| 2012 | 19th Annual Network and Distributed System Security Symposium, NDSS 2012, San Diego, California, USA, February 5-8, 2012 |
| 2012 | A General Approach for Efficiently Accelerating Software-based Dynamic Data Flow Tracking on Commodity Hardware. Kangkook Jee, Georgios Portokalidis, Vasileios P. Kemerlis, Soumyadeep Ghosh, David I. August, Angelos D. Keromytis |
| 2012 | ANDaNA: Anonymous Named Data Networking Application. Steve DiBenedetto, Paolo Gasti, Gene Tsudik, Ersin Uzun |
| 2012 | Abuse Detection and Prevention Systems at a Large Scale Video Sharing Website. Yu-To Chen, Pierre Grinspan, Blake Livingston, Palash Nandy, Brian Palmer |
| 2012 | Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation. Mohammad Saiful Islam, Mehmet Kuzu, Murat Kantarcioglu |
| 2012 | Accountable Wiretapping -or- I know they can hear you now. Adam Bates, Kevin R. B. Butler, Micah Sherr, Clay Shields, Patrick Traynor, Dan S. Wallach |
| 2012 | Adaptive Password-Strength Meters from Markov Models. Claude Castelluccia, Markus Dürmuth, Daniele Perito |
| 2012 | Automated Synthesis of Secure Distributed Applications. Michael Backes, Matteo Maffei, Kim Pecina |
| 2012 | BLACR: TTP-Free Blacklistable Anonymous Credentials with Reputation. Man Ho Au, Apu Kapadia, Willy Susilo |
| 2012 | Bypassing Space Explosion in Regular Expression Matching for Network Intrusion Detection and Prevention Systems. Jignesh M. Patel, Alex X. Liu, Eric Torng |
| 2012 | Charm: A Framework for Rapidly Prototyping Cryptosystems. Joseph A. Akinyele, Matthew Green, Aviel D. Rubin |
| 2012 | Chrome Extensions: Threat Analysis and Countermeasures. Lei Liu, Xinwen Zhang, Guanhua Yan, Songqing Chen |
| 2012 | Discovering Semantic Data of Interest from Un-mappable Memory with Confidence. Zhiqiang Lin, Junghwan Rhee, Chao Wu, Xiangyu Zhang, Dongyan Xu |
| 2012 | Distance Hijacking Attacks on Distance Bounding Protocols. Cas Cremers, Kasper Bonne Rasmussen, Srdjan Capkun |
| 2012 | FreeMarket: Shopping for free in Android applications. Daniel Reynaud, Dawn Xiaodong Song, Thomas R. Magrino, Edward XueJun Wu, Eui Chul Richard Shin |
| 2012 | Gatling: Automatic Attack Discovery in Large-Scale Distributed Systems. Hyojeong Lee, Jeff Seibert, Charles Killian, Cristina Nita-Rotaru |
| 2012 | Ghost Domain Names: Revoked Yet Still Resolvable. Jian Jiang, Jinjin Liang, Kang Li, Jun Li, Hai-Xin Duan, Jianping Wu |
| 2012 | Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications. Sebastian Schrittwieser, Peter Frühwirt, Peter Kieseberg, Manuel Leithner, Martin Mulazzani, Markus Huber, Edgar R. Weippl |
| 2012 | Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. Yajin Zhou, Zhi Wang, Wu Zhou, Xuxian Jiang |
| 2012 | Host Fingerprinting and Tracking on the Web: Privacy and Security Implications. Ting-Fang Yen, Yinglian Xie, Fang Yu, Roger Peng Yu, Martín Abadi |
| 2012 | Hubble: Transparent and Extensible Malware Analysis by Combining Hardware Virtualization and Software Emulation. Lok-Kwong Yan, Manjukumar Jayachandra, Mu Zhang, Heng Yin |
| 2012 | Identifying and Analyzing Pointer Misuses for Sophisticated Memory-corruption Exploit Diagnosis. Mingwei Zhang, Aravind Prakash, Xiaolei Li, Zhenkai Liang, Heng Yin |
| 2012 | Insights into User Behavior in Dealing with Internet Attacks. Kaan Onarlioglu, Utku Ozan Yilmaz, Engin Kirda, Davide Balzarotti |
| 2012 | Kruiser: Semi-synchronized Non-blocking Concurrent Kernel Heap Buffer Overflow Monitoring. Donghai Tian, Qiang Zeng, Dinghao Wu, Peng Liu, Changzhen Hu |
| 2012 | Large-Scale Privacy-Preserving Mapping of Human Genomic Sequences on Hybrid Clouds. Yangyi Chen, Bo Peng, Xiaofeng Wang, Haixu Tang |
| 2012 | Location leaks over the GSM air interface. Denis Foo Kune, John Kölndorfer, Nicholas Hopper, Yongdae Kim |
| 2012 | Making argument systems for outsourced computation practical (sometimes). Srinath T. V. Setty, Richard McPherson, Andrew J. Blumberg, Michael Walfish |
