Security Papers from the 2000s

This webpage is an attempt to assemble a ranking of top-cited security papers from the 2000s. The ranking has been created based on citations of papers published at top security conferences. More details are available here.

Top-cited papers from 2009 ⌄

  1. 1
    Thomas Ristenpart, Eran Tromer, Hovav Shacham, Stefan Savage:
    Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds.
    ACM Conference on Computer and Communications Security (CCS), 2009
    1797 cites at Google Scholar
    1871% above average of year
    Last visited: Oct-2017
  2. 2
    Yao Liu, Michael K. Reiter, Peng Ning:
    False data injection attacks against state estimation in electric power grids.
    ACM Conference on Computer and Communications Security (CCS), 2009
    1168 cites at Google Scholar
    1181% above average of year
    Last visited: Oct-2017
  3. 3
    Qian Wang, Cong Wang, Jin Li, Kui Ren, Wenjing Lou:
    Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing.
    European Symposium on Research in Computer Security (ESORICS), 2009
    1091 cites at Google Scholar
    1097% above average of year
    Last visited: Nov-2017
  4. 4
    Kevin D. Bowers, Ari Juels, Alina Oprea:
    HAIL: a high-availability and integrity layer for cloud storage.
    ACM Conference on Computer and Communications Security (CCS), 2009
    1036 cites at Google Scholar
    1036% above average of year
    Last visited: Sep-2017
  5. 5
    C. Christopher Erway, Alptekin Küpçü, Charalampos Papamanthou, Roberto Tamassia:
    Dynamic provable data possession.
    ACM Conference on Computer and Communications Security (CCS), 2009
    1000 cites at Google Scholar
    997% above average of year
    Last visited: Sep-2017
  6. 6
    William Enck, Machigar Ongtang, Patrick Drew McDaniel:
    On lightweight mobile phone application certification.
    ACM Conference on Computer and Communications Security (CCS), 2009
    916 cites at Google Scholar
    905% above average of year
    Last visited: Nov-2017
  7. 7
    Melissa Chase, Sherman S. M. Chow:
    Improving privacy and security in multi-authority attribute-based encryption.
    ACM Conference on Computer and Communications Security (CCS), 2009
    652 cites at Google Scholar
    615% above average of year
    Last visited: Oct-2017
  8. 8
    Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna:
    Your botnet is my botnet: analysis of a botnet takeover.
    ACM Conference on Computer and Communications Security (CCS), 2009
    627 cites at Google Scholar
    588% above average of year
    Last visited: Nov-2017
  9. 9
    Bennet Yee, David Sehr, Gregory Dardyk, J. Bradley Chen, Robert Muth, Tavis Ormandy, Shiki Okasaka, Neha Narula, Nicholas Fullagar:
    Native Client: A Sandbox for Portable, Untrusted x86 Native Code.
    IEEE Symposium on Security and Privacy, 2009
    569 cites at Google Scholar
    524% above average of year
    Last visited: Oct-2017
  10. 10
    Machigar Ongtang, Stephen E. McLaughlin, William Enck, Patrick Drew McDaniel:
    Semantically Rich Application-Centric Security in Android.
    Annual Computer Security Applications Conference (ACSAC), 2009
    569 cites at Google Scholar
    524% above average of year
    Last visited: Sep-2017

