| Frankenstein: Stitching Malware from Benign Binaries | WOOT '12 | |
| SMT Solvers in Software Security | WOOT '12 | |
| Web-based Attacks on Host-Proof Encrypted Storage | WOOT '12 | |
| The Future of HTTPS | WOOT '12 | |
| iOS and the Rising Cost of Reliable Exploitation | WOOT '12 | |
| Using Prêt à Voter in Victoria State Elections | EVT/WOTE '12 | |
| Probing the Front Lines: Pollworker Perceptions of Security & Privacy | EVT/WOTE '12 | |
| Cobra: Toward Concurrent Ballot Authorization for Internet Voting | EVT/WOTE '12 | |
| Coercion-Resistant Electronic Elections with Write-In Candidates | EVT/WOTE '12 | |
| Software Vulnerabilities in the Brazilian Voting Machine | EVT/WOTE '12 | |
| Everything You Know About Password-Stealing Is Wrong | WOOT '12 | |
| Counter to Intent: Voters' Mental Models of Alternative Counting Methods | EVT/WOTE '12 | |
| A Hybrid Touch Interface for Prêt à Voter | EVT/WOTE '12 | |
| Operator-Assisted Tabulation of Optical Scan Ballots | EVT/WOTE '12 | |
| Cryptanalysis of a Universally Verifiable Efficient Re-encryption Mixnet | EVT/WOTE '12 | |
| Improving Helios with Everlasting Privacy Towards the Public | EVT/WOTE '12 | |
| Automated Analysis of Election Audit Logs | EVT/WOTE '12 | |
| A Systematic Process-Model-based Approach for Synthesizing Attacks and Evaluating Them | EVT/WOTE '12 | |
| A Bayesian Method for Auditing Elections | EVT/WOTE '12 | |
| BRAVO: Ballot-polling Risk-limiting Audits to Verify Outcomes | EVT/WOTE '12 | |
| Keynote Address | EVT/WOTE '12 | |
| Lightning Debates | EVT/WOTE '12 | |
| Read It Twice! A Mass-Storage-Based TOCTTOU Attack | WOOT '12 | |
| Why We Built BOSH, a Release Engineering and Service Deployment Tool-Chain | WOOT '12 | |
| Case Study: The Haiti Rural Broadband Initiative | NSDR '12 | Eric Blantz, Bruce Baike |