| 2012 | A Practical Man-In-The-Middle Attack on Signal-Based Key Generation Protocols. Simon Eberz, Martin Strohmeier, Matthias Wilhelm, Ivan Martinovic |
| 2012 | A Probabilistic Framework for Localization of Attackers in MANETs. Massimiliano Albanese, Alessandra De Benedictis, Sushil Jajodia, Paulo Shakarian |
| 2012 | Abstraction-Based Malware Analysis Using Rewriting and Model Checking. Philippe Beaucamps, Isabelle Gnaedig, Jean-Yves Marion |
| 2012 | Applying Divertibility to Blind Ballot Copying in the Helios Internet Voting System. Yvo Desmedt, Pyrros Chaidos |
| 2012 | Attack of the Clones: Detecting Cloned Applications on Android Markets. Jonathan Crussell, Clint Gibler, Hao Chen |
| 2012 | Beyond eCK: Perfect Forward Secrecy under Actor Compromise and Ephemeral-Key Reveal. Cas Cremers, Michèle Feltz |
| 2012 | Bleichenbacher's Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption. Tibor Jager, Sebastian Schinzel, Juraj Somorovsky |
| 2012 | Boosting the Permissiveness of Dynamic Information-Flow Tracking by Testing. Arnar Birgisson, Daniel Hedin, Andrei Sabelfeld |
| 2012 | Codejail: Application-Transparent Isolation of Libraries with Tight Program Interactions. Yongzheng Wu, Sai Sathyanarayan, Roland H. C. Yap, Zhenkai Liang |
| 2012 | Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings Sara Foresti, Moti Yung, Fabio Martinelli |
| 2012 | Deciding Epistemic and Strategic Properties of Cryptographic Protocols. Henning Schnoor |
| 2012 | Deciding Security for a Fragment of ASLan. Sebastian Mödersheim |
| 2012 | Decision Procedures for Simulatability. Charanjit S. Jutla, Arnab Roy |
| 2012 | Defining Privacy for Weighted Votes, Single and Multi-voter Coercion. Jannik Dreier, Pascal Lafourcade, Yassine Lakhnech |
| 2012 | Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System. Aanjhan Ranganathan, Nils Ole Tippenhauer, Boris Skoric, Dave Singelée, Srdjan Capkun |
| 2012 | Detecting Phishing Emails the Natural Language Way. Rakesh M. Verma, Narasimha K. Shashidhar, Nabil Hossain |
| 2012 | Dismantling iClass and iClass Elite. Flavio D. Garcia, Gerhard de Koning Gans, Roel Verdult, Milosch Meriac |
| 2012 | Effective Symbolic Protocol Analysis via Equational Irreducibility Conditions. Serdar Erbatur, Santiago Escobar, Deepak Kapur, Zhiqiang Liu, Christopher Lynch, Catherine Meadows, José Meseguer, Paliath Narendran, Sonia Santiago, Ralf Sasse |
| 2012 | Enhancing Location Privacy for Electric Vehicles (at the Right time). Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou |
| 2012 | Evaluation of Standardized Password-Based Key Derivation against Parallel Processing Platforms. Markus Dürmuth, Tim Güneysu, Markus Kasper, Christof Paar, Tolga Yalçin, Ralf Zimmermann |
| 2012 | Exploring Linkability of User Reviews. Mishari Al Mishari, Gene Tsudik |
| 2012 | Formal Analysis of Privacy in an eHealth Protocol. Naipeng Dong, Hugo Jonker, Jun Pang |
| 2012 | Hardening Access Control and Data Protection in GFS-like File Systems. James Kelley, Roberto Tamassia, Nikos Triandopoulos |
| 2012 | Identity-Based Encryption with Master Key-Dependent Message Security and Leakage-Resilience. David Galindo, Javier Herranz, Jorge L. Villar |
| 2012 | Identity-Based Traitor Tracing with Short Private Key and Short Ciphertext. Fuchun Guo, Yi Mu, Willy Susilo |
