1
Yao Liu, Michael K. Reiter, and Peng Ning:
False data injection attacks against state estimation in electric power grids.
ACM Conference on Computer and Communications Security (CCS), 2009
1654% above average of year
Last visited: Nov-2022
2
Thomas Ristenpart, Eran Tromer, Hovav Shacham, and Stefan Savage:
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds.
ACM Conference on Computer and Communications Security (CCS), 2009
1502% above average of year
Last visited: Oct-2022
3
Arvind Narayanan and Vitaly Shmatikov:
De-anonymizing Social Networks.
IEEE Symposium on Security and Privacy, 2009
846% above average of year
Last visited: Nov-2022
4
C. Christopher Erway, Alptekin Küpçü, Charalampos Papamanthou, and Roberto Tamassia:
Dynamic provable data possession.
ACM Conference on Computer and Communications Security (CCS), 2009
839% above average of year
Last visited: Oct-2022
5
Qian Wang, Cong Wang, Jin Li, Kui Ren, and Wenjing Lou:
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing.
European Symposium on Research in Computer Security (ESORICS), 2009
734% above average of year
Last visited: Oct-2022
6
William Enck, Machigar Ongtang, and Patrick D. McDaniel:
On lightweight mobile phone application certification.
ACM Conference on Computer and Communications Security (CCS), 2009
688% above average of year
Last visited: Nov-2022
7
Kevin D. Bowers, Ari Juels, and Alina Oprea:
HAIL: a high-availability and integrity layer for cloud storage.
ACM Conference on Computer and Communications Security (CCS), 2009
677% above average of year
Last visited: Oct-2022
8
Melissa Chase and Sherman S. M. Chow:
Improving privacy and security in multi-authority attribute-based encryption.
ACM Conference on Computer and Communications Security (CCS), 2009
525% above average of year
Last visited: Oct-2022
9
Bennet Yee, David Sehr, Gregory Dardyk, J. Bradley Chen, Robert Muth, Tavis Ormandy, Shiki Okasaka, Neha Narula, and Nicholas Fullagar:
Native Client: A Sandbox for Portable, Untrusted x86 Native Code.
IEEE Symposium on Security and Privacy, 2009
431% above average of year
Last visited: Nov-2022
10
Ulrich Bayer, Paolo Milani Comparetti, Clemens Hlauschek, Christopher Krügel, and Engin Kirda:
Scalable, Behavior-Based Malware Clustering.
Network and Distributed System Security Symposium (NDSS), 2009
417% above average of year
Last visited: Oct-2022
Top-cited papers from 2008 ⌄
-
1
Arvind Narayanan and Vitaly Shmatikov:
Robust De-anonymization of Large Sparse Datasets.
IEEE Symposium on Security and Privacy, 2008
1673% above average of year
Last visited: Oct-2022
-
2
J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandrino, Ariel J. Feldman, Jacob Appelbaum, and Edward W. Felten:
Lest We Remember: Cold Boot Attacks on Encryption Keys.
USENIX Security Symposium, 2008
948% above average of year
Last visited: Nov-2022
-
3
Patrice Godefroid, Michael Y. Levin, and David A. Molnar:
Automated Whitebox Fuzz Testing.
Network and Distributed System Security Symposium (NDSS), 2008
890% above average of year
Last visited: Nov-2022
-
4
Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee:
BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection.
USENIX Security Symposium, 2008
882% above average of year
Last visited: Oct-2022
-
5
Guofei Gu, Junjie Zhang, and Wenke Lee:
BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic.
Network and Distributed System Security Symposium (NDSS), 2008
646% above average of year
Last visited: Oct-2022
-
6
Artem Dinaburg, Paul Royal, Monirul I. Sharif, and Wenke Lee:
Ether: malware analysis via hardware virtualization extensions.
ACM Conference on Computer and Communications Security (CCS), 2008
531% above average of year
Last visited: Nov-2022
-
7
Haifeng Yu, Phillip B. Gibbons, Michael Kaminsky, and Feng Xiao:
SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks.
