Top-Cited Security Papers

This webpage is an attempt to assemble a ranking of top-cited papers from the area of computer security. The ranking has been created based on citations of papers published at top security conferences. More details are available here.

Top 100 papers from 1981 to 2017 ⌄

  1. 1
    Mihir Bellare, Phillip Rogaway:
    Random Oracles are Practical: A Paradigm for Designing Efficient Protocols.
    ACM Conference on Computer and Communications Security (CCS), 1993
    4572 cites at Google Scholar
    4674% above average of year
    Last visited: Nov-2017
  2. 2
    Dorothy E. Denning:
    An Intrusion-Detection Model.
    IEEE Symposium on Security and Privacy, 1986
    4376 cites at Google Scholar
    1715% above average of year
    Last visited: Aug-2017
  3. 3
    Haowen Chan, Adrian Perrig, Dawn Xiaodong Song:
    Random Key Predistribution Schemes for Sensor Networks.
    IEEE Symposium on Security and Privacy, 2003
    3696 cites at Google Scholar
    2144% above average of year
    Last visited: Nov-2017
  4. 4
    Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Waters:
    Attribute-based encryption for fine-grained access control of encrypted data.
    ACM Conference on Computer and Communications Security (CCS), 2006
    3628 cites at Google Scholar
    3861% above average of year
    Last visited: Nov-2017
  5. 5
    Giuseppe Ateniese, Randal C. Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary N. J. Peterson, Dawn Xiaodong Song:
    Provable data possession at untrusted stores.
    ACM Conference on Computer and Communications Security (CCS), 2007
    2292 cites at Google Scholar
    2178% above average of year
    Last visited: Sep-2017
  6. 6
    Dawn Xiaodong Song, David Wagner, Adrian Perrig:
    Practical Techniques for Searches on Encrypted Data.
    IEEE Symposium on Security and Privacy, 2000
    2260 cites at Google Scholar
    2088% above average of year
    Last visited: Nov-2017
  7. 7
    Joseph A. Goguen, José Meseguer:
    Security Policies and Security Models.
    IEEE Symposium on Security and Privacy, 1982
    2249 cites at Google Scholar
    1474% above average of year
    Last visited: Nov-2017
  8. 8
    Donggang Liu, Peng Ning:
    Establishing pairwise keys in distributed sensor networks.
    ACM Conference on Computer and Communications Security (CCS), 2003
    2248 cites at Google Scholar
    1265% above average of year
    Last visited: Nov-2017
  9. 9
    Sencun Zhu, Sanjeev Setia, Sushil Jajodia:
    LEAP: efficient security mechanisms for large-scale distributed sensor networks.
    ACM Conference on Computer and Communications Security (CCS), 2003
    2185 cites at Google Scholar
    1226% above average of year
    Last visited: Sep-2017
  10. 10
    Ian T. Foster, Carl Kesselman, Gene Tsudik, Steven Tuecke:
    A Security Architecture for Computational Grids.
    ACM Conference on Computer and Communications Security (CCS), 1998
    1863 cites at Google Scholar
    1349% above average of year
    Last visited: Nov-2017
  11. 11
    David Moore, Geoffrey M. Voelker, Stefan Savage:
    Inferring Internet Denial-of-Service Activity.
    USENIX Security Symposium, 2001
    1798 cites at Google Scholar
    1261% above average of year
    Last visited: Oct-2017
  12. 12
    Thomas Ristenpart, Eran Tromer, Hovav Shacham, Stefan Savage:
    Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds.
    ACM Conference on Computer and Communications Security (CCS), 2009
    1797 cites at Google Scholar
    1871% above average of year
    Last visited: Oct-2017
  13. 13
    D. D. Clark, D. R. Wilson:
    A Comparison of Commercial and Military Computer Security Policies.
    IEEE Symposium on Security and Privacy, 1987
    1712 cites at Google Scholar
    1181% above average of year
    Last visited: Nov-2017
  14. 14
    Steven M. Bellovin, Michael Merritt:
    Encrypted key exchange: password-based protocols secure against dictionary attacks.
