Security Papers from the 2020s

This webpage is an attempt to assemble a ranking of top-cited security papers from the 2020s. The ranking has been created based on citations of papers published at top security conferences. More details are available here.

Top-cited papers from 2020 ⌄

  1. 1
    Harry A. Kalodner, Malte Möser, Kevin Lee, Steven Goldfeder, Martin Plattner, Alishah Chator, and Arvind Narayanan:
    BlockSci: Design and applications of a blockchain analysis platform.
    USENIX Security Symposium, 2020
    73 cites at Google Scholar
    2248% above average of year
    Last visited: Sep-2020
    Paper: DOI
  2. 2
    Mengjia Yan, Christopher W. Fletcher, and Josep Torrellas:
    Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN Architectures.
    USENIX Security Symposium, 2020
    51 cites at Google Scholar
    1541% above average of year
    Last visited: Sep-2020
    Paper: DOI
  3. 3
    Jianbo Chen, Michael I. Jordan, and Martin J. Wainwright:
    HopSkipJumpAttack: A Query-Efficient Decision-Based Attack.
    IEEE Symposium on Security and Privacy, 2020
    43 cites at Google Scholar
    1283% above average of year
    Last visited: Sep-2020
    Paper: DOI
  4. 4
    Tuyet Duong, Lei Fan, Jonathan Katz, Phuc Thai, and Hong-Sheng Zhou:
    2-hop Blockchain: Combining Proof-of-Work and Proof-of-Stake Securely.
    European Symposium on Research in Computer Security (ESORICS), 2020
    41 cites at Google Scholar
    1219% above average of year
    Last visited: Oct-2020
    Paper: DOI
  5. 5
    Sean Bowe, Alessandro Chiesa, Matthew Green, Ian Miers, Pratyush Mishra, and Howard Wu:
    ZEXE: Enabling Decentralized Private Computation.
    IEEE Symposium on Security and Privacy, 2020
    36 cites at Google Scholar
    1058% above average of year
    Last visited: Sep-2020
    Paper: DOI
  6. 6
    Anton Permenev, Dimitar Dimitrov, Petar Tsankov, Dana Drachsler-Cohen, and Martin T. Vechev:
    VerX: Safety Verification of Smart Contracts.
    IEEE Symposium on Security and Privacy, 2020
    32 cites at Google Scholar
    929% above average of year
    Last visited: Sep-2020
    Paper: DOI
  7. 7
    Jo Van Bulck, Daniel Moghimi, Michael Schwarz, Moritz Lipp, Marina Minkin, Daniel Genkin, Yuval Yarom, Berk Sunar, Daniel Gruss, and Frank Piessens:
    LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection.
    IEEE Symposium on Security and Privacy, 2020
    28 cites at Google Scholar
    801% above average of year
    Last visited: Sep-2020
    Paper: DOI
  8. 8
    Marco Guarnieri, Boris Köpf, José F. Morales, Jan Reineke, and Andrés Sánchez:
    Spectector: Principled Detection of Speculative Information Flows.
    IEEE Symposium on Security and Privacy, 2020
    24 cites at Google Scholar
    672% above average of year
    Last visited: Sep-2020
    Paper: DOI
  9. 9
    Minghong Fang, Xiaoyu Cao, Jinyuan Jia, and Neil Zhenqiang Gong:
    Local Model Poisoning Attacks to Byzantine-Robust Federated Learning.
    USENIX Security Symposium, 2020
    24 cites at Google Scholar
    672% above average of year
    Last visited: Sep-2020
    Paper: DOI
  10. 10
    Kit Murdock, David Oswald, Flavio D. Garcia, Jo Van Bulck, Daniel Gruss, and Frank Piessens:
    Plundervolt: Software-based Fault Injection Attacks against Intel SGX.
    IEEE Symposium on Security and Privacy, 2020
    24 cites at Google Scholar
    672% above average of year
    Last visited: Sep-2020
    Paper: DOI