Top-Cited Security Papers

This webpage is an attempt to assemble a ranking of top-cited papers from the area of computer security. The ranking has been created based on citations of papers published at top security conferences. More details are available here.

Absolute citations are not necessarily a good indicator for the impact of a paper, as the number of citations usually grows with the age of a paper. The following list shows an alternative ranking, where the citations are normalized by the age of each paper.

Top 100 papers normalized by age ⌄

  1. 1
    Mihir Bellare, Phillip Rogaway:
    Random Oracles are Practical: A Paradigm for Designing Efficient Protocols.
    ACM Conference on Computer and Communications Security (CCS), 1993
    4669 cites at Google Scholar
    2778% above average of year
    Last visited: Feb-2018
  2. 2
    Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Waters:
    Attribute-based encryption for fine-grained access control of encrypted data.
    ACM Conference on Computer and Communications Security (CCS), 2006
    3653 cites at Google Scholar
    2743% above average of year
    Last visited: Nov-2017
  3. 3
    D. F. C. Brewer, Michael J. Nash:
    The Chinese Wall Security Policy.
    IEEE Symposium on Security and Privacy, 1989
    1301 cites at Google Scholar
    2636% above average of year
    Last visited: Jan-2018
  4. 4
    Nicholas Carlini, David A. Wagner:
    Towards Evaluating the Robustness of Neural Networks.
    IEEE Symposium on Security and Privacy, 2017
    118 cites at Google Scholar
    2076% above average of year
    Last visited: Jan-2018
  5. 5
    Steven M. Bellovin, Michael Merritt:
    Encrypted key exchange: password-based protocols secure against dictionary attacks.
    IEEE Symposium on Security and Privacy, 1992
    1717 cites at Google Scholar
    2067% above average of year
    Last visited: Dec-2017
  6. 6
    John Bethencourt, Amit Sahai, Brent Waters:
    Ciphertext-Policy Attribute-Based Encryption.
    IEEE Symposium on Security and Privacy, 2007
    3377 cites at Google Scholar
    2055% above average of year
    Last visited: Mar-2018
  7. 7
    Matt Blaze, Joan Feigenbaum, Jack Lacy:
    Decentralized Trust Management.
    IEEE Symposium on Security and Privacy, 1996
    2924 cites at Google Scholar
    1911% above average of year
    Last visited: Nov-2017
  8. 8
    Yajin Zhou, Xuxian Jiang:
    Dissecting Android Malware: Characterization and Evolution.
    IEEE Symposium on Security and Privacy, 2012
    1533 cites at Google Scholar
    1870% above average of year
    Last visited: Mar-2018
  9. 9
    Laurent Eschenauer, Virgil D. Gligor:
    A key-management scheme for distributed sensor networks.
    ACM Conference on Computer and Communications Security (CCS), 2002
    4628 cites at Google Scholar
    1869% above average of year
    Last visited: Feb-2018
  10. 10
    Dorothy E. Denning:
    An Intrusion-Detection Model.
    IEEE Symposium on Security and Privacy, 1986
    4559 cites at Google Scholar
    1712% above average of year
    Last visited: Feb-2018
  11. 11
    Martín Abadi, Andrew D. Gordon:
    A Calculus for Cryptographic Protocols: The Spi Calculus.
    ACM Conference on Computer and Communications Security (CCS), 1997
    1891 cites at Google Scholar
    1599% above average of year
    Last visited: Feb-2018
  12. 12
    Dawn Xiaodong Song, David Wagner, Adrian Perrig:
    Practical Techniques for Searches on Encrypted Data.
    IEEE Symposium on Security and Privacy, 2000
    2338 cites at Google Scholar
    1554% above average of year
    Last visited: Dec-2017
  13. 13
    Haowen Chan, Adrian Perrig, Dawn Xiaodong Song:
    Random Key Predistribution Schemes for Sensor Networks.
    IEEE Symposium on Security and Privacy, 2003
    3725 cites at Google Scholar
    1527% above average of year
    Last visited: Feb-2018
  14. 14
    Thomas Beth, Malte Borcherding, Birgit Klein:
    Valuation of Trust in Open Networks.
    European Symposium on Research in Computer Security (ESORICS), 1994
    1145 cites at Google Scholar
    1497% above average of year
    Last visited: Feb-2018
  15. 15
    Giuseppe Ateniese, Randal C. Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary N. J. Peterson, Dawn Xiaodong Song:
    Provable data possession at untrusted stores.
