| 2012 | 7th ACM Symposium on Information, Compuer and Communications Security, ASIACCS '12, Seoul, Korea, May 2-4, 2012 Heung Youl Youm, Yoojae Won |
| 2012 | A closer look at keyboard acoustic emanations: random passwords, typing styles and decoding techniques. Tzipora Halevi, Nitesh Saxena |
| 2012 | AdDroid: privilege separation for applications and advertisers in Android. Paul Pearce, Adrienne Porter Felt, Gabriel Nunez, David A. Wagner |
| 2012 | Adaptive semi-private email aliases. Beng Heng Ng, Alexander Crowell, Atul Prakash |
| 2012 | Adding query privacy to robust DHTs. Michael Backes, Ian Goldberg, Aniket Kate, Tomas Toft |
| 2012 | An efficient broadcast attack against NTRU. Jianwei Li, Yanbin Pan, Mingjie Liu, Guizhen Zhu |
| 2012 | An identity authentication protocol in online social networks. Lingjun Li, Xinxin Zhao, Guoliang Xue |
| 2012 | An independent validation of vulnerability discovery models. Viet Hung Nguyen, Fabio Massacci |
| 2012 | Boosting efficiency and security in proof of ownership for deduplication. Roberto Di Pietro, Alessandro Sorniotti |
| 2012 | CARMA: a hardware tamper-resistant isolated execution environment on commodity x86 platforms. Amit Vasudevan, Jonathan M. McCune, James Newsome, Adrian Perrig, Leendert van Doorn |
| 2012 | CL-PRE: a certificateless proxy re-encryption scheme for secure data sharing with public cloud. Lei Xu, Xiaoxin Wu, Xinwen Zhang |
| 2012 | Carving secure wi-fi zones with defensive jamming. Yu Seung Kim, Patrick Tague, Heejo Lee, Hyogon Kim |
| 2012 | Ciphertext policy attribute-based encryption from lattices. Jiang Zhang, Zhenfeng Zhang, Aijun Ge |
| 2012 | CloudER: a framework for automatic software vulnerability location and patching in the cloud. Ping Chen, Dongyan Xu, Bing Mao |
| 2012 | ClusterFA: a memory-efficient DFA structure for network intrusion detection. Lei Jiang, Jianlong Tan, Yanbing Liu |
| 2012 | Coercion resistance in authentication responsibility shifting. Payas Gupta, Xuhua Ding, Debin Gao |
| 2012 | Constraint-enhanced role engineering via answer set programming. Jinwei Hu, Khaled M. Khan, Yun Bai, Yan Zhang |
| 2012 | Discovering records of private VoIP calls without wiretapping. Chang-Han Jong, Virgil D. Gligor |
| 2012 | Expressive CP-ABE with partially hidden access structures. Junzuo Lai, Robert H. Deng, Yingjiu Li |
| 2012 | FlashOver: automated discovery of cross-site scripting vulnerabilities in rich internet applications. Steven Van Acker, Nick Nikiforakis, Lieven Desmet, Wouter Joosen, Frank Piessens |
| 2012 | Forgery-resilience for digital signature schemes. Atefeh Mashatan, Khaled Ouafi |
| 2012 | Integrity walls: finding attack surfaces from mandatory access control policies. Hayawardh Vijayakumar, Guruprasad Jakka, Sandra Julieta Rueda, Joshua Schiffman, Trent Jaeger |
| 2012 | Keeping identity secret in online social networks. Xinxin Zhao, Lingjun Li, Guoliang Xue |
| 2012 | Key-insulated symmetric key cryptography and mitigating attacks against cryptographic cloud software. Yevgeniy Dodis, Weiliang Luo, Shouhuai Xu, Moti Yung |
| 2012 | KoNKS: konsensus-style network koordinate system. Eric Chan-Tin, Nicholas Hopper |
| 2012 | Letting applications operate through attacks launched from compromised drivers. Shengzhi Zhang, Peng Liu |
| 2012 | Memoirs of a browser: a cross-browser detection model for privacy-breaching extensions. Cristiano Giuffrida, Stefano Ortolani, Bruno Crispo |
| 2012 | Monetizing spambot activity and understanding its relation with spambot traffic features. Syed Fida Gillani, Ehab Al-Shaer, Sardar Ali, Syed Ali Khayam |
| 2012 | New time-memory-data trade-off attack on the estream finalists and modes of operation of block ciphers. Khoongming Khoo, Chik How Tan |
| 2012 | On sampling, anonymization, and differential privacy or, Ninghui Li, Wahbeh H. Qardaji, Dong Su |
| 2012 | On the mixing time of directed social graphs and security implications. Abedelaziz Mohaisen, Huy Tran, Nicholas Hopper, Yongdae Kim |
| 2012 | Outsourced private set intersection using homomorphic encryption. Florian Kerschbaum |
| 2012 | PassMap: a map based graphical-password authentication system. Hung-Min Sun, Yao-Hsin Chen, Chiung-Cheng Fang, Shih-Ying Chang |
| 2012 | Practical client puzzles in the standard model. Lakshmi Kuppusamy, Jothi Rangasamy, Douglas Stebila, Colin Boyd, Juan Manuel González Nieto |
| 2012 | Privacy-preserving alibi systems. Benjamin Davis, Hao Chen, Matthew K. Franklin |
| 2012 | Private and oblivious set and multiset operations. Marina Blanton, Everaldo Aguiar |
| 2012 | Protection, usability and improvements in reflected XSS filters. Riccardo Pelizzi, R. Sekar |
| 2012 | Recursive partitioning and summarization: a practical framework for differentially private data publishing. Wahbeh H. Qardaji, Ninghui Li |
| 2012 | Secure cloud maintenance: protecting workloads against insider attacks. Sören Bleikertz, Anil Kurmus, Zoltán A. Nagy, Matthias Schunter |
| 2012 | Security implications in Kerberos by the introduction of smart cards. Nikos Mavrogiannopoulos, Andreas Pashalidis, Bart Preneel |
| 2012 | Software decoys for insider threat. Young Hee Park, Salvatore J. Stolfo |
| 2012 | The specification and compilation of obligation policies for program monitoring. Cheng Xu, Philip W. L. Fong |
| 2012 | Towards efficient proofs of retrievability. Jia Xu, Ee-Chien Chang |
| 2012 | Towards the attacker's view of protocol narrations (or, how to compile security protocols). Zhiwei Li, Weichao Wang |
| 2012 | User-level secure deletion on log-structured file systems. Joel Reardon, Claudio Marforio, Srdjan Capkun, David A. Basin |
| 2012 | Verifiable private equality test: enabling unbiased 2-party reconciliation on ordered sets in the malicious model. Daniel A. Mayer, Susanne Wetzel |
| 2012 | Verifier-local revocation group signatures with time-bound keys. Cheng-Kang Chu, Joseph K. Liu, Xinyi Huang, Jianying Zhou |
| 2012 | Virtual browser: a virtualized browser to sandbox third-party JavaScripts with enhanced security. Yinzhi Cao, Zhichun Li, Vaibhav Rastogi, Yan Chen, Xitao Wen |