| HotSec'12 2pm Session Q & A | HotSec '12 | |
| HotSec'12 4pm Session Q & A | HotSec '12 | |
| GANGRENE: Exploring the Mortality of Flash Memory | HotSec '12 | |
| NoisyKey: Tolerating Keyloggers via Keystrokes Hiding | HotSec '12 | |
| Potentia Est Scientia: Security and Privacy Implications of Energy-Proportional Computing | HotSec '12 | |
| The Benefits of Understanding Passwords | HotSec '12 | |
| How to Ask for Permission | HotSec '12 | |
| Impeding Automated Malware Analysis with Environment-sensitive Malware | HotSec '12 | |
| Software Diversity: Security, Entropy and Game Theory | HotSec '12 | |
| PeerSec: Towards Peer Production and Crowdsourcing for Enhanced Security | HotSec '12 | |
| When Good Services Go Wild: Reassembling Web Services for Unintended Purposes | HotSec '12 | |
| Functional Privacy or Why Cookies Are Better with Milk | HotSec '12 | |
| Context-centric Security | HotSec '12 | |
| Using Prêt à Voter in Victoria State Elections | EVT/WOTE '12 | |
| Probing the Front Lines: Pollworker Perceptions of Security & Privacy | EVT/WOTE '12 | |
| Cobra: Toward Concurrent Ballot Authorization for Internet Voting | EVT/WOTE '12 | |
| Coercion-Resistant Electronic Elections with Write-In Candidates | EVT/WOTE '12 | |
| Software Vulnerabilities in the Brazilian Voting Machine | EVT/WOTE '12 | |
| Everything You Know About Password-Stealing Is Wrong | WOOT '12 | |
| Counter to Intent: Voters' Mental Models of Alternative Counting Methods | EVT/WOTE '12 | |
| A Hybrid Touch Interface for Prêt à Voter | EVT/WOTE '12 | |
| Operator-Assisted Tabulation of Optical Scan Ballots | EVT/WOTE '12 | |
| Cryptanalysis of a Universally Verifiable Efficient Re-encryption Mixnet | EVT/WOTE '12 | |
| Improving Helios with Everlasting Privacy Towards the Public | EVT/WOTE '12 | |
| Automated Analysis of Election Audit Logs | EVT/WOTE '12 | |