| A Systematic Process-Model-based Approach for Synthesizing Attacks and Evaluating Them | EVT/WOTE '12 | |
| A Bayesian Method for Auditing Elections | EVT/WOTE '12 | |
| BRAVO: Ballot-polling Risk-limiting Audits to Verify Outcomes | EVT/WOTE '12 | |
| Keynote Address | EVT/WOTE '12 | |
| Lightning Debates | EVT/WOTE '12 | |
| Read It Twice! A Mass-Storage-Based TOCTTOU Attack | WOOT '12 | |
| Under New Management: Practical Attacks on SNMPv3 | WOOT '12 | |
| Abusing Notification Services on Smartphones for Phishing and Spamming | WOOT '12 | |
| Baseband Attacks: Remote Exploitation of Memory Corruptions in Cellular Protocol Stacks | WOOT '12 | |
| Security Analysis of Smartphone Point-of-Sale Systems | WOOT '12 | |
| WAFFle: Fingerprinting Filter Rules of Web Application Firewalls | WOOT '12 | |
| Off-Path Attacking the Web | WOOT '12 | |
| On the Fragility and Limitations of Current Browser-Provided Clickjacking Protection Schemes | WOOT '12 | |
| Microgadgets: Size Does Matter in Turing-Complete Return-Oriented Programming | WOOT '12 | |
| Frankenstein: Stitching Malware from Benign Binaries | WOOT '12 | |
| SMT Solvers in Software Security | WOOT '12 | |
| Web-based Attacks on Host-Proof Encrypted Storage | WOOT '12 | |
| The Future of HTTPS | WOOT '12 | |
| iOS and the Rising Cost of Reliable Exploitation | WOOT '12 | |
| Neuroimage Data Sets: Rethinking Privacy Policies | HealthSec '12 | |
| Who Wears Me? Bioimpedance as a Passive Biometric | HealthSec '12 | |
| Protecting Web-based Patient Portal for the Security and Privacy of Electronic Medical Records | HealthSec '12 | |
| Body Area Network Security: Robust Key Establishment Using Human Body Channel | HealthSec '12 | |
| Vis-à-vis Cryptography: Private and Trustworthy In-Person Certifications | HealthSec '12 | |
| Why We Built BOSH, a Release Engineering and Service Deployment Tool-Chain | HealthSec '12 | |