| Clickjacking: Attacks and Defenses | USENIX Security '12 | Lin-Shung Huang, Alex Moshchuk, Helen J. Wang, Stuart Schecter, Collin Jackson |
| On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces | USENIX Security '12 | Ivan Martinovic, Doug Davies, Mario Frank, Daniele Perito, Tomas Ros, Dawn Song |
| Life as a Target—Welcome to the Club | USENIX Security '12 | |
| Nature is a Language; Can't You Read? | USENIX Security '12 | |
| Emerging Trends and Their Security Implications | USENIX Security '12 | Doug Burger |
| Securing Early Software Development | USENIX Security '12 | |
| B@bel: Leveraging Email Delivery for Spam Mitigation | USENIX Security '12 | Gianluca Stringhini, Manuel Egele, Apostolis Zarras, Thorsten Holz, Christopher Kruegel, Giovanni Vigna |
| Aurasium: Practical Policy Enforcement for Android Applications | USENIX Security '12 | Rubin Xu, Hassen Saïdi, Ross Anderson |
| Social Networking with Frientegrity: Privacy and Integrity with an Untrusted Provider | USENIX Security '12 | Ariel J. Feldman, Aaron Blankstein, Michael J. Freedman, Edward W. Felten |
| TARDIS: Time and Remanence Decay in SRAM to Implement Secure Protocols on Embedded Devices without Clocks | USENIX Security '12 | Amir Rahmati, Mastooreh Salajegheh, Dan Holcomb, Jacob Sorber, Wayne P. Burleson, Kevin Fu |
| Fuzzing with Code Fragments | USENIX Security '12 | Christian Holler, Kim Herzig, Andreas Zeller |
| Data Node Encrypted File System: Efficient Secure Deletion for Flash Memory | USENIX Security '12 | Joel Reardon, Srdjan Capkun, David Basin |
| STEALTHMEM: System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud | USENIX Security '12 | Taesoo Kim, Marcus Peinado, Gloria Mainar-Ruiz |
| Efficient and Scalable Socware Detection in Online Social Networks | USENIX Security '12 | Md Sazzadur Rahman, Ting-Kai Huang, Harsha V. Madhyastha, Michalis Faloutsos |
| Optimally Robust Private Information Retrieval | USENIX Security '12 | Casey Devet, Ian Goldberg, Nadia Heninger |
| On Breaking SAML: Be Whoever You Want to Be | USENIX Security '12 | Juraj Somorovsky, Andreas Mayer, Jörg Schwenk, Marco Kampmann, Meiko Jensen |
| Gone in 360 Seconds: Hijacking with Hitag2 | USENIX Security '12 | Roel Verdult, Flavio D. Garcia, Josep Balasch |
| Whispers in the Hyper-space: High-speed Covert Channel Attacks in the Cloud | USENIX Security '12 | Zhenyu Wu, Zhang Xu, Haining Wang |
| AdSplit: Separating Smartphone Advertising from Applications | USENIX Security '12 | Shashi Shekhar, Michael Dietz, Dan S. Wallach |
| DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis | USENIX Security '12 | Lok Kwong Yan, Heng Yin |
| Chimera: A Declarative Language for Streaming Network Traffic Analysis | USENIX Security '12 | Kevin Borders, Jonathan Springer, Matthew Burnside |
| Security and Usability Challenges of Moving-Object CAPTCHAs: Decoding Codewords in Motion | USENIX Security '12 | Y Xu, G Reynaga, Sonia Chiasson, J.-M. Frahm, Fabian Monrose, Paul van Oorschot |
| GANGRENE: Exploring the Mortality of Flash Memory | HotSec '12 | |
| NoisyKey: Tolerating Keyloggers via Keystrokes Hiding | HotSec '12 | |
| Potentia Est Scientia: Security and Privacy Implications of Energy-Proportional Computing | HotSec '12 | |