Security Papers from the 2020s

This webpage is an attempt to assemble a ranking of top-cited security papers from the 2020s. The ranking has been created based on citations of papers published at top security conferences. More details are available here.

Top-cited papers from 2020 ⌄

  1. 1
    Harry A. Kalodner, Malte Möser, Kevin Lee, Steven Goldfeder, Martin Plattner, Alishah Chator, and Arvind Narayanan:
    BlockSci: Design and applications of a blockchain analysis platform.
    USENIX Security Symposium, 2020
    88 cites at Google Scholar
    1518% above average of year
    Last visited: Feb-2021
    Paper: DOI
  2. 2
    Jianbo Chen, Michael I. Jordan, and Martin J. Wainwright:
    HopSkipJumpAttack: A Query-Efficient Decision-Based Attack.
    IEEE Symposium on Security and Privacy, 2020
    76 cites at Google Scholar
    1298% above average of year
    Last visited: Feb-2021
    Paper: DOI
  3. 3
    Minghong Fang, Xiaoyu Cao, Jinyuan Jia, and Neil Zhenqiang Gong:
    Local Model Poisoning Attacks to Byzantine-Robust Federated Learning.
    USENIX Security Symposium, 2020
    62 cites at Google Scholar
    1040% above average of year
    Last visited: Feb-2021
    Paper: DOI
  4. 4
    Mengjia Yan, Christopher W. Fletcher, and Josep Torrellas:
    Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN Architectures.
    USENIX Security Symposium, 2020
    59 cites at Google Scholar
    985% above average of year
    Last visited: Feb-2021
    Paper: DOI
  5. 5
    Kit Murdock, David Oswald, Flavio D. Garcia, Jo Van Bulck, Daniel Gruss, and Frank Piessens:
    Plundervolt: Software-based Fault Injection Attacks against Intel SGX.
    IEEE Symposium on Security and Privacy, 2020
    55 cites at Google Scholar
    911% above average of year
    Last visited: Feb-2021
    Paper: DOI
  6. 6
    Anton Permenev, Dimitar Dimitrov, Petar Tsankov, Dana Drachsler-Cohen, and Martin T. Vechev:
    VerX: Safety Verification of Smart Contracts.
    IEEE Symposium on Security and Privacy, 2020
    51 cites at Google Scholar
    838% above average of year
    Last visited: Feb-2021
    Paper: DOI
  7. 7
    Jo Van Bulck, Daniel Moghimi, Michael Schwarz, Moritz Lipp, Marina Minkin, Daniel Genkin, Yuval Yarom, Berk Sunar, Daniel Gruss, and Frank Piessens:
    LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection.
    IEEE Symposium on Security and Privacy, 2020
    50 cites at Google Scholar
    820% above average of year
    Last visited: Feb-2021
    Paper: DOI
  8. 8
    Sean Bowe, Alessandro Chiesa, Matthew Green, Ian Miers, Pratyush Mishra, and Howard Wu:
    ZEXE: Enabling Decentralized Private Computation.
    IEEE Symposium on Security and Privacy, 2020
    50 cites at Google Scholar
    820% above average of year
    Last visited: Feb-2021
    Paper: DOI
  9. 9
    Tuyet Duong, Lei Fan, Jonathan Katz, Phuc Thai, and Hong-Sheng Zhou:
    2-hop Blockchain: Combining Proof-of-Work and Proof-of-Stake Securely.
    European Symposium on Research in Computer Security (ESORICS), 2020
    45 cites at Google Scholar
    728% above average of year
    Last visited: Mar-2021
    Paper: DOI
  10. 10
    Xinyang Zhang, Ningfei Wang, Hua Shen, Shouling Ji, Xiapu Luo, and Ting Wang:
    Interpretable Deep Learning under Fire.
    USENIX Security Symposium, 2020
    38 cites at Google Scholar
    599% above average of year
    Last visited: Feb-2021
    Paper: DOI