    ACM Conference on Computer and Communications Security (CCS), 2007
    2464 cites at Google Scholar
    1472% above average of year
    Last visited: Mar-2018
  16. 16
    Thomas Ristenpart, Eran Tromer, Hovav Shacham, Stefan Savage:
    Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds.
    ACM Conference on Computer and Communications Security (CCS), 2009
    1889 cites at Google Scholar
    1426% above average of year
    Last visited: Mar-2018
  17. 17
    Adrienne Porter Felt, Erika Chin, Steve Hanna, Dawn Song, David Wagner:
    Android permissions demystified.
    ACM Conference on Computer and Communications Security (CCS), 2011
    1232 cites at Google Scholar
    1321% above average of year
    Last visited: Jan-2018
  18. 18
    Nicolas Papernot, Patrick Drew McDaniel, Xi Wu, Somesh Jha, Ananthram Swami:
    Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks.
    IEEE Symposium on Security and Privacy, 2016
    225 cites at Google Scholar
    1308% above average of year
    Last visited: Apr-2018
  19. 19
    Daniel Arp, Michael Spreitzenbarth, Malte Hubner, Hugo Gascon, Konrad Rieck:
    DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket.
    Network and Distributed System Security Symposium (NDSS), 2014
    564 cites at Google Scholar
    1274% above average of year
    Last visited: Mar-2018
  20. 20
    Joseph A. Goguen, José Meseguer:
    Security Policies and Security Models.
    IEEE Symposium on Security and Privacy, 1982
    2294 cites at Google Scholar
    1225% above average of year
    Last visited: Mar-2018
  21. 21
    Martín Abadi, Roger M. Needham:
    Prudent engineering practice for cryptographic protocols.
    IEEE Symposium on Security and Privacy, 1994
    894 cites at Google Scholar
    1147% above average of year
    Last visited: Feb-2018
  22. 22
    D. D. Clark, D. R. Wilson:
    A Comparison of Commercial and Military Computer Security Policies.
    IEEE Symposium on Security and Privacy, 1987
    1726 cites at Google Scholar
    1136% above average of year
    Last visited: Jan-2018
  23. 23
    Roger M. Needham:
    Denial of Service.
    ACM Conference on Computer and Communications Security (CCS), 1993
    1980 cites at Google Scholar
    1121% above average of year
    Last visited: Mar-2018
  24. 24
    Reza Curtmola, Juan A. Garay, Seny Kamara, Rafail Ostrovsky:
    Searchable symmetric encryption: improved definitions and efficient constructions.
    ACM Conference on Computer and Communications Security (CCS), 2006
    1548 cites at Google Scholar
    1105% above average of year
    Last visited: Mar-2018
  25. 25
    Arvind Narayanan, Vitaly Shmatikov:
    Robust De-anonymization of Large Sparse Datasets.
    IEEE Symposium on Security and Privacy, 2008
    1351 cites at Google Scholar
    1096% above average of year
    Last visited: Dec-2017
  26. 26
    Li Gong, Roger M. Needham, Raphael Yahalom:
    Reasoning about Belief in Cryptographic Protocols.
    IEEE Symposium on Security and Privacy, 1990
    810 cites at Google Scholar
    1075% above average of year
    Last visited: Mar-2018
  27. 27
    Ian T. Foster, Carl Kesselman, Gene Tsudik, Steven Tuecke:
    A Security Architecture for Computational Grids.
    ACM Conference on Computer and Communications Security (CCS), 1998
    1872 cites at Google Scholar
    1061% above average of year
    Last visited: Mar-2018
  28. 28
    Ari Juels, Burton S. Kaliski Jr.:
    Pors: proofs of retrievability for large files.
    ACM Conference on Computer and Communications Security (CCS), 2007
    1795 cites at Google Scholar
    1045% above average of year
    Last visited: Mar-2018
  29. 29
    Nicolas Papernot, Patrick D. McDaniel, Somesh Jha, Matt Fredrikson, Z. Berkay Celik, Ananthram Swami:
    The Limitations of Deep Learning in Adversarial Settings.
    IEEE European Symposium on Security and Privacy, 2016
    183 cites at Google Scholar
    1045% above average of year
    Last visited: Jan-2018
  30. 30
    Ahmed E. Kosba, Andrew Miller, Elaine Shi, Zikai Wen, Charalampos Papamanthou:
    Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts.