    IEEE Symposium on Security and Privacy, 1992
    1709 cites at Google Scholar
    3308% above average of year
    Last visited: Nov-2017
  15. 15
    Ari Juels, Burton S. Kaliski Jr.:
    Pors: proofs of retrievability for large files.
    ACM Conference on Computer and Communications Security (CCS), 2007
    1694 cites at Google Scholar
    1584% above average of year
    Last visited: Oct-2017
  16. 16
    Wenke Lee, Salvatore J. Stolfo:
    Data Mining Approaches for Intrusion Detection.
    USENIX Security Symposium, 1998
    1689 cites at Google Scholar
    1214% above average of year
    Last visited: Oct-2017
  17. 17
    Crispan Cowan:
    StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks.
    USENIX Security Symposium, 1998
    1655 cites at Google Scholar
    1187% above average of year
    Last visited: Sep-2017
  18. 18
    Wenke Lee, Salvatore J. Stolfo, Kui W. Mok:
    A Data Mining Framework for Building Intrusion Detection Models.
    IEEE Symposium on Security and Privacy, 1999
    1614 cites at Google Scholar
    1295% above average of year
    Last visited: Oct-2017
  19. 19
    James Newsome, Dawn Xiaodong Song:
    Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software.
    Network and Distributed System Security Symposium (NDSS), 2005
    1480 cites at Google Scholar
    1268% above average of year
    Last visited: Sep-2017
  20. 20
    Ari Juels, Martin Wattenberg:
    A Fuzzy Commitment Scheme.
    ACM Conference on Computer and Communications Security (CCS), 1999
    1475 cites at Google Scholar
    1175% above average of year
    Last visited: Nov-2017
  21. 21
    Yajin Zhou, Xuxian Jiang:
    Dissecting Android Malware: Characterization and Evolution.
    IEEE Symposium on Security and Privacy, 2012
    1441 cites at Google Scholar
    2486% above average of year
    Last visited: Nov-2017
  22. 22
    Christina Warrender, Stephanie Forrest, Barak A. Pearlmutter:
    Detecting Intrusions using System Calls: Alternative Data Models.
    IEEE Symposium on Security and Privacy, 1999
    1419 cites at Google Scholar
    1127% above average of year
    Last visited: Oct-2017
  23. 23
    Reza Curtmola, Juan A. Garay, Seny Kamara, Rafail Ostrovsky:
    Searchable symmetric encryption: improved definitions and efficient constructions.
    ACM Conference on Computer and Communications Security (CCS), 2006
    1372 cites at Google Scholar
    1398% above average of year
    Last visited: Oct-2017
  24. 24
    Michael K. Reiter, Matthew K. Franklin, John B. Lacy, Rebecca N. Wright:
    The Omega Key Management Service.
    ACM Conference on Computer and Communications Security (CCS), 1996
    1334 cites at Google Scholar
    1654% above average of year
    Last visited: Sep-2016
  25. 25
    D. F. C. Brewer, Michael J. Nash:
    The Chinese Wall Security Policy.
    IEEE Symposium on Security and Privacy, 1989
    1290 cites at Google Scholar
    3765% above average of year
    Last visited: Nov-2017
  26. 26
    Oleg Sheyner, Joshua W. Haines, Somesh Jha, Richard Lippmann, Jeannette M. Wing:
    Automated Generation and Analysis of Attack Graphs.
    IEEE Symposium on Security and Privacy, 2002
    1267 cites at Google Scholar
    710% above average of year
    Last visited: Nov-2017
  27. 27
    Reiner Sailer, Xiaolan Zhang, Trent Jaeger, Leendert van Doorn:
    Design and Implementation of a TCG-based Integrity Measurement Architecture.
    USENIX Security Symposium, 2004
    1258 cites at Google Scholar
    884% above average of year
    Last visited: Nov-2017
  28. 28
    Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan Hohenberger:
    Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage.
    Network and Distributed System Security Symposium (NDSS), 2005
    1233 cites at Google Scholar
    1040% above average of year
    Last visited: Nov-2017
  29. 29
    Adrienne Porter Felt, Erika Chin, Steve Hanna, Dawn Song, David Wagner:
    Android permissions demystified.
