
#18
Off-Path TCP Exploits: Global Rate Limit Considered Dangerous
#19
Website-Targeted False Content Injection by Network Operators
#20
A Comprehensive Measurement Study of Domain Generating Malware
#21
Post-quantum Key Exchange—A New Hope
#22
Continental Breakfast
#23
DROWN: Breaking TLS Using SSLv2
#24
Daily Lightning Talks
#25
Defending against Malicious Peripherals with Cinch
#26
Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage
#27
USENIX Security '16 Poster Session and Happy Hour
#28
Making USB Great Again with USBFILTER
#29
FlowFence: Practical Data Protection for Emerging IoT Application Frameworks
#30
Teaching Computer Security: Thoughts from the Field
#31
On Omitting Commits and Committing Omissions: Preventing Git Metadata Tampering That (Re)introduces Software Vulnerabilities
#32
Trusted Browsers for Uncertain Times
#33
Oblivious Multi-Party Machine Learning on Trusted Processors
#34
An In-Depth Analysis of Disassembly on Full-Scale x86/x64 Binaries
#35
Break with Refreshments
#36
Hidden Voice Commands
#37
Tracing Information Flows Between Ad Exchanges Using Retargeted Ads
#38
Lunch (on your own)
#39
ARMageddon: Cache Attacks on Mobile Devices
#40
Stealing Machine Learning Models via Prediction APIs
#41
All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption
#42
The Million-Key Question—Investigating the Origins of RSA Public Keys
#43
Authenticated Network Time Synchronization
#44
Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study of Web Tracking from 1996 to 2016
#45
Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification
#46
You've Got Vulnerability: Exploring Effective Vulnerability Notifications
#47
Continental Breakfast
#48
Optimized Invariant Representation of Network Traffic for Detecting Unseen Malware Variants
#49
Lock It and Still Lose It —on the (In)Security of Automotive Remote Keyless Entry Systems
#50
Specification Mining for Intrusion Detection in Networked Control Systems
Popular by Type
All Types
ASE '16
BoFs
CSET '16
FOCI '16
HotSec '16
Security '16
Social
WOOT '16
Popular by Day
All days
Monday, Aug 8
Tuesday, Aug 9
Wednesday, Aug 10
Thursday, Aug 11
Friday, Aug 12
Recently Active Attendees
nacalvas
AG
Arnold Gatilao
Jamie
Brian R
Ionut Ilie
H
harmenjonker
R
richandrews
PK
Peter Karbaliotis
More →