IEEE Symposium on Security and Privacy, 2008
489% above average of year
Last visited: Nov-2022
-
8
Ben Adida:
Helios: Web-based Open-Audit Voting.
USENIX Security Symposium, 2008
477% above average of year
Last visited: Oct-2022
-
9
Daniel Halperin, Thomas S. Heydt-Benjamin, Benjamin Ransford, Shane S. Clark, Benessa Defend, Will Morgan, Kevin Fu, Tadayoshi Kohno, and William H. Maisel:
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses.
IEEE Symposium on Security and Privacy, 2008
466% above average of year
Last visited: Oct-2022
-
10
Alexandra Boldyreva, Vipul Goyal, and Virendra Kumar:
Identity-based encryption with efficient revocation.
ACM Conference on Computer and Communications Security (CCS), 2008
453% above average of year
Last visited: Nov-2022
Top-cited papers from 2007 ⌄
-
1
John Bethencourt, Amit Sahai, and Brent Waters:
Ciphertext-Policy Attribute-Based Encryption.
IEEE Symposium on Security and Privacy, 2007
2851% above average of year
Last visited: Oct-2022
-
2
Giuseppe Ateniese, Randal C. Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary N. J. Peterson, and Dawn Xiaodong Song:
Provable data possession at untrusted stores.
ACM Conference on Computer and Communications Security (CCS), 2007
1692% above average of year
Last visited: Oct-2022
-
3
Ari Juels and Burton S. Kaliski Jr.:
Pors: proofs of retrievability for large files.
ACM Conference on Computer and Communications Security (CCS), 2007
1199% above average of year
Last visited: Oct-2022
-
4
Hovav Shacham:
The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86).
ACM Conference on Computer and Communications Security (CCS), 2007
776% above average of year
Last visited: Sep-2022
-
5
Rafail Ostrovsky, Amit Sahai, and Brent Waters:
Attribute-based encryption with non-monotonic access structures.
ACM Conference on Computer and Communications Security (CCS), 2007
619% above average of year
Last visited: Nov-2022
-
6
Guofei Gu, Phillip A. Porras, Vinod Yegneswaran, Martin W. Fong, and Wenke Lee:
BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation.
USENIX Security Symposium, 2007
466% above average of year
Last visited: Nov-2022
-
7
Andreas Moser, Christopher Kruegel, and Engin Kirda:
Limits of Static Analysis for Malware Detection.
Annual Computer Security Applications Conference (ACSAC), 2007
442% above average of year
Last visited: Oct-2022
-
8
Ling Cheung and Calvin C. Newport:
Provably secure ciphertext policy ABE.
ACM Conference on Computer and Communications Security (CCS), 2007
430% above average of year
Last visited: Nov-2022
-
9
Heng Yin, Dawn Xiaodong Song, Manuel Egele, Christopher Kruegel, and Engin Kirda:
Panorama: capturing system-wide information flow for malware detection and analysis.
ACM Conference on Computer and Communications Security (CCS), 2007
425% above average of year
Last visited: Nov-2022
-
10
Dakshi Agrawal, Selçuk Baktir, Deniz Karakoyunlu, Pankaj Rohatgi, and Berk Sunar:
Trojan Detection using IC Fingerprinting.
IEEE Symposium on Security and Privacy, 2007
400% above average of year
Last visited: Nov-2022
Top-cited papers from 2006 ⌄
-
1
Vipul Goyal, Omkant Pandey, Amit Sahai, and Brent Waters:
Attribute-based encryption for fine-grained access control of encrypted data.
ACM Conference on Computer and Communications Security (CCS), 2006
3087% above average of year
Last visited: Nov-2022
-
2
Alessandro Acquisti and Ralph Gross:
Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook.
International Symposium on Privacy Enhancing Technologies (PETS), 2006
1471% above average of year
Last visited: Oct-2022
-
3
Reza Curtmola, Juan A. Garay, Seny Kamara, and Rafail Ostrovsky:
Searchable symmetric encryption: improved definitions and efficient constructions.
