| 2012 | A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence. B. Amann, Robin Sommer, Aashish Sharma, Seth Hall |
| 2012 | A Memory Access Validation Scheme against Payload Injection Attacks. Dongkyun Ahn, Gyungho Lee |
| 2012 | AK-PPM: An Authenticated Packet Attribution Scheme for Mobile Ad Hoc Networks. Zhi Xu, Hung-Yuan Hsu, Xin Chen, Sencun Zhu, Ali R. Hurson |
| 2012 | ALERT-ID: Analyze Logs of the Network Element in Real Time for Intrusion Detection. Jie Chu, Zihui Ge, Richard Huber, Ping Ji, Jennifer Yates, Yung-Chao Yu |
| 2012 | Accurate Recovery of Functions in a Retargetable Decompiler(Poster Abstract). Lukás Durfina, Jakub Kroustek, Petr Zemek, Bretislav Kábele |
| 2012 | Assessing the Trustworthiness of Drivers. Shengzhi Zhang, Peng Liu |
| 2012 | Automatic Covert Channel Detection in Asbestos System (Poster Abstract). Shuyuan Jin, Zhi Yang, Xiang Cui |
| 2012 | Concurrency Optimization for NIDS (Poster Abstract). Jorge Maestre Vidal, Hugo Villanúa Vega, Jaime Daniel Mejía Castro, Luis Javier García-Villalba |
| 2012 | DEMACRO: Defense against Malicious Cross-Domain Requests. Sebastian Lekies, Nick Nikiforakis, Walter Tighzert, Frank Piessens, Martin Johns |
| 2012 | Dione: A Flexible Disk Monitoring and Analysis Framework. Jennifer Mankin, David R. Kaeli |
| 2012 | Distress Detection (Poster Abstract). Mark Vella, Sotirios Terzis, Marc Roper |
| 2012 | EFA for Efficient Regular Expression Matching in NIDS (Poster Abstract). Dengke Qiao, Tingwen Liu, Yong Sun, Li Guo |
| 2012 | Evaluating Electricity Theft Detectors in Smart Grid Networks. Daisuke Mashima, Alvaro A. Cárdenas |
| 2012 | FlashDetect: ActionScript 3 Malware Detection. Timon Van Overveldt, Christopher Kruegel, Giovanni Vigna |
| 2012 | GPP-Grep: High-Speed Regular Expression Processing Engine on General Purpose Processors. Victor C. Valgenti, Jatin Chhugani, Yan Sun, Nadathur Satish, Min Sik Kim, Changkyu Kim, Pradeep Dubey |
| 2012 | Improvement of an Anagram Based NIDS by Reducing the Storage Space of Bloom Filters (Poster Abstract). Hugo Villanúa Vega, Jorge Maestre Vidal, Jaime Daniel Mejía Castro, Luis Javier García-Villalba |
| 2012 | Industrial Espionage and Targeted Attacks: Understanding the Characteristics of an Escalating Threat. Olivier Thonnard, Leyla Bilge, Gavin O'Gorman, Seán Kiernan, Martin Lee |
| 2012 | Malware Detection System by Payload Analysis of Network Traffic (Poster Abstract). Luis Javier García-Villalba, Jaime Daniel Mejía Castro, Ana Lucila Sandoval Orozco, Javier Martínez Puentes |
| 2012 | Memory Errors: The Past, the Present, and the Future. Victor van der Veen, Nitish dutt-Sharma, Lorenzo Cavallaro, Herbert Bos |
| 2012 | N-Gram against the Machine: On the Feasibility of the N-Gram Network Analysis for Binary Protocols. Dina Hadziosmanovic, Lorenzo Simionato, Damiano Bolzoni, Emmanuele Zambon, Sandro Etalle |
| 2012 | Network Security Analysis Method Taking into Account the Usage Information (Poster Abstract). Jinyu Wu, Lihua Yin, Binxing Fang |
| 2012 | Online Social Networks, a Criminals Multipurpose Toolbox (Poster Abstract). Shah Mahmood, Yvo Desmedt |
| 2012 | Paying for Piracy? An Analysis of One-Click Hosters' Controversial Reward Schemes. Tobias Lauinger, Engin Kirda, Pietro Michiardi |
| 2012 | PoisonAmplifier: A Guided Approach of Discovering Compromised Websites through Reversing Search Poisoning Attacks. Jialong Zhang, Chao Yang, Zhaoyan Xu, Guofei Gu |
| 2012 | Proactive Discovery of Phishing Related Domain Names. Samuel Marchal, Jérôme François, Radu State, Thomas Engel |
| 2012 | Research in Attacks, Intrusions, and Defenses - 15th International Symposium, RAID 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings Davide Balzarotti, Salvatore J. Stolfo, Marco Cova |
| 2012 | Secure and Robust Monitoring of Virtual Machines through Guest-Assisted Introspection. Martim Carbone, Matthew Conover, Bruce Montague, Wenke Lee |
| 2012 | The Triple-Channel Model: Toward Robust and Efficient Advanced Botnets (Poster Abstract). Xiang Cui, Jinqiao Shi, Peng Liao, Chaoge Liu |
| 2012 | Towards Automated Forensic Event Reconstruction of Malicious Code (Poster Abstract). Ahmed F. Shosha, Joshua James, Chen-Ching Liu, Pavel Gladyshev |
| 2012 | Trie Data Structure to Compare Traffic Payload in a Supervised Anomaly Detection System (Poster Abstract). Jenny Andrea Pinto Sánchez, Luis Javier García-Villalba |
| 2012 | Trusted VM Snapshots in Untrusted Cloud Infrastructures. Abhinav Srivastava, Himanshu Raj, Jonathon T. Giffin, Paul England |