    ACM Conference on Computer and Communications Security (CCS), 2011
    1188 cites at Google Scholar
    1835% above average of year
    Last visited: Nov-2017
  30. 30
    Ari Juels, Ronald L. Rivest, Michael Szydlo:
    The blocker tag: selective blocking of RFID tags for consumer privacy.
    ACM Conference on Computer and Communications Security (CCS), 2003
    1179 cites at Google Scholar
    616% above average of year
    Last visited: Sep-2017
  31. 31
    Yao Liu, Michael K. Reiter, Peng Ning:
    False data injection attacks against state estimation in electric power grids.
    ACM Conference on Computer and Communications Security (CCS), 2009
    1168 cites at Google Scholar
    1181% above average of year
    Last visited: Oct-2017
  32. 32
    Adrian Perrig, Ran Canetti, J. D. Tygar, Dawn Xiaodong Song:
    Efficient Authentication and Signing of Multicast Streams over Lossy Channels.
    IEEE Symposium on Security and Privacy, 2000
    1161 cites at Google Scholar
    1024% above average of year
    Last visited: Nov-2017
  33. 33
    Thomas Beth, Malte Borcherding, Birgit Klein:
    Valuation of Trust in Open Networks.
    European Symposium on Research in Computer Security (ESORICS), 1994
    1132 cites at Google Scholar
    2125% above average of year
    Last visited: Sep-2017
  34. 34
    Blaise Gassend, Dwaine E. Clarke, Marten van Dijk, Srinivas Devadas:
    Silicon physical random functions.
    ACM Conference on Computer and Communications Security (CCS), 2002
    1104 cites at Google Scholar
    606% above average of year
    Last visited: Oct-2017
  35. 35
    Masahiro Mambo, Keisuke Usuda, Eiji Okamoto:
    Proxy Signatures for Delegating Signing Operation.
    ACM Conference on Computer and Communications Security (CCS), 1996
    1091 cites at Google Scholar
    1335% above average of year
    Last visited: Aug-2017
  36. 36
    Qian Wang, Cong Wang, Jin Li, Kui Ren, Wenjing Lou:
    Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing.
    European Symposium on Research in Computer Security (ESORICS), 2009
    1091 cites at Google Scholar
    1097% above average of year
    Last visited: Nov-2017
  37. 37
    J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandrino, Ariel J. Feldman, Jacob Appelbaum, Edward W. Felten:
    Lest We Remember: Cold Boot Attacks on Encryption Keys.
    USENIX Security Symposium, 2008
    1046 cites at Google Scholar
    1374% above average of year
    Last visited: Nov-2017
  38. 38
    Cliff Changchun Zou, Weibo Gong, Donald F. Towsley:
    Code red worm propagation modeling and analysis.
    ACM Conference on Computer and Communications Security (CCS), 2002
    1037 cites at Google Scholar
    563% above average of year
    Last visited: Oct-2017
  39. 39
    Kevin D. Bowers, Ari Juels, Alina Oprea:
    HAIL: a high-availability and integrity layer for cloud storage.
    ACM Conference on Computer and Communications Security (CCS), 2009
    1036 cites at Google Scholar
    1036% above average of year
    Last visited: Sep-2017
  40. 40
    Guofei Gu, Roberto Perdisci, Junjie Zhang, Wenke Lee:
    BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection.
    USENIX Security Symposium, 2008
    1020 cites at Google Scholar
    1337% above average of year
    Last visited: Oct-2017
  41. 41
    Ninghui Li, John C. Mitchell, William H. Winsborough:
    Design of a Role-Based Trust-Management Framework.
    IEEE Symposium on Security and Privacy, 2002
    1004 cites at Google Scholar
    542% above average of year
    Last visited: Oct-2017
  42. 42
    Cristian Cadar, Vijay Ganesh, Peter M. Pawlowski, David L. Dill, Dawson R. Engler:
    EXE: automatically generating inputs of death.