ACM Conference on Computer and Communications Security (CCS), 2006
1428% above average of year
Last visited: Nov-2022
-
4
Cristian Cadar, Vijay Ganesh, Peter M. Pawlowski, David L. Dill, and Dawson R. Engler:
EXE: automatically generating inputs of death.
ACM Conference on Computer and Communications Security (CCS), 2006
666% above average of year
Last visited: Oct-2022
-
5
Nenad Jovanovic, Christopher Krügel, and Engin Kirda:
Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper).
IEEE Symposium on Security and Privacy, 2006
362% above average of year
Last visited: Nov-2022
-
6
Xinming Ou, Wayne F. Boyer, and Miles A. McQueen:
A scalable approach to attack graph generation.
ACM Conference on Computer and Communications Security (CCS), 2006
305% above average of year
Last visited: Nov-2022
-
7
Stefan Berger, Ramón Cáceres, Kenneth A. Goldman, Ronald Perez, Reiner Sailer, and Leendert van Doorn:
vTPM: Virtualizing the Trusted Platform Module.
USENIX Security Symposium, 2006
297% above average of year
Last visited: Nov-2022
-
8
Matthew Pirretti, Patrick Traynor, Patrick D. McDaniel, and Brent Waters:
Secure attribute-based systems.
ACM Conference on Computer and Communications Security (CCS), 2006
288% above average of year
Last visited: Oct-2022
-
9
Martín Casado, Tal Garfinkel, Aditya Akella, Michael J. Freedman, Dan Boneh, and Nick McKeown:
SANE: A Protection Architecture for Enterprise Networks.
USENIX Security Symposium, 2006
260% above average of year
Last visited: Nov-2022
-
10
Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad Verbowski, Helen J. Wang, and Jacob R. Lorch:
SubVirt: Implementing malware with virtual machines.
IEEE Symposium on Security and Privacy, 2006
246% above average of year
Last visited: Oct-2022
Top-cited papers from 2005 ⌄
-
1
James Newsome and Dawn Xiaodong Song:
Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software.
Network and Distributed System Security Symposium (NDSS), 2005
1161% above average of year
Last visited: Sep-2022
-
2
Martín Abadi, Mihai Budiu, Úlfar Erlingsson, and Jay Ligatti:
Control-flow integrity.
ACM Conference on Computer and Communications Security (CCS), 2005
1160% above average of year
Last visited: Nov-2022
-
3
Giuseppe Ateniese, Kevin Fu, Matthew Green, and Susan Hohenberger:
Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage.
Network and Distributed System Security Symposium (NDSS), 2005
974% above average of year
Last visited: Nov-2022
-
4
James Newsome, Brad Karp, and Dawn Xiaodong Song:
Polygraph: Automatically Generating Signatures for Polymorphic Worms.
IEEE Symposium on Security and Privacy, 2005
574% above average of year
Last visited: Nov-2022
-
5
Mihai Christodorescu, Somesh Jha, Sanjit A. Seshia, Dawn Xiaodong Song, and Randal E. Bryant:
Semantics-Aware Malware Detection.
IEEE Symposium on Security and Privacy, 2005
501% above average of year
Last visited: Oct-2022
-
6
Tadayoshi Kohno, Andre Broido, and Kimberly C. Claffy:
Remote Physical Device Fingerprinting.
IEEE Symposium on Security and Privacy, 2005
459% above average of year
Last visited: Oct-2022
-
7
Bryan Parno, Adrian Perrig, and Virgil D. Gligor:
Distributed Detection of Node Replication Attacks in Sensor Networks.
IEEE Symposium on Security and Privacy, 2005
421% above average of year
Last visited: Oct-2022
-
8
V. Benjamin Livshits and Monica S. Lam:
Finding Security Vulnerabilities in Java Applications with Static Analysis.
USENIX Security Symposium, 2005
370% above average of year
Last visited: Nov-2022
-
9
Steven J. Murdoch and George Danezis:
Low-Cost Traffic Analysis of Tor.