| 2012 | Introducing the gMix Open Source Framework for Mix Implementations. Karl-Peter Fuchs, Dominik Herrmann, Hannes Federrath |
| 2012 | JVM-Portable Sandboxing of Java's Native Libraries. Mengtao Sun, Gang Tan |
| 2012 | Model-Checking Bisimulation-Based Information Flow Properties for Infinite State Systems. Deepak D'Souza, K. R. Raghavendra |
| 2012 | Modeling and Enhancing Android's Permission System. Elli Fragkaki, Lujo Bauer, Limin Jia, David Swasey |
| 2012 | New Algorithms for Secure Outsourcing of Modular Exponentiations. Xiaofeng Chen, Jin Li, Jianfeng Ma, Qiang Tang, Wenjing Lou |
| 2012 | On the Security of Password Manager Database Formats. Paolo Gasti, Kasper Bonne Rasmussen |
| 2012 | PE(AR)2: Privacy-Enhanced Anonymous Authentication with Reputation and Revocation. Kin Ying Yu, Tsz Hon Yuen, Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui |
| 2012 | PRIVATUS: Wallet-Friendly Privacy Protection for Smart Meters. Jinkyu Koo, Xiaojun Lin, Saurabh Bagchi |
| 2012 | Privacy-Aware Message Exchanges for Geographically Routed Human Movement Networks. Adam J. Aviv, Micah Sherr, Matt Blaze, Jonathan M. Smith |
| 2012 | Relations among Notions of Privacy for RFID Authentication Protocols. Daisuke Moriyama, Shin'ichiro Matsuo, Miyako Ohkubo |
| 2012 | Revealing Abuses of Channel Assignment Protocols in Multi-channel Wireless Networks: An Investigation Logic Approach. Qijun Gu, Kyle Jones, Wanyu Zang, Meng Yu, Peng Liu |
| 2012 | Robust Probabilistic Fake Packet Injection for Receiver-Location Privacy in WSN. Ruben Rios, Jorge Cuéllar, Javier López |
| 2012 | SHARP: Private Proximity Test and Secure Handshake with Cheat-Proof Location Tags. Yao Zheng, Ming Li, Wenjing Lou, Y. Thomas Hou |
| 2012 | Satisfiability and Feasibility in a Relationship-Based Workflow Authorization Model. Arif Akram Khan, Philip W. L. Fong |
| 2012 | Scalable Telemetry Classification for Automated Malware Detection. Jack W. Stokes, John C. Platt, Helen J. Wang, Joe Faulhaber, Jonathan Keller, Mady Marinescu, Anil Thomas, Marius Gheorghescu |
| 2012 | Secure Proximity Detection for NFC Devices Based on Ambient Sensor Data. Tzipora Halevi, Di Ma, Nitesh Saxena, Tuo Xiang |
| 2012 | Secure and Efficient Outsourcing of Sequence Comparisons. Marina Blanton, Mikhail J. Atallah, Keith B. Frikken, Qutaibah M. Malluhi |
| 2012 | Security of Patched DNS. Amir Herzberg, Haya Schulmann |
| 2012 | SocialImpact: Systematic Analysis of Underground Social Dynamics. Ziming Zhao, Gail-Joon Ahn, Hongxin Hu, Deepinder Mahi |
| 2012 | The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs. Ahmad-Reza Sadeghi, Steffen Schulz, Vijay Varadharajan |
| 2012 | Third-Party Private DFA Evaluation on Encrypted Files in the Cloud. Lei Wei, Michael K. Reiter |
| 2012 | TorScan: Tracing Long-Lived Connections and Differential Scanning Attacks. Alex Biryukov, Ivan Pustogarov, Ralf-Philipp Weinmann |
| 2012 | Towards Symbolic Encryption Schemes. Naveed Ahmed, Christian Damsgaard Jensen, Erik Zenner |
| 2012 | Trust No One Else: Detecting MITM Attacks against SSL/TLS without Third-Parties. Italo Dacosta, Mustaque Ahamad, Patrick Traynor |
| 2012 | Unique Group Signatures. Matthew K. Franklin, Haibin Zhang |
| 2012 | X.509 Forensics: Detecting and Localising the SSL/TLS Men-in-the-Middle. Ralph Holz, Thomas Riedmaier, Nils Kammenhuber, Georg Carle |