 | Data Node Encrypted File System: Efficient Secure Deletion for Flash Memory | USENIX Security '12 | Joel Reardon, Srdjan Capkun, David Basin |
 | STEALTHMEM: System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud | USENIX Security '12 | Taesoo Kim, Marcus Peinado, Gloria Mainar-Ruiz |
 | Efficient and Scalable Socware Detection in Online Social Networks | USENIX Security '12 | Md Sazzadur Rahman, Ting-Kai Huang, Harsha V. Madhyastha, Michalis Faloutsos |
 | Optimally Robust Private Information Retrieval | USENIX Security '12 | Casey Devet, Ian Goldberg, Nadia Heninger |
 | On Breaking SAML: Be Whoever You Want to Be | USENIX Security '12 | Juraj Somorovsky, Andreas Mayer, Jörg Schwenk, Marco Kampmann, Meiko Jensen |
 | Gone in 360 Seconds: Hijacking with Hitag2 | USENIX Security '12 | Roel Verdult, Flavio D. Garcia, Josep Balasch |
 | Whispers in the Hyper-space: High-speed Covert Channel Attacks in the Cloud | USENIX Security '12 | Zhenyu Wu, Zhang Xu, Haining Wang |
 | AdSplit: Separating Smartphone Advertising from Applications | USENIX Security '12 | Shashi Shekhar, Michael Dietz, Dan S. Wallach |
 | DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis | USENIX Security '12 | Lok Kwong Yan, Heng Yin |
 | Chimera: A Declarative Language for Streaming Network Traffic Analysis | USENIX Security '12 | Kevin Borders, Jonathan Springer, Matthew Burnside |
 | Security and Usability Challenges of Moving-Object CAPTCHAs: Decoding Codewords in Motion | USENIX Security '12 | Y Xu, G Reynaga, Sonia Chiasson, J.-M. Frahm, Fabian Monrose, Paul van Oorschot |
 | Impact of Spam Exposure on User Engagement | USENIX Security '12 | Anirban Dasgupta, Kunal Punera, Justin M. Rao, Xuanhui Wang |
 | kGuard: Lightweight Kernel Protection against Return-to-User Attacks | USENIX Security '12 | Vasileios P. Kemerlis, Georgios Portokalidis, Angelos D. Keromytis |
 | Privacy-Preserving Social Plugins | USENIX Security '12 | Georgios Kontaxis, Michalis Polychronakis, Angelos D. Keromytis, Evangelos P. Markatos |
 | Progressive Authentication: Deciding When to Authenticate on Mobile Phones | USENIX Security '12 | Oriana Riva, Chuan Qin, Karin Strauss, Dimitrios Lymberopoulos |
 | Origin-Bound Certificates: A Fresh Approach to Strong Client Authentication for the Web | USENIX Security '12 | Michael Dietz, Alexei Czeskis, Dirk Balfanz, Dan S. Wallach |
 | Privilege Separation in HTML5 Applications | USENIX Security '12 | Devdatta Akhawe, Prateek Saxena, Dawn Song |
 | Throttling Tor Bandwidth Parasites | USENIX Security '12 | Rob Jansen, Paul Syverson, Nicholas Hopper |
 | An Evaluation of the Google Chrome Extension Security Architecture | USENIX Security '12 | Nicholas Carlini, Adrienne Porter Felt, David Wagner |
 | Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization | USENIX Security '12 | Cristiano Giuffrida, Anton Kuijsten, Andrew S. Tanenbaum |
 | STING: Finding Name Resolution Vulnerabilities in Programs | USENIX Security '12 | Hayawardh Vijayakumar, Joshua Schiffman, Trent Jaeger |
 | Tracking Rootkit Footprints with a Practical Memory Analysis System | USENIX Security '12 | Weidong Cui, Marcus Peinado, Zhilei Xu, Ellick Chan |
 | Billion-Gate Secure Computation with Malicious Adversaries | USENIX Security '12 | Benjamin Kreuter, Abhi Shelat, Chih-hao Shen |
 | PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs | USENIX Security '12 | Damon McCoy, Andreas Pitsillidis, Jordan Grant, Nicholas Weaver, Christian Kreibich, Brian Krebs, Geoffrey Voelker, Stefan Savage, Kirill Levchenko |
 | How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation | USENIX Security '12 | Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle L. Mazurek, Timothy Passaro, Richard Shay, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor |