| Robots and Privacy | USENIX Security '12 | |
| Cyber Security Education in a Time of Change | USENIX Security '12 | |
| Life as a Target—Welcome to the Club | USENIX Security '12 | |
| Nature is a Language; Can't You Read? | USENIX Security '12 | |
| Emerging Trends and Their Security Implications | USENIX Security '12 | Doug Burger |
| Securing Early Software Development | USENIX Security '12 | |
| New Attacks on Timing-based Network Flow Watermarks | USENIX Security '12 | Zi Lin, Nicholas Hopper |
| Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks | USENIX Security '12 | Hristo Bojinov, Daniel Sanchez, Paul Reber, Dan Boneh, Patrick Lincoln |
| Taking Proof-Based Verified Computation a Few Steps Closer to Practicality | USENIX Security '12 | Srinath Setty, Victor Vu, Nikhil Panpalia, Benjamin Braun, Andrew J. Blumberg, Michael Walfish |
| PUBCRAWL: Protecting Users and Businesses from CRAWLers | USENIX Security '12 | Gregoire Jacob, Engin Kirda, Christopher Kruegel, Giovanni Vigna |
| Clickjacking: Attacks and Defenses | USENIX Security '12 | Lin-Shung Huang, Alex Moshchuk, Helen J. Wang, Stuart Schecter, Collin Jackson |
| On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces | USENIX Security '12 | Ivan Martinovic, Doug Davies, Mario Frank, Daniele Perito, Tomas Ros, Dawn Song |
| B@bel: Leveraging Email Delivery for Spam Mitigation | USENIX Security '12 | Gianluca Stringhini, Manuel Egele, Apostolis Zarras, Thorsten Holz, Christopher Kruegel, Giovanni Vigna |
| Aurasium: Practical Policy Enforcement for Android Applications | USENIX Security '12 | Rubin Xu, Hassen Saïdi, Ross Anderson |
| Social Networking with Frientegrity: Privacy and Integrity with an Untrusted Provider | USENIX Security '12 | Ariel J. Feldman, Aaron Blankstein, Michael J. Freedman, Edward W. Felten |
| TARDIS: Time and Remanence Decay in SRAM to Implement Secure Protocols on Embedded Devices without Clocks | USENIX Security '12 | Amir Rahmati, Mastooreh Salajegheh, Dan Holcomb, Jacob Sorber, Wayne P. Burleson, Kevin Fu |
| Fuzzing with Code Fragments | USENIX Security '12 | Christian Holler, Kim Herzig, Andreas Zeller |
| Data Node Encrypted File System: Efficient Secure Deletion for Flash Memory | USENIX Security '12 | Joel Reardon, Srdjan Capkun, David Basin |
| STEALTHMEM: System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud | USENIX Security '12 | Taesoo Kim, Marcus Peinado, Gloria Mainar-Ruiz |
| Efficient and Scalable Socware Detection in Online Social Networks | USENIX Security '12 | Md Sazzadur Rahman, Ting-Kai Huang, Harsha V. Madhyastha, Michalis Faloutsos |
| Optimally Robust Private Information Retrieval | USENIX Security '12 | Casey Devet, Ian Goldberg, Nadia Heninger |
| On Breaking SAML: Be Whoever You Want to Be | USENIX Security '12 | Juraj Somorovsky, Andreas Mayer, Jörg Schwenk, Marco Kampmann, Meiko Jensen |
| Gone in 360 Seconds: Hijacking with Hitag2 | USENIX Security '12 | Roel Verdult, Flavio D. Garcia, Josep Balasch |
| Whispers in the Hyper-space: High-speed Covert Channel Attacks in the Cloud | USENIX Security '12 | Zhenyu Wu, Zhang Xu, Haining Wang |
| AdSplit: Separating Smartphone Advertising from Applications | USENIX Security '12 | Shashi Shekhar, Michael Dietz, Dan S. Wallach |