    ACM Conference on Computer and Communications Security (CCS), 2006
    1003 cites at Google Scholar
    995% above average of year
    Last visited: Oct-2017
  43. 43
    C. Christopher Erway, Alptekin Küpçü, Charalampos Papamanthou, Roberto Tamassia:
    Dynamic provable data possession.
    ACM Conference on Computer and Communications Security (CCS), 2009
    1000 cites at Google Scholar
    997% above average of year
    Last visited: Sep-2017
  44. 44
    Michael Steiner, Gene Tsudik, Michael Waidner:
    Diffie-Hellman Key Distribution Extended to Group Communication.
    ACM Conference on Computer and Communications Security (CCS), 1996
    952 cites at Google Scholar
    1152% above average of year
    Last visited: Nov-2017
  45. 45
    Frédéric Cuppens, Alexandre Miège:
    Alert Correlation in a Cooperative Intrusion Detection Framework.
    IEEE Symposium on Security and Privacy, 2002
    941 cites at Google Scholar
    502% above average of year
    Last visited: Sep-2017
  46. 46
    Alfonso Valdes, Keith Skinner:
    Probabilistic Alert Correlation.
    International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2001
    936 cites at Google Scholar
    608% above average of year
    Last visited: Nov-2017
  47. 47
    Patrice Godefroid, Michael Y. Levin, David A. Molnar:
    Automated Whitebox Fuzz Testing.
    Network and Distributed System Security Symposium (NDSS), 2008
    929 cites at Google Scholar
    1209% above average of year
    Last visited: Oct-2017
  48. 48
    Hyang-Ah Kim, Brad Karp:
    Autograph: Toward Automated, Distributed Worm Signature Detection.
    USENIX Security Symposium, 2004
    928 cites at Google Scholar
    626% above average of year
    Last visited: Sep-2017
  49. 49
    Ernest F. Brickell, Jan Camenisch, Liqun Chen:
    Direct anonymous attestation.
    ACM Conference on Computer and Communications Security (CCS), 2004
    926 cites at Google Scholar
    625% above average of year
    Last visited: Nov-2017
  50. 50
    James Newsome, Brad Karp, Dawn Xiaodong Song:
    Polygraph: Automatically Generating Signatures for Polymorphic Worms.
    IEEE Symposium on Security and Privacy, 2005
    925 cites at Google Scholar
    755% above average of year
    Last visited: Nov-2017
  51. 51
    William Enck, Machigar Ongtang, Patrick Drew McDaniel:
    On lightweight mobile phone application certification.
    ACM Conference on Computer and Communications Security (CCS), 2009
    916 cites at Google Scholar
    905% above average of year
    Last visited: Nov-2017
  52. 52
    John F. Canny:
    Collaborative Filtering with Privacy.
    IEEE Symposium on Security and Privacy, 2002
    911 cites at Google Scholar
    483% above average of year
    Last visited: Nov-2017
  53. 53
    William Enck, Damien Octeau, Patrick McDaniel, Swarat Chaudhuri:
    A Study of Android Application Security.
    USENIX Security Symposium, 2011
    908 cites at Google Scholar
    1379% above average of year
    Last visited: Oct-2017
  54. 54
    David Molnar, David Wagner:
    Privacy and security in library RFID: issues, practices, and architectures.
    ACM Conference on Computer and Communications Security (CCS), 2004
    904 cites at Google Scholar
    607% above average of year
    Last visited: Jul-2017
  55. 55
    Hovav Shacham:
    The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86).
    ACM Conference on Computer and Communications Security (CCS), 2007
    895 cites at Google Scholar
    790% above average of year
    Last visited: Oct-2017
  56. 56
    Ke Wang, Salvatore J. Stolfo:
    Anomalous Payload-Based Network Intrusion Detection.
    International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2004
    893 cites at Google Scholar
    599% above average of year
    Last visited: Nov-2017
  57. 57
    David Wagner, Jeffrey S. Foster, Eric A. Brewer, Alexander Aiken:
    A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities.
