| 2012 | AdSplit: Separating Smartphone Advertising from Applications. Shashi Shekhar, Michael Dietz, Dan S. Wallach |
| 2012 | An Evaluation of the Google Chrome Extension Security Architecture. Nicholas Carlini, Adrienne Porter Felt, David A. Wagner |
| 2012 | Aurasium: Practical Policy Enforcement for Android Applications. Rubin Xu, Hassen Saïdi, Ross J. Anderson |
| 2012 | B@bel: Leveraging Email Delivery for Spam Mitigation. Gianluca Stringhini, Manuel Egele, Apostolis Zarras, Thorsten Holz, Christopher Kruegel, Giovanni Vigna |
| 2012 | Billion-Gate Secure Computation with Malicious Adversaries. Benjamin Kreuter, Abhi Shelat, Chih-Hao Shen |
| 2012 | Chimera: A Declarative Language for Streaming Network Traffic Analysis. Kevin Borders, Jonathan Springer, Matthew Burnside |
| 2012 | Clickjacking: Attacks and Defenses. Lin-Shung Huang, Alexander Moshchuk, Helen J. Wang, Stuart Schecter, Collin Jackson |
| 2012 | Data Node Encrypted File System: Efficient Secure Deletion for Flash Memory. Joel Reardon, Srdjan Capkun, David A. Basin |
| 2012 | DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis. Lok-Kwong Yan, Heng Yin |
| 2012 | Efficient and Scalable Socware Detection in Online Social Networks. Md. Sazzadur Rahman, Ting-Kai Huang, Harsha V. Madhyastha, Michalis Faloutsos |
| 2012 | Enemy of the State: A State-Aware Black-Box Web Vulnerability Scanner. Adam Doupé, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna |
| 2012 | Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization. Cristiano Giuffrida, Anton Kuijsten, Andrew S. Tanenbaum |
| 2012 | Establishing Browser Security Guarantees through Formal Shim Verification. Dongseok Jang, Zachary Tatlock, Sorin Lerner |
| 2012 | From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware. Manos Antonakakis, Roberto Perdisci, Yacin Nadji, Nikolaos Vasiloglou, Saeed Abu-Nimeh, Wenke Lee, David Dagon |
| 2012 | Fuzzing with Code Fragments. Christian Holler, Kim Herzig, Andreas Zeller |
| 2012 | Gone in 360 Seconds: Hijacking with Hitag2. Roel Verdult, Flavio D. Garcia, Josep Balasch |
| 2012 | How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation. Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle L. Mazurek, Timothy Passaro, Richard Shay, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor |
| 2012 | I Forgot Your Password: Randomness Attacks Against PHP Applications. George Argyros, Aggelos Kiayias |
| 2012 | Impact of Spam Exposure on User Engagement. Anirban Dasgupta, Kunal Punera, Justin M. Rao, Xuanhui Wang |
| 2012 | Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices. Nadia Heninger, Zakir Durumeric, Eric Wustrow, J. Alex Halderman |
| 2012 | Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks. Hristo Bojinov, Daniel Sánchez, Paul J. Reber, Dan Boneh, Patrick Lincoln |
| 2012 | New Attacks on Timing-based Network Flow Watermarks. Zi Lin, Nicholas Hopper |
| 2012 | On Breaking SAML: Be Whoever You Want to Be. Juraj Somorovsky, Andreas Mayer, Jörg Schwenk, Marco Kampmann, Meiko Jensen |
| 2012 | On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces. Ivan Martinovic, Doug Davies, Mario Frank, Daniele Perito, Tomas Ros, Dawn Song |
| 2012 | Optimally Robust Private Information Retrieval. Casey Devet, Ian Goldberg, Nadia Heninger |
| 2012 | Origin-Bound Certificates: A Fresh Approach to Strong Client Authentication for the Web. Michael Dietz, Alexei Czeskis, Dirk Balfanz, Dan S. Wallach |
| 2012 | PUBCRAWL: Protecting Users and Businesses from CRAWLers. Grégoire Jacob, Engin Kirda, Christopher Kruegel, Giovanni Vigna |
| 2012 | PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs. Damon McCoy, Andreas Pitsillidis, Grant Jordan, Nicholas Weaver, Christian Kreibich, Brian Krebs, Geoffrey M. Voelker, Stefan Savage, Kirill Levchenko |
| 2012 | Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services. Nuno Santos, Rodrigo Rodrigues, Krishna P. Gummadi, Stefan Saroiu |
| 2012 | Privacy-Preserving Social Plugins. Georgios Portokalidis, Michalis Polychronakis, Angelos D. Keromytis, Evangelos P. Markatos |
| 2012 | Privilege Separation in HTML5 Applications. Devdatta Akhawe, Prateek Saxena, Dawn Song |
| 2012 | Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012 Tadayoshi Kohno |
| 2012 | Progressive Authentication: Deciding When to Authenticate on Mobile Phones. Oriana Riva, Chuan Qin, Karin Strauss, Dimitrios Lymberopoulos |
| 2012 | STEALTHMEM: System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud. Taesoo Kim, Marcus Peinado, Gloria Mainar-Ruiz |
| 2012 | STING: Finding Name Resolution Vulnerabilities in Programs. Hayawardh Vijayakumar, Joshua Schiffman, Trent Jaeger |
| 2012 | Security and Usability Challenges of Moving-Object CAPTCHAs: Decoding Codewords in Motion. Yi Xu, Gerardo Reynaga, Sonia Chiasson, Jan-Michael Frahm, Fabian Monrose, Paul C. van Oorschot |
| 2012 | Social Networking with Frientegrity: Privacy and Integrity with an Untrusted Provider. Ariel J. Feldman, Aaron Blankstein, Michael J. Freedman, Edward W. Felten |
| 2012 | TARDIS: Time and Remanence Decay in SRAM to Implement Secure Protocols on Embedded Devices without Clocks. Amir Rahmati, Mastooreh Salajegheh, Daniel E. Holcomb, Jacob Sorber, Wayne P. Burleson, Kevin Fu |
| 2012 | Tachyon: Tandem Execution for Efficient Live Patch Testing. Matthew Maurer, David Brumley |
| 2012 | Taking Proof-Based Verified Computation a Few Steps Closer to Practicality. Srinath T. V. Setty, Victor Vu, Nikhil Panpalia, Benjamin Braun, Andrew J. Blumberg, Michael Walfish |
| 2012 | Throttling Tor Bandwidth Parasites. Rob Jansen, Paul F. Syverson, Nicholas Hopper |
| 2012 | Tracking Rootkit Footprints with a Practical Memory Analysis System. Weidong Cui, Marcus Peinado, Zhilei Xu, Ellick Chan |
| 2012 | Whispers in the Hyper-space: High-speed Covert Channel Attacks in the Cloud. Zhenyu Wu, Zhang Xu, Haining Wang |
| 2012 | kGuard: Lightweight Kernel Protection against Return-to-User Attacks. Vasileios P. Kemerlis, Georgios Portokalidis, Angelos D. Keromytis |