| 0 | -- | 0 | Martin Rosso, Michele Campobasso, Ganduulga Gankhuyag, Luca Allodi. SAIBERSOC: A Methodology and Tool for Experimenting with Security Operation Centers |
| 0 | -- | 0 | Fritz Alder, Jo Van Bulck, Jesse Spielman, David F. Oswald, Frank Piessens. Faulty Point Unit: ABI Poisoning Attacks on Trusted Execution Environments |
| 0 | -- | 0 | J. S. Panman de Wit, Doina Bucur, J. van der Ham. Dynamic Detection of Mobile Malware Using Smartphone Data and Machine Learning |
| 0 | -- | 0 | Daniele Cono D'Elia, Lorenzo Invidia, Federico Palmaro, Leonardo Querzoni. Evaluating Dynamic Binary Instrumentation Systems for Conspicuous Features and Artifacts |
| 0 | -- | 0 | Roberto Perdisci, Martina Lindorfer, Gianluca Stringhini. Introduction to the ACSAC'20 Special Issue |
| 0 | -- | 0 | Ricardo J. Rodríguez, Xabier Ugarte-Pedrero, Juan Tapiador. Introduction to the Special Issue on Challenges and Trends in Malware Analysis |
| 0 | -- | 0 | Ailton Santos Filho, Ricardo J. Rodríguez, Eduardo L. Feitosa. Evasion and Countermeasures Techniques to Detect Dynamic Binary Instrumentation Frameworks |
| 0 | -- | 0 | Sean Oesch, Ruba Abu-Salma, Oumar Diallo, Juliane Krämer, James Simmons, Justin Wu, Scott Ruoti. User Perceptions of Security and Privacy for Group Chat |
| 0 | -- | 0 | Sheng Sun. A Chosen Random Value Attack on WPA3 SAE Authentication Protocol |