Proceedings of the 12th IEEE Computer Security Foundations Workshop