    IEEE Symposium on Security and Privacy, 2016
    174 cites at Google Scholar
    988% above average of year
    Last visited: Jan-2018
  31. 31
    William Enck, Damien Octeau, Patrick McDaniel, Swarat Chaudhuri:
    A Study of Android Application Security.
    USENIX Security Symposium, 2011
    923 cites at Google Scholar
    965% above average of year
    Last visited: Nov-2017
  32. 32
    Wenke Lee, Salvatore J. Stolfo:
    Data Mining Approaches for Intrusion Detection.
    USENIX Security Symposium, 1998
    1708 cites at Google Scholar
    959% above average of year
    Last visited: Feb-2018
  33. 33
    Jeffrey O. Kephart, Steve R. White:
    Directed-Graph Epidemiological Models of Computer Viruses.
    IEEE Symposium on Security and Privacy, 1991
    906 cites at Google Scholar
    957% above average of year
    Last visited: Mar-2018
  34. 34
    Crispan Cowan:
    StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks.
    USENIX Security Symposium, 1998
    1700 cites at Google Scholar
    954% above average of year
    Last visited: Apr-2018
  35. 35
    James Newsome, Dawn Xiaodong Song:
    Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software.
    Network and Distributed System Security Symposium (NDSS), 2005
    1536 cites at Google Scholar
    926% above average of year
    Last visited: Apr-2018
  36. 36
    Yao Liu, Michael K. Reiter, Peng Ning:
    False data injection attacks against state estimation in electric power grids.
    ACM Conference on Computer and Communications Security (CCS), 2009
    1261 cites at Google Scholar
    918% above average of year
    Last visited: Mar-2018
  37. 37
    Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage:
    Experimental Security Analysis of a Modern Automobile.
    IEEE Symposium on Security and Privacy, 2010
    862 cites at Google Scholar
    907% above average of year
    Last visited: Feb-2018
  38. 38
    Gene H. Kim, Eugene H. Spafford:
    The Design and Implementation of Tripwire: A File System Integrity Checker.
    ACM Conference on Computer and Communications Security (CCS), 1994
    715 cites at Google Scholar
    897% above average of year
    Last visited: Mar-2018
  39. 39
    Donggang Liu, Peng Ning:
    Establishing pairwise keys in distributed sensor networks.
    ACM Conference on Computer and Communications Security (CCS), 2003
    2281 cites at Google Scholar
    896% above average of year
    Last visited: Mar-2018
  40. 40
    Sangho Lee, Ming-Wei Shih, Prasun Gera, Taesoo Kim, Hyesoon Kim, Marcus Peinado:
    Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing.
    USENIX Security Symposium, 2017
    54 cites at Google Scholar
    896% above average of year
    Last visited: Mar-2018
  41. 41
    Sencun Zhu, Sanjeev Setia, Sushil Jajodia:
    LEAP: efficient security mechanisms for large-scale distributed sensor networks.
    ACM Conference on Computer and Communications Security (CCS), 2003
    2254 cites at Google Scholar
    884% above average of year
    Last visited: Mar-2018
  42. 42
    Wenke Lee, Salvatore J. Stolfo, Kui W. Mok:
    A Data Mining Framework for Building Intrusion Detection Models.
    IEEE Symposium on Security and Privacy, 1999
    1650 cites at Google Scholar
    880% above average of year
    Last visited: Jan-2018
  43. 43
    David Moore, Geoffrey M. Voelker, Stefan Savage:
    Inferring Internet Denial-of-Service Activity.
    USENIX Security Symposium, 2001
    1841 cites at Google Scholar
    875% above average of year
    Last visited: Mar-2018
  44. 44
    J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandrino, Ariel J. Feldman, Jacob Appelbaum, Edward W. Felten:
    Lest We Remember: Cold Boot Attacks on Encryption Keys.
    USENIX Security Symposium, 2008
    1063 cites at Google Scholar
    841% above average of year
    Last visited: Dec-2017
  45. 45
    Guofei Gu, Roberto Perdisci, Junjie Zhang, Wenke Lee:
    BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection.
    USENIX Security Symposium, 2008
    1050 cites at Google Scholar
    829% above average of year
    Last visited: Jan-2018
  46. 46
    Joseph A. Goguen, José Meseguer:
    Unwinding and Inference Control.