Top-cited papers from 2008 ⌄

  1. 1
    J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandrino, Ariel J. Feldman, Jacob Appelbaum, Edward W. Felten:
    Lest We Remember: Cold Boot Attacks on Encryption Keys.
    USENIX Security Symposium, 2008
    1046 cites at Google Scholar
    1374% above average of year
    Last visited: Nov-2017
  2. 2
    Guofei Gu, Roberto Perdisci, Junjie Zhang, Wenke Lee:
    BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection.
    USENIX Security Symposium, 2008
    1020 cites at Google Scholar
    1337% above average of year
    Last visited: Oct-2017
  3. 3
    Patrice Godefroid, Michael Y. Levin, David A. Molnar:
    Automated Whitebox Fuzz Testing.
    Network and Distributed System Security Symposium (NDSS), 2008
    929 cites at Google Scholar
    1209% above average of year
    Last visited: Oct-2017
  4. 4
    Haifeng Yu, Phillip B. Gibbons, Michael Kaminsky, Feng Xiao:
    SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks.
    IEEE Symposium on Security and Privacy, 2008
    657 cites at Google Scholar
    826% above average of year
    Last visited: Nov-2017
  5. 5
    Niels Provos, Panayiotis Mavrommatis, Moheeb Abu Rajab, Fabian Monrose:
    All Your iFRAMEs Point to Us.
    USENIX Security Symposium, 2008
    532 cites at Google Scholar
    650% above average of year
    Last visited: Nov-2017
  6. 6
    Daniel Halperin, Thomas S. Heydt-Benjamin, Benjamin Ransford, Shane S. Clark, Benessa Defend, Will Morgan, Kevin Fu, Tadayoshi Kohno, William H. Maisel:
    Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses.
    IEEE Symposium on Security and Privacy, 2008
    489 cites at Google Scholar
    589% above average of year
    Last visited: Nov-2017
  7. 7
    Bryan D. Payne, Martim Carbone, Monirul I. Sharif, Wenke Lee:
    Lares: An Architecture for Secure Active Monitoring Using Virtualization.
    IEEE Symposium on Security and Privacy, 2008
    477 cites at Google Scholar
    572% above average of year
    Last visited: Sep-2017
  8. 8
    Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage:
    Spamalytics: an empirical analysis of spam marketing conversion.
    ACM Conference on Computer and Communications Security (CCS), 2008
    443 cites at Google Scholar
    524% above average of year
    Last visited: Sep-2017
  9. 9
    Assaf Ben-David, Noam Nisan, Benny Pinkas:
    FairplayMP: a system for secure multi-party computation.
    ACM Conference on Computer and Communications Security (CCS), 2008
    422 cites at Google Scholar
    495% above average of year
    Last visited: Sep-2017
  10. 10
    Thorsten Holz, Christian Gorecki, Konrad Rieck, Felix C. Freiling:
    Measuring and Detecting Fast-Flux Service Networks.
    Network and Distributed System Security Symposium (NDSS), 2008
    358 cites at Google Scholar
    404% above average of year
    Last visited: Nov-2017

Top-cited papers from 2007 ⌄

  1. 1
    Giuseppe Ateniese, Randal C. Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary N. J. Peterson, Dawn Xiaodong Song:
    Provable data possession at untrusted stores.
    ACM Conference on Computer and Communications Security (CCS), 2007
    2292 cites at Google Scholar
    2178% above average of year
    Last visited: Sep-2017
  2. 2
    Ari Juels, Burton S. Kaliski Jr.:
    Pors: proofs of retrievability for large files.
    ACM Conference on Computer and Communications Security (CCS), 2007
    1694 cites at Google Scholar
    1584% above average of year
    Last visited: Oct-2017
  3. 3
    Hovav Shacham:
    The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86).
    ACM Conference on Computer and Communications Security (CCS), 2007
    895 cites at Google Scholar
    790% above average of year
    Last visited: Oct-2017
  4. 4
    Heng Yin, Dawn Xiaodong Song, Manuel Egele, Christopher Kruegel, Engin Kirda:
    Panorama: capturing system-wide information flow for malware detection and analysis.
    ACM Conference on Computer and Communications Security (CCS), 2007
    733 cites at Google Scholar
    629% above average of year
    Last visited: Sep-2017
  5. 5
    Ling Cheung, Calvin C. Newport:
    Provably secure ciphertext policy ABE.
    ACM Conference on Computer and Communications Security (CCS), 2007
    649 cites at Google Scholar
    545% above average of year
    Last visited: Aug-2017
  6. 6
    Xuxian Jiang, Xinyuan Wang, Dongyan Xu:
    Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction.
    ACM Conference on Computer and Communications Security (CCS), 2007
    552 cites at Google Scholar
    449% above average of year
    Last visited: Jul-2017
  7. 7
    Philipp Vogt, Florian Nentwich, Nenad Jovanovic, Engin Kirda, Christopher Krügel, Giovanni Vigna:
    Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis.
    Network and Distributed System Security Symposium (NDSS), 2007
    538 cites at Google Scholar
    435% above average of year
    Last visited: Nov-2017
  8. 8
    Michael Bailey, Jon Oberheide, Jon Andersen, Zhuoqing Morley Mao, Farnam Jahanian, Jose Nazario:
    Automated Classification and Analysis of Internet Malware.
    International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2007
    521 cites at Google Scholar
    418% above average of year
    Last visited: Nov-2017
  9. 9
    Andreas Moser, Christopher Krügel, Engin Kirda:
    Exploring Multiple Execution Paths for Malware Analysis.
    IEEE Symposium on Security and Privacy, 2007
    514 cites at Google Scholar
    411% above average of year
    Last visited: Oct-2017
  10. 10
    Elaine Shi, John Bethencourt, Hubert T.-H. Chan, Dawn Xiaodong Song, Adrian Perrig:
    Multi-Dimensional Range Query over Encrypted Data.
    IEEE Symposium on Security and Privacy, 2007
    479 cites at Google Scholar
    376% above average of year
    Last visited: Nov-2017