IEEE Symposium on Security and Privacy, 2005
349% above average of year
Last visited: Oct-2022
-
10
Xiaoyuan Suo, Ying Zhu, and G. Scott Owen:
Graphical Passwords: A Survey.
Annual Computer Security Applications Conference (ACSAC), 2005
346% above average of year
Last visited: Oct-2022
Top-cited papers from 2004 ⌄
-
1
Roger Dingledine, Nick Mathewson, and Paul F. Syverson:
Tor: The Second-Generation Onion Router.
USENIX Security Symposium, 2004
2354% above average of year
Last visited: Nov-2022
-
2
Reiner Sailer, Xiaolan Zhang, Trent Jaeger, and Leendert van Doorn:
Design and Implementation of a TCG-based Integrity Measurement Architecture.
USENIX Security Symposium, 2004
616% above average of year
Last visited: Nov-2022
-
3
Ernest F. Brickell, Jan Camenisch, and Liqun Chen:
Direct anonymous attestation.
ACM Conference on Computer and Communications Security (CCS), 2004
479% above average of year
Last visited: Nov-2022
-
4
Ke Wang and Salvatore J. Stolfo:
Anomalous Payload-Based Network Intrusion Detection.
International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2004
474% above average of year
Last visited: Nov-2022
-
5
Hyang-Ah Kim and Brad Karp:
Autograph: Toward Automated, Distributed Worm Signature Detection.
USENIX Security Symposium, 2004
469% above average of year
Last visited: Nov-2022
-
6
Hovav Shacham, Matthew Page, Ben Pfaff, Eu-Jin Goh, Nagendra Modadugu, and Dan Boneh:
On the effectiveness of address-space randomization.
ACM Conference on Computer and Communications Security (CCS), 2004
466% above average of year
Last visited: Nov-2022
-
7
Dahlia Malkhi, Noam Nisan, Benny Pinkas, and Yaron Sella:
Fairplay - Secure Two-Party Computation System.
USENIX Security Symposium, 2004
416% above average of year
Last visited: Oct-2022
-
8
David Molnar and David A. Wagner:
Privacy and security in library RFID: issues, practices, and architectures.
ACM Conference on Computer and Communications Security (CCS), 2004
383% above average of year
Last visited: Oct-2022
-
9
Niels Provos:
A Virtual Honeypot Framework.
USENIX Security Symposium, 2004
367% above average of year
Last visited: Nov-2022
-
10
Jaeyeon Jung, Vern Paxson, Arthur W. Berger, and Hari Balakrishnan:
Fast Portscan Detection Using Sequential Hypothesis Testing.
IEEE Symposium on Security and Privacy, 2004
346% above average of year
Last visited: Nov-2022
Top-cited papers from 2003 ⌄
-
1
Haowen Chan, Adrian Perrig, and Dawn Xiaodong Song:
Random Key Predistribution Schemes for Sensor Networks.
IEEE Symposium on Security and Privacy, 2003
1557% above average of year
Last visited: Oct-2022
-
2
Sencun Zhu, Sanjeev Setia, and Sushil Jajodia:
LEAP: efficient security mechanisms for large-scale distributed sensor networks.
ACM Conference on Computer and Communications Security (CCS), 2003
923% above average of year
Last visited: Oct-2022
-
3
Donggang Liu and Peng Ning:
Establishing pairwise keys in distributed sensor networks.
ACM Conference on Computer and Communications Security (CCS), 2003
892% above average of year
Last visited: Oct-2022
-
4
Tal Garfinkel and Mendel Rosenblum:
A Virtual Machine Introspection Based Architecture for Intrusion Detection.
Network and Distributed System Security Symposium (NDSS), 2003
734% above average of year
Last visited: Sep-2022
-
5
Ari Juels, Ronald L. Rivest, and Michael Szydlo:
The blocker tag: selective blocking of RFID tags for consumer privacy.