    IEEE Symposium on Security and Privacy, 1984
    480 cites at Google Scholar
    826% above average of year
    Last visited: Feb-2018
  47. 47
    Michael K. Reiter, Matthew K. Franklin, John B. Lacy, Rebecca N. Wright:
    The Omega Key Management Service.
    ACM Conference on Computer and Communications Security (CCS), 1996
    1334 cites at Google Scholar
    818% above average of year
    Last visited: Sep-2016
  48. 48
    Yajin Zhou, Zhi Wang, Wu Zhou, Xuxian Jiang:
    Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets.
    Network and Distributed System Security Symposium (NDSS), 2012
    707 cites at Google Scholar
    809% above average of year
    Last visited: Nov-2017
  49. 49
    Reza Shokri, Marco Stronati, Congzheng Song, Vitaly Shmatikov:
    Membership Inference Attacks Against Machine Learning Models.
    IEEE Symposium on Security and Privacy, 2017
    49 cites at Google Scholar
    804% above average of year
    Last visited: Apr-2018
  50. 50
    Erdem Alkim, Léo Ducas, Thomas Pöppelmann, Peter Schwabe:
    Post-quantum Key Exchange - A New Hope.
    USENIX Security Symposium, 2016
    144 cites at Google Scholar
    801% above average of year
    Last visited: Dec-2017
  51. 51
    Ari Juels, Martin Wattenberg:
    A Fuzzy Commitment Scheme.
    ACM Conference on Computer and Communications Security (CCS), 1999
    1506 cites at Google Scholar
    795% above average of year
    Last visited: Feb-2018
  52. 52
    Joseph Bonneau, Andrew Miller, Jeremy Clark, Arvind Narayanan, Joshua A. Kroll, Edward W. Felten:
    SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies.
    IEEE Symposium on Security and Privacy, 2015
    257 cites at Google Scholar
    791% above average of year
    Last visited: Feb-2018
  53. 53
    Qian Wang, Cong Wang, Jin Li, Kui Ren, Wenjing Lou:
    Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing.
    European Symposium on Research in Computer Security (ESORICS), 2009
    1101 cites at Google Scholar
    789% above average of year
    Last visited: Jan-2018
  54. 54
    Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan Hohenberger:
    Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage.
    Network and Distributed System Security Symposium (NDSS), 2005
    1321 cites at Google Scholar
    782% above average of year
    Last visited: Apr-2018
  55. 55
    Hervé Debar, Monique Becker, Didier Siboni:
    A neural network component for an intrusion detection system.
    IEEE Symposium on Security and Privacy, 1992
    695 cites at Google Scholar
    777% above average of year
    Last visited: Apr-2018
  56. 56
    Kevin D. Bowers, Ari Juels, Alina Oprea:
    HAIL: a high-availability and integrity layer for cloud storage.
    ACM Conference on Computer and Communications Security (CCS), 2009
    1075 cites at Google Scholar
    768% above average of year
    Last visited: Dec-2017
  57. 57
    Patrice Godefroid, Michael Y. Levin, David A. Molnar:
    Automated Whitebox Fuzz Testing.
    Network and Distributed System Security Symposium (NDSS), 2008
    962 cites at Google Scholar
    751% above average of year
    Last visited: Jan-2018
  58. 58
    Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, Tadayoshi Kohno:
    Comprehensive Experimental Analyses of Automotive Attack Surfaces.
    USENIX Security Symposium, 2011
    731 cites at Google Scholar
    743% above average of year
    Last visited: Mar-2018
  59. 59
    C. Christopher Erway, Alptekin Küpçü, Charalampos Papamanthou, Roberto Tamassia:
    Dynamic provable data possession.
    ACM Conference on Computer and Communications Security (CCS), 2009
    1040 cites at Google Scholar
    740% above average of year
    Last visited: Mar-2018
  60. 60
    Christina Warrender, Stephanie Forrest, Barak A. Pearlmutter:
    Detecting Intrusions using System Calls: Alternative Data Models.
    IEEE Symposium on Security and Privacy, 1999
    1397 cites at Google Scholar
    730% above average of year
    Last visited: Feb-2018
  61. 61
    Arvind Narayanan, Vitaly Shmatikov:
    De-anonymizing Social Networks.