Top-cited papers from 2006 ⌄

  1. 1
    Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Waters:
    Attribute-based encryption for fine-grained access control of encrypted data.
    ACM Conference on Computer and Communications Security (CCS), 2006
    3628 cites at Google Scholar
    3861% above average of year
    Last visited: Nov-2017
  2. 2
    Reza Curtmola, Juan A. Garay, Seny Kamara, Rafail Ostrovsky:
    Searchable symmetric encryption: improved definitions and efficient constructions.
    ACM Conference on Computer and Communications Security (CCS), 2006
    1372 cites at Google Scholar
    1398% above average of year
    Last visited: Oct-2017
  3. 3
    Cristian Cadar, Vijay Ganesh, Peter M. Pawlowski, David L. Dill, Dawson R. Engler:
    EXE: automatically generating inputs of death.
    ACM Conference on Computer and Communications Security (CCS), 2006
    1003 cites at Google Scholar
    995% above average of year
    Last visited: Oct-2017
  4. 4
    Stefan Berger, Ramón Cáceres, Kenneth A. Goldman, Ronald Perez, Reiner Sailer, Leendert van Doorn:
    vTPM: Virtualizing the Trusted Platform Module.
    USENIX Security Symposium, 2006
    570 cites at Google Scholar
    522% above average of year
    Last visited: Oct-2017
  5. 5
    Matthew Pirretti, Patrick Traynor, Patrick McDaniel, Brent Waters:
    Secure attribute-based systems.
    ACM Conference on Computer and Communications Security (CCS), 2006
    523 cites at Google Scholar
    471% above average of year
    Last visited: Oct-2017
  6. 6
    Lihua Yuan, Jianning Mai, Zhendong Su, Hao Chen, Chen-Nee Chuah, Prasant Mohapatra:
    FIREMAN: A Toolkit for FIREwall Modeling and ANalysis.
    IEEE Symposium on Security and Privacy, 2006
    453 cites at Google Scholar
    395% above average of year
    Last visited: Nov-2017
  7. 7
    Haowen Chan, Adrian Perrig, Dawn Xiaodong Song:
    Secure hierarchical in-network aggregation in sensor networks.
    ACM Conference on Computer and Communications Security (CCS), 2006
    410 cites at Google Scholar
    348% above average of year
    Last visited: Nov-2017
  8. 8
    Martín Casado, Tal Garfinkel, Aditya Akella, Michael J. Freedman, Dan Boneh, Nick McKeown:
    SANE: A Protection Architecture for Enterprise Networks.
    USENIX Security Symposium, 2006
    393 cites at Google Scholar
    329% above average of year
    Last visited: Aug-2017
  9. 9
    Wei Xu, Sandeep Bhatkar, R. Sekar:
    Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks.
    USENIX Security Symposium, 2006
    388 cites at Google Scholar
    324% above average of year
    Last visited: Aug-2017
  10. 10
    Paul Baecher, Markus Koetter, Thorsten Holz, Maximillian Dornseif, Felix C. Freiling:
    The Nepenthes Platform: An Efficient Approach to Collect Malware.
    International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2006
    387 cites at Google Scholar
    323% above average of year
    Last visited: Nov-2017