ACM Conference on Computer and Communications Security (CCS), 2003
424% above average of year
Last visited: Oct-2022
-
6
David Brumley and Dan Boneh:
Remote Timing Attacks Are Practical.
USENIX Security Symposium, 2003
332% above average of year
Last visited: May-2021
-
7
Mihai Christodorescu and Somesh Jha:
Static Analysis of Executables to Detect Malicious Patterns.
USENIX Security Symposium, 2003
285% above average of year
Last visited: Nov-2022
-
8
John Bellardo and Stefan Savage:
802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions.
USENIX Security Symposium, 2003
280% above average of year
Last visited: Oct-2022
-
9
Cullen Linn and Saumya K. Debray:
Obfuscation of executable code to improve resistance to static disassembly.
ACM Conference on Computer and Communications Security (CCS), 2003
269% above average of year
Last visited: Oct-2022
-
10
Christopher Krügel and Giovanni Vigna:
Anomaly detection of web-based attacks.
ACM Conference on Computer and Communications Security (CCS), 2003
267% above average of year
Last visited: Oct-2022
Top-cited papers from 2002 ⌄
-
1
Laurent Eschenauer and Virgil D. Gligor:
A key-management scheme for distributed sensor networks.
ACM Conference on Computer and Communications Security (CCS), 2002
1989% above average of year
Last visited: Oct-2022
-
2
Blaise Gassend, Dwaine E. Clarke, Marten van Dijk, and Srinivas Devadas:
Silicon physical random functions.
ACM Conference on Computer and Communications Security (CCS), 2002
624% above average of year
Last visited: Oct-2022
-
3
Oleg Sheyner, Joshua W. Haines, Somesh Jha, Richard Lippmann, and Jeannette M. Wing:
Automated Generation and Analysis of Attack Graphs.
IEEE Symposium on Security and Privacy, 2002
592% above average of year
Last visited: Nov-2022
-
4
Stuart Staniford, Vern Paxson, and Nicholas Weaver:
How to Own the Internet in Your Spare Time.
USENIX Security Symposium, 2002
574% above average of year
Last visited: Nov-2022
-
5
Cliff Changchun Zou, Weibo Gong, and Donald F. Towsley:
Code red worm propagation modeling and analysis.
ACM Conference on Computer and Communications Security (CCS), 2002
375% above average of year
Last visited: Nov-2022
-
6
Frédéric Cuppens and Alexandre Miège:
Alert Correlation in a Cooperative Intrusion Detection Framework.
IEEE Symposium on Security and Privacy, 2002
346% above average of year
Last visited: Oct-2022
-
7
Paul Ammann, Duminda Wijesekera, and Saket Kaushik:
Scalable, graph-based network vulnerability analysis.
ACM Conference on Computer and Communications Security (CCS), 2002
334% above average of year
Last visited: Nov-2022
-
8
Ninghui Li, John C. Mitchell, and William H. Winsborough:
Design of a Role-Based Trust-Management Framework.
IEEE Symposium on Security and Privacy, 2002
324% above average of year
Last visited: Oct-2022
-
9
Michael J. Freedman and Robert Tappan Morris:
Tarzan: a peer-to-peer anonymizing network layer.
ACM Conference on Computer and Communications Security (CCS), 2002
311% above average of year
Last visited: Nov-2022
-
10
Andrei Serjantov and George Danezis:
Towards an Information Theoretic Metric for Anonymity.
International Symposium on Privacy Enhancing Technologies (PETS), 2002
298% above average of year
Last visited: Oct-2022
Top-cited papers from 2001 ⌄
-
1
David Moore, Geoffrey M. Voelker, and Stefan Savage:
Inferring Internet Denial-of-Service Activity.
USENIX Security Symposium, 2001
878% above average of year
Last visited: Oct-2022
-
2
Matthew G. Schultz, Eleazar Eskin, Erez Zadok, and Salvatore J. Stolfo:
Data Mining Methods for Detection of New Malicious Executables.
IEEE Symposium on Security and Privacy, 2001
576% above average of year
Last visited: Nov-2022
-
3
Bruno Blanchet:
An Efficient Cryptographic Protocol Verifier Based on Prolog Rules.