    IEEE Symposium on Security and Privacy, 2009
    1027 cites at Google Scholar
    729% above average of year
    Last visited: Mar-2018
  62. 62
    Adrian Perrig, Ran Canetti, J. D. Tygar, Dawn Xiaodong Song:
    Efficient Authentication and Signing of Multicast Streams over Lossy Channels.
    IEEE Symposium on Security and Privacy, 2000
    1171 cites at Google Scholar
    728% above average of year
    Last visited: Apr-2018
  63. 63
    Cristian Cadar, Vijay Ganesh, Peter M. Pawlowski, David L. Dill, Dawson R. Engler:
    EXE: automatically generating inputs of death.
    ACM Conference on Computer and Communications Security (CCS), 2006
    1048 cites at Google Scholar
    716% above average of year
    Last visited: Apr-2018
  64. 64
    Eyal Ronen, Adi Shamir, Achi-Or Weingarten, Colin O'Flynn:
    IoT Goes Nuclear: Creating a ZigBee Chain Reaction.
    IEEE Symposium on Security and Privacy, 2017
    44 cites at Google Scholar
    711% above average of year
    Last visited: Feb-2018
  65. 65
    Ming-Wei Shih, Sangho Lee, Taesoo Kim, Marcus Peinado:
    T-SGX: Eradicating Controlled-Channel Attacks Against Enclave Programs.
    Network and Distributed System Security Symposium (NDSS), 2017
    44 cites at Google Scholar
    711% above average of year
    Last visited: Feb-2018
  66. 66
    Martín Abadi, Andy Chu, Ian J. Goodfellow, H. Brendan McMahan, Ilya Mironov, Kunal Talwar, Li Zhang:
    Deep Learning with Differential Privacy.
    ACM Conference on Computer and Communications Security (CCS), 2016
    129 cites at Google Scholar
    707% above average of year
    Last visited: Feb-2018
  67. 67
    L. Todd Herberlein, Gihan V. Dias, Karl N. Levitt, Biswanath Mukherjee, Jeff Wood, David Wolber:
    A Network Security Monitor.
    IEEE Symposium on Security and Privacy, 1990
    544 cites at Google Scholar
    689% above average of year
    Last visited: Dec-2017
  68. 68
    Guofei Gu, Junjie Zhang, Wenke Lee:
    BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic.
    Network and Distributed System Security Symposium (NDSS), 2008
    885 cites at Google Scholar
    683% above average of year
    Last visited: Feb-2018
  69. 69
    Masahiro Mambo, Keisuke Usuda, Eiji Okamoto:
    Proxy Signatures for Delegating Signing Operation.
    ACM Conference on Computer and Communications Security (CCS), 1996
    1130 cites at Google Scholar
    677% above average of year
    Last visited: Mar-2018
  70. 70
    John McLean:
    Security Models and Information Flow.
    IEEE Symposium on Security and Privacy, 1990
    534 cites at Google Scholar
    674% above average of year
    Last visited: Jan-2018
  71. 71
    William Enck, Machigar Ongtang, Patrick Drew McDaniel:
    On lightweight mobile phone application certification.
    ACM Conference on Computer and Communications Security (CCS), 2009
    953 cites at Google Scholar
    670% above average of year
    Last visited: Mar-2018
  72. 72
    Yuval Yarom, Katrina Falkner:
    FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack.
    USENIX Security Symposium, 2014
    306 cites at Google Scholar
    645% above average of year
    Last visited: Feb-2018
  73. 73
    Robin Sommer, Vern Paxson:
    Outside the Closed World: On Using Machine Learning for Network Intrusion Detection.
    IEEE Symposium on Security and Privacy, 2010
    630 cites at Google Scholar
    636% above average of year
    Last visited: Feb-2018
  74. 74
    Reiner Sailer, Xiaolan Zhang, Trent Jaeger, Leendert van Doorn:
    Design and Implementation of a TCG-based Integrity Measurement Architecture.
    USENIX Security Symposium, 2004
    1267 cites at Google Scholar
    627% above average of year
    Last visited: Mar-2018
  75. 75
    Rachna Dhamija, Adrian Perrig:
    Deja Vu-A User Study: Using Images for Authentication.
    USENIX Security Symposium, 2000
    1019 cites at Google Scholar
    621% above average of year
    Last visited: Mar-2018
  76. 76
    Tal Garfinkel, Mendel Rosenblum:
    A Virtual Machine Introspection Based Architecture for Intrusion Detection.
