| Progressive Authentication: Deciding When to Authenticate on Mobile Phones | USENIX Security '12 | Oriana Riva, Chuan Qin, Karin Strauss, Dimitrios Lymberopoulos |
| Origin-Bound Certificates: A Fresh Approach to Strong Client Authentication for the Web | USENIX Security '12 | Michael Dietz, Alexei Czeskis, Dirk Balfanz, Dan S. Wallach |
| Privilege Separation in HTML5 Applications | USENIX Security '12 | Devdatta Akhawe, Prateek Saxena, Dawn Song |
| Throttling Tor Bandwidth Parasites | USENIX Security '12 | Rob Jansen, Paul Syverson, Nicholas Hopper |
| An Evaluation of the Google Chrome Extension Security Architecture | USENIX Security '12 | Nicholas Carlini, Adrienne Porter Felt, David Wagner |
| Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization | USENIX Security '12 | Cristiano Giuffrida, Anton Kuijsten, Andrew S. Tanenbaum |
| STING: Finding Name Resolution Vulnerabilities in Programs | USENIX Security '12 | Hayawardh Vijayakumar, Joshua Schiffman, Trent Jaeger |
| Tracking Rootkit Footprints with a Practical Memory Analysis System | USENIX Security '12 | Weidong Cui, Marcus Peinado, Zhilei Xu, Ellick Chan |
| Billion-Gate Secure Computation with Malicious Adversaries | USENIX Security '12 | Benjamin Kreuter, Abhi Shelat, Chih-hao Shen |
| PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs | USENIX Security '12 | Damon McCoy, Andreas Pitsillidis, Jordan Grant, Nicholas Weaver, Christian Kreibich, Brian Krebs, Geoffrey Voelker, Stefan Savage, Kirill Levchenko |
| How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation | USENIX Security '12 | Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle L. Mazurek, Timothy Passaro, Richard Shay, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor |
| Establishing Browser Security Guarantees through Formal Shim Verification | USENIX Security '12 | Dongseok Jang, Zachary Tatlock, Sorin Lerner |
| I Forgot Your Password: Randomness Attacks Against PHP Applications | USENIX Security '12 | George Argyros, Aggelos Kiayias |
| Enemy of the State: A State-Aware Black-Box Web Vulnerability Scanner | USENIX Security '12 | Adam Doupé, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna |
| Tachyon: Tandem Execution for Efficient Live Patch Testing | USENIX Security '12 | Matthew Maurer, David Brumley |
| Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices | USENIX Security '12 | Nadia Heninger, Zakir Durumeric, Eric Wustrow, J. Alex Halderman |
| New Attacks on Timing-based Network Flow Watermarks | USENIX Security '12 | Zi Lin, Nicholas Hopper |
| Welcome and Awards | USENIX Security '12 | |
| The Evolution of Information Assurance | USENIX Security '12 | |
| Robots and Privacy | USENIX Security '12 | |
| Cyber Security Education in a Time of Change | USENIX Security '12 | |
| Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services | USENIX Security '12 | Nuno Santos, Rodrigo Rodrigues, Krishna P. Gummadi, Stefan Saroiu |
| Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks | USENIX Security '12 | Hristo Bojinov, Daniel Sanchez, Paul Reber, Dan Boneh, Patrick Lincoln |
| Taking Proof-Based Verified Computation a Few Steps Closer to Practicality | USENIX Security '12 | Srinath Setty, Victor Vu, Nikhil Panpalia, Benjamin Braun, Andrew J. Blumberg, Michael Walfish |
| PUBCRAWL: Protecting Users and Businesses from CRAWLers | USENIX Security '12 | Gregoire Jacob, Engin Kirda, Christopher Kruegel, Giovanni Vigna |