IEEE Computer Security Foundations Symposium (CSF), 2001
534% above average of year
Last visited: Oct-2022
-
4
Ross J. Anderson:
Why Information Security is Hard-An Economic Perspective.
Annual Computer Security Applications Conference (ACSAC), 2001
446% above average of year
Last visited: Nov-2022
-
5
Alfonso Valdes and Keith Skinner:
Probabilistic Alert Correlation.
International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2001
411% above average of year
Last visited: Nov-2022
-
6
David A. Wagner and Drew Dean:
Intrusion Detection via Static Analysis.
IEEE Symposium on Security and Privacy, 2001
379% above average of year
Last visited: Oct-2022
-
7
Hervé Debar and Andreas Wespi:
Aggregation and Correlation of Intrusion-Detection Alerts.
International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2001
346% above average of year
Last visited: Nov-2022
-
8
Phillip Rogaway, Mihir Bellare, John Black, and Ted Krovetz:
OCB: a block-cipher mode of operation for efficient authenticated encryption.
ACM Conference on Computer and Communications Security (CCS), 2001
336% above average of year
Last visited: Nov-2022
-
9
Adrian Perrig, Ran Canetti, Dawn Xiaodong Song, and J. D. Tygar:
Efficient and Secure Source Authentication for Multicast.
Network and Distributed System Security Symposium (NDSS), 2001
332% above average of year
Last visited: Nov-2022
-
10
Niels Provos:
Defending Against Statistical Steganalysis.
USENIX Security Symposium, 2001
327% above average of year
Last visited: Nov-2022
Top-cited papers from 2000 ⌄
-
1
Dawn Xiaodong Song, David A. Wagner, and Adrian Perrig:
Practical Techniques for Searches on Encrypted Data.
IEEE Symposium on Security and Privacy, 2000
2531% above average of year
Last visited: Sep-2022
-
2
Adrian Perrig, Ran Canetti, J. D. Tygar, and Dawn Xiaodong Song:
Efficient Authentication and Signing of Multicast Streams over Lossy Channels.
IEEE Symposium on Security and Privacy, 2000
733% above average of year
Last visited: Nov-2022
-
3
Richard Lippmann, Joshua W. Haines, David J. Fried, Jonathan Korba, and Kumar Das:
Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation.
International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2000
723% above average of year
Last visited: Nov-2022
-
4
Rachna Dhamija and Adrian Perrig:
Deja Vu-A User Study: Using Images for Authentication.
USENIX Security Symposium, 2000
652% above average of year
Last visited: Nov-2022
-
5
David A. Wagner, Jeffrey S. Foster, Eric A. Brewer, and Alexander Aiken:
A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities.
Network and Distributed System Security Symposium (NDSS), 2000
535% above average of year
Last visited: Nov-2022
-
6
Sotiris Ioannidis, Angelos D. Keromytis, Steven M. Bellovin, and Jonathan M. Smith:
Implementing a distributed firewall.
ACM Conference on Computer and Communications Security (CCS), 2000
456% above average of year
Last visited: Oct-2022
-
7
Yongdae Kim, Adrian Perrig, and Gene Tsudik:
Simple and fault-tolerant key agreement for dynamic collaborative groups.
ACM Conference on Computer and Communications Security (CCS), 2000
343% above average of year
Last visited: Nov-2022
-
8
Robert Stone:
CenterTrack: An IP Overlay Network for Tracking DoS Floods.
USENIX Security Symposium, 2000
327% above average of year
Last visited: Nov-2022
-
9
Ronald W. Ritchey and Paul Ammann:
Using Model Checking to Analyze Network Vulnerabilities.
IEEE Symposium on Security and Privacy, 2000
291% above average of year
Last visited: Nov-2022
-
10
Yin Zhang and Vern Paxson:
Detecting Stepping Stones.
USENIX Security Symposium, 2000
276% above average of year
Last visited: Nov-2022