You could enable C2 auditing. C2 auditing can be detrimental to performance and is not always 100% accurate, but it provides a very robust method for tracking access to SMOs. The output file can be launched via profiler and is quite legible.
more info:
http://www.sqlservercentral.com/articles/Monitoring/basicsofc2auditing/1547/