| 2012 | 25th IEEE Computer Security Foundations Symposium, CSF 2012, Cambridge, MA, USA, June 25-27, 2012 Stephen Chong |
| 2012 | A Framework for the Cryptographic Verification of Java-Like Programs. Ralf Küsters, Tomasz Truderung, Juergen Graf |
| 2012 | Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties. Benedikt Schmidt, Simon Meier, Cas Cremers, David A. Basin |
| 2012 | Automatically Verified Mechanized Proof of One-Encryption Key Exchange. Bruno Blanchet |
| 2012 | Cache-Leakage Resilient OS Isolation in an Idealized Model of Virtualization. Gilles Barthe, Gustavo Betarte, Juan Diego Campo, Carlos Luna |
| 2012 | Constructing Optimistic Multi-party Contract Signing Protocols. Barbara Kordy, Sasa Radomirovic |
| 2012 | Discovering Concrete Attacks on Website Authorization by Formal Analysis. Chetan Bansal, Karthikeyan Bhargavan, Sergio Maffeis |
| 2012 | ENCoVer: Symbolic Exploration for Information Flow Security. Musard Balliu, Mads Dam, Gurvan Le Guernic |
| 2012 | Generic Indifferentiability Proofs of Hash Designs. Marion Daubignard, Pierre-Alain Fouque, Yassine Lakhnech |
| 2012 | Gran: Model Checking Grsecurity RBAC Policies. Michele Bugliesi, Stefano Calzavara, Riccardo Focardi, Marco Squarcina |
| 2012 | Information-Flow Control for Programming on Encrypted Data. John C. Mitchell, Rahul Sharma, Deian Stefan, Joe Zimmerman |
| 2012 | Information-Flow Security for a Core of JavaScript. Daniel Hedin, Andrei Sabelfeld |
| 2012 | Labeled Sequent Calculi for Access Control Logics: Countermodels, Saturation and Abduction. Valerio Genovese, Deepak Garg, Daniele Rispoli |
| 2012 | Learning is Change in Knowledge: Knowledge-Based Security for Dynamic Policies. Aslan Askarov, Stephen Chong |
| 2012 | Mashic Compiler: Mashup Sandboxing Based on Inter-frame Communication. Zhengqin Luo, Tamara Rezk |
| 2012 | Measuring Information Leakage Using Generalized Gain Functions. Mário S. Alvim, Konstantinos Chatzikokolakis, Catuscia Palamidessi, Geoffrey Smith |
| 2012 | Provably Secure and Practical Onion Routing. Michael Backes, Ian Goldberg, Aniket Kate, Esfandiar Mohammadi |
| 2012 | Refining Key Establishment. Christoph Sprenger, David A. Basin |
| 2012 | Secure Compilation to Modern Processors. Pieter Agten, Raoul Strackx, Bart Jacobs, Frank Piessens |
| 2012 | Secure Information Flow for Concurrent Programs under Total Store Order. Jeffrey A. Vaughan, Todd D. Millstein |
| 2012 | Securing Interactive Programs. Willard Rafnsson, Daniel Hedin, Andrei Sabelfeld |
| 2012 | Security Analysis of Role-Based Access Control through Program Verification. Anna Lisa Ferrara, P. Madhusudan, Gennaro Parlato |
| 2012 | Symbolic Analysis of Cryptographic Protocols Containing Bilinear Pairings. Alisa Pankova, Peeter Laud |
| 2012 | The Thermodynamics of Confidentiality. Pasquale Malacaria, Fabrizio Smeraldi |
| 2012 | Verified Security of Merkle-Damgård. Michael Backes, Gilles Barthe, Matthias Berg, Benjamin Grégoire, César Kunz, Malte Skoruppa, Santiago Zanella-Béguelin |
| 2012 | Verifying Privacy-Type Properties in a Modular Way. Myrto Arapinis, Vincent Cheval, Stéphanie Delaune |