| The Benefits of Understanding Passwords | HotSec '12 | |
| How to Ask for Permission | HotSec '12 | |
| Impeding Automated Malware Analysis with Environment-sensitive Malware | HotSec '12 | |
| Software Diversity: Security, Entropy and Game Theory | HotSec '12 | |
| PeerSec: Towards Peer Production and Crowdsourcing for Enhanced Security | HotSec '12 | |
| When Good Services Go Wild: Reassembling Web Services for Unintended Purposes | HotSec '12 | |
| Functional Privacy or Why Cookies Are Better with Milk | HotSec '12 | |
| Context-centric Security | HotSec '12 | |
| HotSec'12 9am Session Q & A | HotSec '12 | |
| HotSec'12 11am Session Q & A | HotSec '12 | |
| HotSec'12 2pm Session Q & A | HotSec '12 | |
| HotSec'12 4pm Session Q & A | HotSec '12 | |
| Neuroimage Data Sets: Rethinking Privacy Policies | HealthSec '12 | |
| Who Wears Me? Bioimpedance as a Passive Biometric | HealthSec '12 | |
| Protecting Web-based Patient Portal for the Security and Privacy of Electronic Medical Records | HealthSec '12 | |
| Body Area Network Security: Robust Key Establishment Using Human Body Channel | HealthSec '12 | |
| Vis-à-vis Cryptography: Private and Trustworthy In-Person Certifications | HealthSec '12 | |
| Under New Management: Practical Attacks on SNMPv3 | WOOT '12 | |
| Abusing Notification Services on Smartphones for Phishing and Spamming | WOOT '12 | |
| Baseband Attacks: Remote Exploitation of Memory Corruptions in Cellular Protocol Stacks | WOOT '12 | |
| Security Analysis of Smartphone Point-of-Sale Systems | WOOT '12 | |
| WAFFle: Fingerprinting Filter Rules of Web Application Firewalls | WOOT '12 | |
| Off-Path Attacking the Web | WOOT '12 | |
| On the Fragility and Limitations of Current Browser-Provided Clickjacking Protection Schemes | WOOT '12 | |
| Microgadgets: Size Does Matter in Turing-Complete Return-Oriented Programming | WOOT '12 | |