Top-cited papers from 2005 ⌄

  1. 1
    James Newsome, Dawn Xiaodong Song:
    Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software.
    Network and Distributed System Security Symposium (NDSS), 2005
    1480 cites at Google Scholar
    1268% above average of year
    Last visited: Sep-2017
  2. 2
    Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan Hohenberger:
    Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage.
    Network and Distributed System Security Symposium (NDSS), 2005
    1233 cites at Google Scholar
    1040% above average of year
    Last visited: Nov-2017
  3. 3
    James Newsome, Brad Karp, Dawn Xiaodong Song:
    Polygraph: Automatically Generating Signatures for Polymorphic Worms.
    IEEE Symposium on Security and Privacy, 2005
    925 cites at Google Scholar
    755% above average of year
    Last visited: Nov-2017
  4. 4
    Martín Abadi, Mihai Budiu, Úlfar Erlingsson, Jay Ligatti:
    Control-flow integrity.
    ACM Conference on Computer and Communications Security (CCS), 2005
    861 cites at Google Scholar
    696% above average of year
    Last visited: Oct-2017
  5. 5
    Mihai Christodorescu, Somesh Jha, Sanjit A. Seshia, Dawn Xiaodong Song, Randal E. Bryant:
    Semantics-Aware Malware Detection.
    IEEE Symposium on Security and Privacy, 2005
    761 cites at Google Scholar
    604% above average of year
    Last visited: Oct-2017
  6. 6
    V. Benjamin Livshits, Monica S. Lam:
    Finding Security Vulnerabilities in Java Applications with Static Analysis.
    USENIX Security Symposium, 2005
    683 cites at Google Scholar
    531% above average of year
    Last visited: Sep-2017
  7. 7
    Tadayoshi Kohno, Andre Broido, Kimberly C. Claffy:
    Remote Physical Device Fingerprinting.
    IEEE Symposium on Security and Privacy, 2005
    625 cites at Google Scholar
    478% above average of year
    Last visited: Nov-2017
  8. 8
    Jonathan M. McCune, Adrian Perrig, Michael K. Reiter:
    Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication.
    IEEE Symposium on Security and Privacy, 2005
    561 cites at Google Scholar
    419% above average of year
    Last visited: Oct-2017
  9. 9
    Steven J. Murdoch, George Danezis:
    Low-Cost Traffic Analysis of Tor.
    IEEE Symposium on Security and Privacy, 2005
    555 cites at Google Scholar
    413% above average of year
    Last visited: Nov-2017
  10. 10
    Xiaoyuan Suo, Ying Zhu, G. Scott Owen:
    Graphical Passwords: A Survey.
    Annual Computer Security Applications Conference (ACSAC), 2005
    539 cites at Google Scholar
    398% above average of year
    Last visited: Oct-2017

Top-cited papers from 2004 ⌄

  1. 1
    Reiner Sailer, Xiaolan Zhang, Trent Jaeger, Leendert van Doorn:
    Design and Implementation of a TCG-based Integrity Measurement Architecture.
    USENIX Security Symposium, 2004
    1258 cites at Google Scholar
    884% above average of year
    Last visited: Nov-2017
  2. 2
    Hyang-Ah Kim, Brad Karp:
    Autograph: Toward Automated, Distributed Worm Signature Detection.
    USENIX Security Symposium, 2004
    928 cites at Google Scholar
    626% above average of year
    Last visited: Sep-2017
  3. 3
    Ernest F. Brickell, Jan Camenisch, Liqun Chen:
    Direct anonymous attestation.
    ACM Conference on Computer and Communications Security (CCS), 2004
    926 cites at Google Scholar
    625% above average of year
    Last visited: Nov-2017
  4. 4
    David Molnar, David Wagner:
    Privacy and security in library RFID: issues, practices, and architectures.
    ACM Conference on Computer and Communications Security (CCS), 2004
    904 cites at Google Scholar
    607% above average of year
    Last visited: Jul-2017
  5. 5
    Ke Wang, Salvatore J. Stolfo:
    Anomalous Payload-Based Network Intrusion Detection.
    International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2004
    893 cites at Google Scholar
    599% above average of year
    Last visited: Nov-2017
  6. 6
    Hovav Shacham, Matthew Page, Ben Pfaff, Eu-Jin Goh, Nagendra Modadugu, Dan Boneh:
    On the effectiveness of address-space randomization.
    ACM Conference on Computer and Communications Security (CCS), 2004
    837 cites at Google Scholar
    555% above average of year
    Last visited: Nov-2017
  7. 7
    Jaeyeon Jung, Vern Paxson, Arthur W. Berger, Hari Balakrishnan:
    Fast Portscan Detection Using Sequential Hypothesis Testing.
    IEEE Symposium on Security and Privacy, 2004
    805 cites at Google Scholar
    530% above average of year
    Last visited: Nov-2017
  8. 8
    Lingxuan Hu, David Evans:
    Using Directional Antennas to Prevent Wormhole Attacks.
    Network and Distributed System Security Symposium (NDSS), 2004
    642 cites at Google Scholar
    402% above average of year
    Last visited: Oct-2017
  9. 9
    Arvind Seshadri, Adrian Perrig, Leendert van Doorn, Pradeep K. Khosla:
    SWATT: SoftWare-based ATTestation for Embedded Devices.
    IEEE Symposium on Security and Privacy, 2004
    575 cites at Google Scholar
    350% above average of year
    Last visited: Nov-2017
  10. 10
    Nick L. Petroni Jr., Timothy Fraser, Jesus Molina, William A. Arbaugh:
    Copilot - a Coprocessor-based Kernel Runtime Integrity Monitor.
    USENIX Security Symposium, 2004
    542 cites at Google Scholar
    324% above average of year
    Last visited: Aug-2017