    Network and Distributed System Security Symposium (NDSS), 2000
    891 cites at Google Scholar
    762% above average of year
    Last visited: Nov-2017
  58. 58
    Martín Abadi, Roger M. Needham:
    Prudent engineering practice for cryptographic protocols.
    IEEE Symposium on Security and Privacy, 1994
    890 cites at Google Scholar
    1650% above average of year
    Last visited: Oct-2017
  59. 59
    Jeffrey O. Kephart, Steve R. White:
    Directed-Graph Epidemiological Models of Computer Viruses.
    IEEE Symposium on Security and Privacy, 1991
    875 cites at Google Scholar
    1210% above average of year
    Last visited: Oct-2017
  60. 60
    Ian Jermyn, Alain J. Mayer, Fabian Monrose, Michael K. Reiter, Aviel D. Rubin:
    The Design and Analysis of Graphical Passwords.
    USENIX Security Symposium, 1999
    875 cites at Google Scholar
    656% above average of year
    Last visited: Sep-2017
  61. 61
    Michael J. Freedman, Robert Morris:
    Tarzan: a peer-to-peer anonymizing network layer.
    ACM Conference on Computer and Communications Security (CCS), 2002
    871 cites at Google Scholar
    457% above average of year
    Last visited: Nov-2017
  62. 62
    Ross J. Anderson:
    Why Information Security is Hard-An Economic Perspective.
    Annual Computer Security Applications Conference (ACSAC), 2001
    864 cites at Google Scholar
    554% above average of year
    Last visited: Nov-2017
  63. 63
    Martín Abadi, Mihai Budiu, Úlfar Erlingsson, Jay Ligatti:
    Control-flow integrity.
    ACM Conference on Computer and Communications Security (CCS), 2005
    861 cites at Google Scholar
    696% above average of year
    Last visited: Oct-2017
  64. 64
    Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati, Fabio Violante:
    A reputation-based approach for choosing reliable resources in peer-to-peer networks.
    ACM Conference on Computer and Communications Security (CCS), 2002
    853 cites at Google Scholar
    445% above average of year
    Last visited: Aug-2017
  65. 65
    Hovav Shacham, Matthew Page, Ben Pfaff, Eu-Jin Goh, Nagendra Modadugu, Dan Boneh:
    On the effectiveness of address-space randomization.
    ACM Conference on Computer and Communications Security (CCS), 2004
    837 cites at Google Scholar
    555% above average of year
    Last visited: Nov-2017
  66. 66
    Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage:
    Experimental Security Analysis of a Modern Automobile.
    IEEE Symposium on Security and Privacy, 2010
    834 cites at Google Scholar
    1234% above average of year
    Last visited: Nov-2017
  67. 67
    Li Gong, Roger M. Needham, Raphael Yahalom:
    Reasoning about Belief in Cryptographic Protocols.
    IEEE Symposium on Security and Privacy, 1990
    833 cites at Google Scholar
    1489% above average of year
    Last visited: Nov-2017
  68. 68
    Jaeyeon Jung, Vern Paxson, Arthur W. Berger, Hari Balakrishnan:
    Fast Portscan Detection Using Sequential Hypothesis Testing.
    IEEE Symposium on Security and Privacy, 2004
    805 cites at Google Scholar
    530% above average of year
    Last visited: Nov-2017
  69. 69
    Paul Ammann, Duminda Wijesekera, Saket Kaushik:
    Scalable, graph-based network vulnerability analysis.
    ACM Conference on Computer and Communications Security (CCS), 2002
    803 cites at Google Scholar
    414% above average of year
    Last visited: Nov-2017
  70. 70
    J. S. Balasubramaniyan, J. O. Garcia-Fernandez, D. Isacoff, Eugene H. Spafford, Diego Zamboni:
    An Architecture for Intrusion Detection Using Autonomous Agents.
    Annual Computer Security Applications Conference (ACSAC), 1998
    773 cites at Google Scholar
    501% above average of year
    Last visited: Nov-2017
  71. 71
    John Ioannidis, Steven M. Bellovin:
    Implementing Pushback: Router-Based Defense Against DDoS Attacks.
