| 2012 | A Framework to Eliminate Backdoors from Response-Computable Authentication. Shuaifu Dai, Tao Wei, Chao Zhang, Tielei Wang, Yu Ding, Zhenkai Liang, Wei Zou |
| 2012 | Abusing File Processing in Malware Detectors for Fun and Profit. Suman Jana, Vitaly Shmatikov |
| 2012 | Building Verifiable Trusted Path on Commodity x86 Computers. Zongwei Zhou, Virgil D. Gligor, James Newsome, Jonathan M. McCune |
| 2012 | Clash Attacks on the Verifiability of E-Voting Systems. Ralf Küsters, Tomasz Truderung, Andreas Vogt |
| 2012 | Detecting Hoaxes, Frauds, and Deception in Writing Style Online. Sadia Afroz, Michael Brennan, Rachel Greenstadt |
| 2012 | Dissecting Android Malware: Characterization and Evolution. Yajin Zhou, Xuxian Jiang |
| 2012 | Distance Hijacking Attacks on Distance Bounding Protocols. Cas Cremers, Kasper Bonne Rasmussen, Benedikt Schmidt, Srdjan Capkun |
| 2012 | Don't Trust Satellite Phones: A Security Analysis of Two Satphone Standards. Benedikt Driessen, Ralf Hund, Carsten Willems, Christof Paar, Thorsten Holz |
| 2012 | EvilSeed: A Guided Approach to Finding Malicious Web Pages. Luca Invernizzi, Paolo Milani Comparetti, Stefano Benvenuti, Christopher Kruegel, Marco Cova, Giovanni Vigna |
| 2012 | Flash Memory for Ubiquitous Hardware Security Functions: True Random Number Generation and Device Fingerprints. YingLei Wang, Wing-Kei S. Yu, Shuo Wu, Greg Malysa, G. Edward Suh, Edwin Kan |
| 2012 | Formalizing and Enforcing Purpose Restrictions in Privacy Policies. Michael Carl Tschantz, Anupam Datta, Jeannette M. Wing |
| 2012 | Foundations of Logic-Based Trust Management. Moritz Y. Becker, Alessandra Russo, Nik Sultana |
| 2012 | Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms. Patrick Gage Kelley, Saranga Komanduri, Michelle L. Mazurek, Richard Shay, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Julio C. López |
| 2012 | Hummingbird: Privacy at the Time of Twitter. Emiliano De Cristofaro, Claudio Soriente, Gene Tsudik, Andrew Williams |
| 2012 | IEEE Symposium on Security and Privacy, SP 2012, 21-23 May 2012, San Francisco, California, USA |
| 2012 | ILR: Where'd My Gadgets Go? Jason Hiser, Anh Nguyen-Tuong, Michele Co, Matthew Hall, Jack W. Davidson |
| 2012 | LAP: Lightweight Anonymity and Privacy. Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim, Adrian Perrig, Akira Yamada, Samuel C. Nelson, Marco Gruteser, Wei Meng |
| 2012 | LASTor: A Low-Latency AS-Aware Tor Client. Masoud Akhoondi, Curtis Yu, Harsha V. Madhyastha |
| 2012 | Memento: Learning Secrets from Process Footprints. Suman Jana, Vitaly Shmatikov |
| 2012 | New Results for Timing-Based Attestation. Xeno Kovah, Corey Kallenberg, Chris Weathers, Amy Herzog, Matthew Albin, John Butterworth |
| 2012 | OB-PWS: Obfuscation-Based Private Web Search. Ero Balsa, Carmela Troncoso, Claudia Díaz |
| 2012 | ObliviAd: Provably Secure and Practical Online Behavioral Advertising. Michael Backes, Aniket Kate, Matteo Maffei, Kim Pecina |
| 2012 | Off-path TCP Sequence Number Inference Attack - How Firewall Middleboxes Reduce Security. Zhiyun Qian, Zhuoqing Morley Mao |
| 2012 | On the Feasibility of Internet-Scale Author Identification. Arvind Narayanan, Hristo S. Paskov, Neil Zhenqiang Gong, John Bethencourt, Emil Stefanov, Eui Chul Richard Shin, Dawn Song |
| 2012 | Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail. Kevin P. Dyer, Scott E. Coull, Thomas Ristenpart, Thomas Shrimpton |
| 2012 | Prudent Practices for Designing Malware Experiments: Status Quo and Outlook. Christian Rossow, Christian J. Dietrich, Chris Grier, Christian Kreibich, Vern Paxson, Norbert Pohlmann, Herbert Bos, Maarten van Steen |
| 2012 | Quid-Pro-Quo-tocols: Strengthening Semi-honest Protocols with Dual Execution. Yan Huang, Jonathan Katz, David Evans |
| 2012 | ReDeBug: Finding Unpatched Code Clones in Entire OS Distributions. Jiyong Jang, Abeer Agrawal, David Brumley |
| 2012 | Rozzle: De-cloaking Internet Malware. Clemens Kolbitsch, Benjamin Livshits, Benjamin G. Zorn, Christian Seifert |
| 2012 | Safe Loading - A Foundation for Secure Execution of Untrusted Programs. Mathias Payer, Tobias Hartmann, Thomas R. Gross |
| 2012 | Secure and Scalable Fault Localization under Dynamic Traffic Patterns. Xin Zhang, Chang Lan, Adrian Perrig |
| 2012 | Sharing Mobile Code Securely with Information Flow Control. Owen Arden, Michael D. George, Jed Liu, K. Vikram, Aslan Askarov, Andrew C. Myers |
| 2012 | Signing Me onto Your Accounts through Facebook and Google: A Traffic-Guided Security Study of Commercially Deployed Single-Sign-On Web Services. Rui Wang, Shuo Chen, Xiaofeng Wang |
| 2012 | Smashing the Gadgets: Hindering Return-Oriented Programming Using In-place Code Randomization. Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis |
| 2012 | Space Traveling across VM: Automatically Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection. Yangchun Fu, Zhiqiang Lin |
| 2012 | The Psychology of Security for the Home Computer User. Adele E. Howe, Indrajit Ray, Mark Roberts, Malgorzata Urbanska, Zinta S. Byrne |
| 2012 | The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes. Joseph Bonneau, Cormac Herley, Paul C. van Oorschot, Frank Stajano |
| 2012 | The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords. Joseph Bonneau |
| 2012 | Third-Party Web Tracking: Policy and Technology. Jonathan R. Mayer, John C. Mitchell |
| 2012 | Unleashing Mayhem on Binary Code. Sang Kil Cha, Thanassis Avgerinos, Alexandre Rebert, David Brumley |
| 2012 | User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems. Franziska Roesner, Tadayoshi Kohno, Alexander Moshchuk, Bryan Parno, Helen J. Wang, Crispin Cowan |