Top-cited papers from 2003 ⌄

  1. 1
    Haowen Chan, Adrian Perrig, Dawn Xiaodong Song:
    Random Key Predistribution Schemes for Sensor Networks.
    IEEE Symposium on Security and Privacy, 2003
    3696 cites at Google Scholar
    2144% above average of year
    Last visited: Nov-2017
  2. 2
    Donggang Liu, Peng Ning:
    Establishing pairwise keys in distributed sensor networks.
    ACM Conference on Computer and Communications Security (CCS), 2003
    2248 cites at Google Scholar
    1265% above average of year
    Last visited: Nov-2017
  3. 3
    Sencun Zhu, Sanjeev Setia, Sushil Jajodia:
    LEAP: efficient security mechanisms for large-scale distributed sensor networks.
    ACM Conference on Computer and Communications Security (CCS), 2003
    2185 cites at Google Scholar
    1226% above average of year
    Last visited: Sep-2017
  4. 4
    Ari Juels, Ronald L. Rivest, Michael Szydlo:
    The blocker tag: selective blocking of RFID tags for consumer privacy.
    ACM Conference on Computer and Communications Security (CCS), 2003
    1179 cites at Google Scholar
    616% above average of year
    Last visited: Sep-2017
  5. 5
    George Danezis, Roger Dingledine, Nick Mathewson:
    Mixminion: Design of a Type III Anonymous Remailer Protocol.
    IEEE Symposium on Security and Privacy, 2003
    740 cites at Google Scholar
    349% above average of year
    Last visited: Oct-2017
  6. 6
    Mihai Christodorescu, Somesh Jha:
    Static Analysis of Executables to Detect Malicious Patterns.
    USENIX Security Symposium, 2003
    725 cites at Google Scholar
    340% above average of year
    Last visited: Nov-2017
  7. 7
    Christopher Krügel, Giovanni Vigna:
    Anomaly detection of web-based attacks.
    ACM Conference on Computer and Communications Security (CCS), 2003
    678 cites at Google Scholar
    312% above average of year
    Last visited: Nov-2017
  8. 8
    Gaurav S. Kc, Angelos D. Keromytis, Vassilis Prevelakis:
    Countering code-injection attacks with instruction-set randomization.
    ACM Conference on Computer and Communications Security (CCS), 2003
    652 cites at Google Scholar
    296% above average of year
    Last visited: Sep-2017
  9. 9
    Sandeep Bhatkar, Daniel C. DuVarney, R. Sekar:
    Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits.
    USENIX Security Symposium, 2003
    624 cites at Google Scholar
    279% above average of year
    Last visited: Nov-2017
  10. 10
    Cheng Jin, Haining Wang, Kang G. Shin:
    Hop-count filtering: an effective defense against spoofed DDoS traffic.
    ACM Conference on Computer and Communications Security (CCS), 2003
    604 cites at Google Scholar
    267% above average of year
    Last visited: Nov-2017