    Network and Distributed System Security Symposium (NDSS), 2002
    767 cites at Google Scholar
    390% above average of year
    Last visited: Oct-2017
  72. 72
    Mihai Christodorescu, Somesh Jha, Sanjit A. Seshia, Dawn Xiaodong Song, Randal E. Bryant:
    Semantics-Aware Malware Detection.
    IEEE Symposium on Security and Privacy, 2005
    761 cites at Google Scholar
    604% above average of year
    Last visited: Oct-2017
  73. 73
    Niels Provos:
    Defending Against Statistical Steganalysis.
    USENIX Security Symposium, 2001
    745 cites at Google Scholar
    464% above average of year
    Last visited: Oct-2017
  74. 74
    Ari Juels, John G. Brainard:
    Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks.
    Network and Distributed System Security Symposium (NDSS), 1999
    742 cites at Google Scholar
    541% above average of year
    Last visited: Aug-2017
  75. 75
    William A. Arbaugh, David J. Farber, Jonathan M. Smith:
    A Secure and Reliable Bootstrap Architecture.
    IEEE Symposium on Security and Privacy, 1997
    742 cites at Google Scholar
    836% above average of year
    Last visited: Oct-2017
  76. 76
    George Danezis, Roger Dingledine, Nick Mathewson:
    Mixminion: Design of a Type III Anonymous Remailer Protocol.
    IEEE Symposium on Security and Privacy, 2003
    740 cites at Google Scholar
    349% above average of year
    Last visited: Oct-2017
  77. 77
    David Wagner, Paolo Soto:
    Mimicry attacks on host-based intrusion detection systems.
    ACM Conference on Computer and Communications Security (CCS), 2002
    739 cites at Google Scholar
    373% above average of year
    Last visited: Nov-2017
  78. 78
    Heng Yin, Dawn Xiaodong Song, Manuel Egele, Christopher Kruegel, Engin Kirda:
    Panorama: capturing system-wide information flow for malware detection and analysis.
    ACM Conference on Computer and Communications Security (CCS), 2007
    733 cites at Google Scholar
    629% above average of year
    Last visited: Sep-2017
  79. 79
    Mihai Christodorescu, Somesh Jha:
    Static Analysis of Executables to Detect Malicious Patterns.
    USENIX Security Symposium, 2003
    725 cites at Google Scholar
    340% above average of year
    Last visited: Nov-2017
  80. 80
    Phillip Rogaway, Mihir Bellare, John Black, Ted Krovetz:
    OCB: a block-cipher mode of operation for efficient authenticated encryption.
    ACM Conference on Computer and Communications Security (CCS), 2001
    712 cites at Google Scholar
    439% above average of year
    Last visited: Nov-2017
  81. 81
    R. Sekar, M. Bendre, D. Dhurjati, P. Bollineni:
    A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors.
    IEEE Symposium on Security and Privacy, 2001
    701 cites at Google Scholar
    431% above average of year
    Last visited: Nov-2017
  82. 82
    F. Javier Thayer, Jonathan C. Herzog, Joshua D. Guttman:
    Strand Spaces: Why is a Security Protocol Correct?
    IEEE Symposium on Security and Privacy, 1998
    700 cites at Google Scholar
    444% above average of year
    Last visited: Oct-2017
  83. 83
    John C. Mitchell, Mark Mitchell, Ulrich Stern:
    Automated analysis of cryptographic protocols using Mur-phi.
    IEEE Symposium on Security and Privacy, 1997
    697 cites at Google Scholar
    779% above average of year
    Last visited: Sep-2017
  84. 84
    Yajin Zhou, Zhi Wang, Wu Zhou, Xuxian Jiang:
    Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets.
    Network and Distributed System Security Symposium (NDSS), 2012
    697 cites at Google Scholar
    1151% above average of year
    Last visited: Oct-2017
  85. 85
    Gene H. Kim, Eugene H. Spafford:
    The Design and Implementation of Tripwire: A File System Integrity Checker.
