 | DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis | USENIX Security '12 | Lok Kwong Yan, Heng Yin |
 | Chimera: A Declarative Language for Streaming Network Traffic Analysis | USENIX Security '12 | Kevin Borders, Jonathan Springer, Matthew Burnside |
 | Security and Usability Challenges of Moving-Object CAPTCHAs: Decoding Codewords in Motion | USENIX Security '12 | Y Xu, G Reynaga, Sonia Chiasson, J.-M. Frahm, Fabian Monrose, Paul van Oorschot |
 | Impact of Spam Exposure on User Engagement | USENIX Security '12 | Anirban Dasgupta, Kunal Punera, Justin M. Rao, Xuanhui Wang |
 | kGuard: Lightweight Kernel Protection against Return-to-User Attacks | USENIX Security '12 | Vasileios P. Kemerlis, Georgios Portokalidis, Angelos D. Keromytis |
 | Privacy-Preserving Social Plugins | USENIX Security '12 | Georgios Kontaxis, Michalis Polychronakis, Angelos D. Keromytis, Evangelos P. Markatos |
 | Progressive Authentication: Deciding When to Authenticate on Mobile Phones | USENIX Security '12 | Oriana Riva, Chuan Qin, Karin Strauss, Dimitrios Lymberopoulos |
 | Origin-Bound Certificates: A Fresh Approach to Strong Client Authentication for the Web | USENIX Security '12 | Michael Dietz, Alexei Czeskis, Dirk Balfanz, Dan S. Wallach |
 | Privilege Separation in HTML5 Applications | USENIX Security '12 | Devdatta Akhawe, Prateek Saxena, Dawn Song |
 | Throttling Tor Bandwidth Parasites | USENIX Security '12 | Rob Jansen, Paul Syverson, Nicholas Hopper |
 | Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization | USENIX Security '12 | Cristiano Giuffrida, Anton Kuijsten, Andrew S. Tanenbaum |
 | STING: Finding Name Resolution Vulnerabilities in Programs | USENIX Security '12 | Hayawardh Vijayakumar, Joshua Schiffman, Trent Jaeger |
 | Tracking Rootkit Footprints with a Practical Memory Analysis System | USENIX Security '12 | Weidong Cui, Marcus Peinado, Zhilei Xu, Ellick Chan |
 | Billion-Gate Secure Computation with Malicious Adversaries | USENIX Security '12 | Benjamin Kreuter, Abhi Shelat, Chih-hao Shen |
 | PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs | USENIX Security '12 | Damon McCoy, Andreas Pitsillidis, Jordan Grant, Nicholas Weaver, Christian Kreibich, Brian Krebs, Geoffrey Voelker, Stefan Savage, Kirill Levchenko |
 | How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation | USENIX Security '12 | Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle L. Mazurek, Timothy Passaro, Richard Shay, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor |
 | Establishing Browser Security Guarantees through Formal Shim Verification | USENIX Security '12 | Dongseok Jang, Zachary Tatlock, Sorin Lerner |
 | I Forgot Your Password: Randomness Attacks Against PHP Applications | USENIX Security '12 | George Argyros, Aggelos Kiayias |
 | Enemy of the State: A State-Aware Black-Box Web Vulnerability Scanner | USENIX Security '12 | Adam Doupé, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna |
 | Tachyon: Tandem Execution for Efficient Live Patch Testing | USENIX Security '12 | Matthew Maurer, David Brumley |
 | Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices | USENIX Security '12 | Nadia Heninger, Zakir Durumeric, Eric Wustrow, J. Alex Halderman |
 | Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services | USENIX Security '12 | Nuno Santos, Rodrigo Rodrigues, Krishna P. Gummadi, Stefan Saroiu |
 | An Evaluation of the Google Chrome Extension Security Architecture | USENIX Security '12 | Nicholas Carlini, Adrienne Porter Felt, David Wagner |
 | HotSec'12 9am Session Q & A | HotSec '12 | |
 | HotSec'12 11am Session Q & A | HotSec '12 | |