| 2012 | MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones. Lucas Davi, Alexandra Dmitrienko, Manuel Egele, Thomas Fischer, Thorsten Holz, Ralf Hund, Stefan Nürnberger, Ahmad-Reza Sadeghi |
| 2012 | Newton Meets Vivaldi: Using Physical Laws to Secure Virtual Coordinate Systems. Jeff Seibert, Sheila Becker, Cristina Nita-Rotaru, Radu State |
| 2012 | On Limitations of Designing Leakage-Resilient Password Systems: Attacks, Principals and Usability. Qiang Yan, Jin Han, Yingjiu Li, Robert H. Deng |
| 2012 | PathCutter: Severing the Self-Propagation Path of XSS JavaScript Worms in Social Web Networks. Yinzhi Cao, Vinod Yegneswaran, Phillip A. Porras, Yan Chen |
| 2012 | Persistent OSPF Attacks. Gabi Nakibly, Alex Kirshon, Dima Gonikman, Dan Boneh |
| 2012 | Plaintext-Recovery Attacks Against Datagram TLS. Kenneth G. Paterson, Nadhem J. AlFardan |
| 2012 | Privacy-preserving Logarithmic-time Search on Encrypted Data in Cloud. Yanbin Lu |
| 2012 | Private Set Intersection: Are Garbled Circuits Better than Custom Protocols? Yan Huang, David Evans, Jonathan Katz |
| 2012 | SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust. Karim Eldefrawy, Gene Tsudik, Aurélien Francillon, Daniele Perito |
| 2012 | SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes. Kun Sun, Jiang Wang, Fengwei Zhang, Angelos Stavrou |
| 2012 | Shadow: Running Tor in a Box for Accurate and Efficient Experimentation. Rob Jansen, Nicholas Hopper |
| 2012 | ShortMAC: Efficient Data-Plane Fault Localization. Xin Zhang, Zongwei Zhou, Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim, Adrian Perrig, Patrick Tague |
| 2012 | Static detection of C++ vtable escape vulnerabilities in binary code. David Dewey, Jonathon T. Giffin |
| 2012 | Systematic Detection of Capability Leaks in Stock Android Smartphones. Michael C. Grace, Yajin Zhou, Zhi Wang, Xuxian Jiang |
| 2012 | Taking Routers Off Their Meds: Why Assumptions Of Router Stability Are Dangerous. Max Schuchard, Christopher Thompson, Nicholas Hopper, Yongdae Kim |
| 2012 | The Case for Prefetching and Prevalidating TLS Server Certificates. Emily Stark, Lin-Shung Huang, Dinesh Israni, Collin Jackson, Dan Boneh |
| 2012 | The Latent Community Model for Detecting Sybils in Social Networks. Zhuhua Cai, Chris Jermaine |
| 2012 | Throttling Tor Bandwidth Parasites. Rob Jansen, Nicholas Hopper, Paul F. Syverson |
| 2012 | Towards Online Spam Filtering in Social Networks. Hongyu Gao, Yan Chen, Kathy Lee, Diana Palsetia, Alok N. Choudhary |
| 2012 | Towards Practical Oblivious RAM. Emil Stefanov, Elaine Shi, Dawn Xiaodong Song |
| 2012 | Towards Taming Privilege-Escalation Attacks on Android. Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Thomas Fischer, Ahmad-Reza Sadeghi, Bhargava Shastry |
| 2012 | Track Me If You Can: On the Effectiveness of Context-based Identifier Changes in Deployed Mobile Networks. Laurent Bindschaedler, Murtuza Jadliwala, Igor Bilogrevic, Imad Aad, Philip Ginzboorg, Valtteri Niemi, Jean-Pierre Hubaux |
| 2012 | Using replicated execution for a more secure and reliable web browser. Hui Xue, Nathan Dautenhahn, Samuel T. King |
| 2012 | WarningBird: Detecting Suspicious URLs in Twitter Stream. Sangho Lee, Jong Kim |
| 2012 | Weaponizing Femtocells: The Effect of Rogue Devices on Mobile Telecommunications. Nico Golde, Kevin Redon, Ravishankar Borgaonkar |
| 2012 | X-Vine: Secure and Pseudonymous Routing in DHTs Using Social Networks. Prateek Mittal, Matthew Caesar, Nikita Borisov |
| 2012 | You Can Run, but You Can't Hide: Exposing Network Location for Targeted DoS Attacks in Cellular Networks. Zhiyun Qian, Zhaoguang Wang, Qiang Xu, Zhuoqing Morley Mao, Ming Zhang, Yi-Min Wang |
| 2012 | You are what you like! Information leakage through users' Interests. Chaabane Abdelberi, Gergely Ács, Mohamed Ali Kâafar |