7
Jo Van Bulck, Daniel Moghimi, Michael Schwarz, Moritz Lipp, Marina Minkin, Daniel Genkin, Yuval Yarom, Berk Sunar, Daniel Gruss, and Frank Piessens:
LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection.
IEEE Symposium on Security and Privacy, 2020
820% above average of year
Last visited: Feb-2021
8
Sean Bowe, Alessandro Chiesa, Matthew Green, Ian Miers, Pratyush Mishra, and Howard Wu:
ZEXE: Enabling Decentralized Private Computation.
IEEE Symposium on Security and Privacy, 2020
820% above average of year
Last visited: Feb-2021
9
Tuyet Duong, Lei Fan, Jonathan Katz, Phuc Thai, and Hong-Sheng Zhou:
2-hop Blockchain: Combining Proof-of-Work and Proof-of-Stake Securely.
European Symposium on Research in Computer Security (ESORICS), 2020
728% above average of year
Last visited: Mar-2021
10
Xinyang Zhang, Ningfei Wang, Hua Shen, Shouling Ji, Xiapu Luo, and Ting Wang:
Interpretable Deep Learning under Fire.
USENIX Security Symposium, 2020
599% above average of year
Last visited: Feb-2021