Top-cited papers from 2002 ⌄

  1. 1
    Oleg Sheyner, Joshua W. Haines, Somesh Jha, Richard Lippmann, Jeannette M. Wing:
    Automated Generation and Analysis of Attack Graphs.
    IEEE Symposium on Security and Privacy, 2002
    1267 cites at Google Scholar
    710% above average of year
    Last visited: Nov-2017
  2. 2
    Blaise Gassend, Dwaine E. Clarke, Marten van Dijk, Srinivas Devadas:
    Silicon physical random functions.
    ACM Conference on Computer and Communications Security (CCS), 2002
    1104 cites at Google Scholar
    606% above average of year
    Last visited: Oct-2017
  3. 3
    Cliff Changchun Zou, Weibo Gong, Donald F. Towsley:
    Code red worm propagation modeling and analysis.
    ACM Conference on Computer and Communications Security (CCS), 2002
    1037 cites at Google Scholar
    563% above average of year
    Last visited: Oct-2017
  4. 4
    Ninghui Li, John C. Mitchell, William H. Winsborough:
    Design of a Role-Based Trust-Management Framework.
    IEEE Symposium on Security and Privacy, 2002
    1004 cites at Google Scholar
    542% above average of year
    Last visited: Oct-2017
  5. 5
    Frédéric Cuppens, Alexandre Miège:
    Alert Correlation in a Cooperative Intrusion Detection Framework.
    IEEE Symposium on Security and Privacy, 2002
    941 cites at Google Scholar
    502% above average of year
    Last visited: Sep-2017
  6. 6
    John F. Canny:
    Collaborative Filtering with Privacy.
    IEEE Symposium on Security and Privacy, 2002
    911 cites at Google Scholar
    483% above average of year
    Last visited: Nov-2017
  7. 7
    Michael J. Freedman, Robert Morris:
    Tarzan: a peer-to-peer anonymizing network layer.
    ACM Conference on Computer and Communications Security (CCS), 2002
    871 cites at Google Scholar
    457% above average of year
    Last visited: Nov-2017
  8. 8
    Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati, Fabio Violante:
    A reputation-based approach for choosing reliable resources in peer-to-peer networks.
    ACM Conference on Computer and Communications Security (CCS), 2002
    853 cites at Google Scholar
    445% above average of year
    Last visited: Aug-2017
  9. 9
    Paul Ammann, Duminda Wijesekera, Saket Kaushik:
    Scalable, graph-based network vulnerability analysis.
    ACM Conference on Computer and Communications Security (CCS), 2002
    803 cites at Google Scholar
    414% above average of year
    Last visited: Nov-2017
  10. 10
    John Ioannidis, Steven M. Bellovin:
    Implementing Pushback: Router-Based Defense Against DDoS Attacks.
    Network and Distributed System Security Symposium (NDSS), 2002
    767 cites at Google Scholar
    390% above average of year
    Last visited: Oct-2017