    ACM Conference on Computer and Communications Security (CCS), 1994
    692 cites at Google Scholar
    1260% above average of year
    Last visited: Oct-2017
  86. 86
    V. Benjamin Livshits, Monica S. Lam:
    Finding Security Vulnerabilities in Java Applications with Static Analysis.
    USENIX Security Symposium, 2005
    683 cites at Google Scholar
    531% above average of year
    Last visited: Sep-2017
  87. 87
    Christopher Krügel, Giovanni Vigna:
    Anomaly detection of web-based attacks.
    ACM Conference on Computer and Communications Security (CCS), 2003
    678 cites at Google Scholar
    312% above average of year
    Last visited: Nov-2017
  88. 88
    Yongdae Kim, Adrian Perrig, Gene Tsudik:
    Simple and fault-tolerant key agreement for dynamic collaborative groups.
    ACM Conference on Computer and Communications Security (CCS), 2000
    668 cites at Google Scholar
    547% above average of year
    Last visited: Nov-2017
  89. 89
    Robert Stone:
    CenterTrack: An IP Overlay Network for Tracking DoS Floods.
    USENIX Security Symposium, 2000
    663 cites at Google Scholar
    542% above average of year
    Last visited: Sep-2017
  90. 90
    Haifeng Yu, Phillip B. Gibbons, Michael Kaminsky, Feng Xiao:
    SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks.
    IEEE Symposium on Security and Privacy, 2008
    657 cites at Google Scholar
    826% above average of year
    Last visited: Nov-2017
  91. 91
    Gaurav S. Kc, Angelos D. Keromytis, Vassilis Prevelakis:
    Countering code-injection attacks with instruction-set randomization.
    ACM Conference on Computer and Communications Security (CCS), 2003
    652 cites at Google Scholar
    296% above average of year
    Last visited: Sep-2017
  92. 92
    Melissa Chase, Sherman S. M. Chow:
    Improving privacy and security in multi-authority attribute-based encryption.
    ACM Conference on Computer and Communications Security (CCS), 2009
    652 cites at Google Scholar
    615% above average of year
    Last visited: Oct-2017
  93. 93
    Vladimir Kiriansky, Derek Bruening, Saman P. Amarasinghe:
    Secure Execution via Program Shepherding.
    USENIX Security Symposium, 2002
    651 cites at Google Scholar
    316% above average of year
    Last visited: Oct-2017
  94. 94
    Ling Cheung, Calvin C. Newport:
    Provably secure ciphertext policy ABE.
    ACM Conference on Computer and Communications Security (CCS), 2007
    649 cites at Google Scholar
    545% above average of year
    Last visited: Aug-2017
  95. 95
    Lingxuan Hu, David Evans:
    Using Directional Antennas to Prevent Wormhole Attacks.
    Network and Distributed System Security Symposium (NDSS), 2004
    642 cites at Google Scholar
    402% above average of year
    Last visited: Oct-2017
  96. 96
    Sotiris Ioannidis, Angelos D. Keromytis, Steven M. Bellovin, Jonathan M. Smith:
    Implementing a distributed firewall.
    ACM Conference on Computer and Communications Security (CCS), 2000
    642 cites at Google Scholar
    521% above average of year
    Last visited: Nov-2017
  97. 97
    Matt Blaze:
    A Cryptographic File System for UNIX.
    ACM Conference on Computer and Communications Security (CCS), 1993
    641 cites at Google Scholar
    569% above average of year
    Last visited: Sep-2017
  98. 98
    Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, Tadayoshi Kohno:
    Comprehensive Experimental Analyses of Automotive Attack Surfaces.
    USENIX Security Symposium, 2011
    639 cites at Google Scholar
    941% above average of year
    Last visited: Oct-2017
  99. 99
    Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna:
    Your botnet is my botnet: analysis of a botnet takeover.
    ACM Conference on Computer and Communications Security (CCS), 2009
    627 cites at Google Scholar
    588% above average of year
    Last visited: Nov-2017
  100. 100
    Thomas D. Wu:
    The Secure Remote Password Protocol.
    Network and Distributed System Security Symposium (NDSS), 1998
    626 cites at Google Scholar
    387% above average of year
    Last visited: Nov-2017