Top-cited papers from 2001 ⌄

  1. 1
    David Moore, Geoffrey M. Voelker, Stefan Savage:
    Inferring Internet Denial-of-Service Activity.
    USENIX Security Symposium, 2001
    1798 cites at Google Scholar
    1261% above average of year
    Last visited: Oct-2017
  2. 2
    Alfonso Valdes, Keith Skinner:
    Probabilistic Alert Correlation.
    International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2001
    936 cites at Google Scholar
    608% above average of year
    Last visited: Nov-2017
  3. 3
    Ross J. Anderson:
    Why Information Security is Hard-An Economic Perspective.
    Annual Computer Security Applications Conference (ACSAC), 2001
    864 cites at Google Scholar
    554% above average of year
    Last visited: Nov-2017
  4. 4
    Niels Provos:
    Defending Against Statistical Steganalysis.
    USENIX Security Symposium, 2001
    745 cites at Google Scholar
    464% above average of year
    Last visited: Oct-2017
  5. 5
    Phillip Rogaway, Mihir Bellare, John Black, Ted Krovetz:
    OCB: a block-cipher mode of operation for efficient authenticated encryption.
    ACM Conference on Computer and Communications Security (CCS), 2001
    712 cites at Google Scholar
    439% above average of year
    Last visited: Nov-2017
  6. 6
    R. Sekar, M. Bendre, D. Dhurjati, P. Bollineni:
    A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors.
    IEEE Symposium on Security and Privacy, 2001
    701 cites at Google Scholar
    431% above average of year
    Last visited: Nov-2017
  7. 7
    Drew Dean, Matthew K. Franklin, Adam Stubblefield:
    An Algebraic Approach to IP Traceback.
    Network and Distributed System Security Symposium (NDSS), 2001
    625 cites at Google Scholar
    373% above average of year
    Last visited: Nov-2017
  8. 8
    Mark Handley, Vern Paxson, Christian Kreibich:
    Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics.
    USENIX Security Symposium, 2001
    543 cites at Google Scholar
    311% above average of year
    Last visited: Nov-2017
  9. 9
    C. Andrew Neff:
    A verifiable secret shuffle and its application to e-voting.
    ACM Conference on Computer and Communications Security (CCS), 2001
    535 cites at Google Scholar
    305% above average of year
    Last visited: Nov-2017
  10. 10
    Ninghui Li, William H. Winsborough, John C. Mitchell:
    Distributed credential chain discovery in trust management: extended abstract.
    ACM Conference on Computer and Communications Security (CCS), 2001
    520 cites at Google Scholar
    294% above average of year
    Last visited: Nov-2017

Top-cited papers from 2000 ⌄

  1. 1
    Dawn Xiaodong Song, David Wagner, Adrian Perrig:
    Practical Techniques for Searches on Encrypted Data.
    IEEE Symposium on Security and Privacy, 2000
    2260 cites at Google Scholar
    2088% above average of year
    Last visited: Nov-2017
  2. 2
    Adrian Perrig, Ran Canetti, J. D. Tygar, Dawn Xiaodong Song:
    Efficient Authentication and Signing of Multicast Streams over Lossy Channels.
    IEEE Symposium on Security and Privacy, 2000
    1161 cites at Google Scholar
    1024% above average of year
    Last visited: Nov-2017
  3. 3
    David Wagner, Jeffrey S. Foster, Eric A. Brewer, Alexander Aiken:
    A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities.
    Network and Distributed System Security Symposium (NDSS), 2000
    891 cites at Google Scholar
    762% above average of year
    Last visited: Nov-2017
  4. 4
    Yongdae Kim, Adrian Perrig, Gene Tsudik:
    Simple and fault-tolerant key agreement for dynamic collaborative groups.
    ACM Conference on Computer and Communications Security (CCS), 2000
    668 cites at Google Scholar
    547% above average of year
    Last visited: Nov-2017
  5. 5
    Robert Stone:
    CenterTrack: An IP Overlay Network for Tracking DoS Floods.
    USENIX Security Symposium, 2000
    663 cites at Google Scholar
    542% above average of year
    Last visited: Sep-2017
  6. 6
    Sotiris Ioannidis, Angelos D. Keromytis, Steven M. Bellovin, Jonathan M. Smith:
    Implementing a distributed firewall.
    ACM Conference on Computer and Communications Security (CCS), 2000
    642 cites at Google Scholar
    521% above average of year
    Last visited: Nov-2017
  7. 7
    Amir Herzberg, Yosi Mass, Joris Mihaeli, Dalit Naor, Yiftach Ravid:
    Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers.
    IEEE Symposium on Security and Privacy, 2000
    528 cites at Google Scholar
    411% above average of year
    Last visited: Nov-2017
  8. 8
    Ronald W. Ritchey, Paul Ammann:
    Using Model Checking to Analyze Network Vulnerabilities.
    IEEE Symposium on Security and Privacy, 2000
    511 cites at Google Scholar
    395% above average of year
    Last visited: Nov-2017
  9. 9
    Yin Zhang, Vern Paxson:
    Detecting Stepping Stones.
    USENIX Security Symposium, 2000
    511 cites at Google Scholar
    395% above average of year
    Last visited: Nov-2017
  10. 10
    Hugo Krawczyk, Tal Rabin:
    Chameleon Signatures.
    Network and Distributed System Security Symposium (NDSS), 2000
    500 cites at Google Scholar
    384% above average of year
    Last visited: Nov-2017