    Network and Distributed System Security Symposium (NDSS), 2003
    1631 cites at Google Scholar
    612% above average of year
    Last visited: Apr-2018
  77. 77
    Emil Stefanov, Marten van Dijk, Elaine Shi, Christopher W. Fletcher, Ling Ren, Xiangyao Yu, Srinivas Devadas:
    Path ORAM: an extremely simple oblivious RAM protocol.
    ACM Conference on Computer and Communications Security (CCS), 2013
    409 cites at Google Scholar
    603% above average of year
    Last visited: Feb-2018
  78. 78
    Sriram Keelveedhi, Mihir Bellare, Thomas Ristenpart:
    DupLESS: Server-Aided Encryption for Deduplicated Storage.
    USENIX Security Symposium, 2013
    400 cites at Google Scholar
    588% above average of year
    Last visited: Mar-2018
  79. 79
    Eli Ben-Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, Madars Virza:
    Zerocash: Decentralized Anonymous Payments from Bitcoin.
    IEEE Symposium on Security and Privacy, 2014
    282 cites at Google Scholar
    587% above average of year
    Last visited: Feb-2018
  80. 80
    Ethan Heilman, Leen Alshenibr, Foteini Baldimtsi, Alessandra Scafuro, Sharon Goldberg:
    TumbleBit: An Untrusted Bitcoin-Compatible Anonymous Payment Hub.
    Network and Distributed System Security Symposium (NDSS), 2017
    37 cites at Google Scholar
    582% above average of year
    Last visited: Apr-2018
  81. 81
    Fangfei Liu, Yuval Yarom, Qian Ge, Gernot Heiser, Ruby B. Lee:
    Last-Level Cache Side-Channel Attacks are Practical.
    IEEE Symposium on Security and Privacy, 2015
    194 cites at Google Scholar
    572% above average of year
    Last visited: Dec-2017
  82. 82
    William A. Arbaugh, David J. Farber, Jonathan M. Smith:
    A Secure and Reliable Bootstrap Architecture.
    IEEE Symposium on Security and Privacy, 1997
    746 cites at Google Scholar
    570% above average of year
    Last visited: Mar-2018
  83. 83
    Michael Steiner, Gene Tsudik, Michael Waidner:
    Diffie-Hellman Key Distribution Extended to Group Communication.
    ACM Conference on Computer and Communications Security (CCS), 1996
    970 cites at Google Scholar
    567% above average of year
    Last visited: Feb-2018
  84. 84
    Stuart Staniford, Vern Paxson, Nicholas Weaver:
    How to Own the Internet in Your Spare Time.
    USENIX Security Symposium, 2002
    1561 cites at Google Scholar
    564% above average of year
    Last visited: Feb-2018
  85. 85
    Lok-Kwong Yan, Heng Yin:
    DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis.
    USENIX Security Symposium, 2012
    508 cites at Google Scholar
    553% above average of year
    Last visited: Jan-2018
  86. 86
    Joseph Bonneau, Cormac Herley, Paul C. van Oorschot, Frank Stajano:
    The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes.
    IEEE Symposium on Security and Privacy, 2012
    507 cites at Google Scholar
    552% above average of year
    Last visited: Feb-2018
  87. 87
    Mark W. Eichin, Jon A. Rochlis:
    With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988.
    IEEE Symposium on Security and Privacy, 1989
    308 cites at Google Scholar
    548% above average of year
    Last visited: Mar-2018
  88. 88
    David Cash, Joseph Jaeger, Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, Michael Steiner:
    Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation.
    Network and Distributed System Security Symposium (NDSS), 2014
    265 cites at Google Scholar
    545% above average of year
    Last visited: Mar-2018
  89. 89
    Yinqian Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart:
    Cross-VM side channels and their use to extract private keys.
    ACM Conference on Computer and Communications Security (CCS), 2012
    501 cites at Google Scholar
    544% above average of year
    Last visited: Jan-2018
  90. 90
    David Wagner, Jeffrey S. Foster, Eric A. Brewer, Alexander Aiken:
    A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities.
    Network and Distributed System Security Symposium (NDSS), 2000
    898 cites at Google Scholar
    535% above average of year
    Last visited: Apr-2018
  91. 91
    Gianluca Stringhini, Christopher Kruegel, Giovanni Vigna:
    Detecting spammers on social networks.
    Annual Computer Security Applications Conference (ACSAC), 2010
    541 cites at Google Scholar
    532% above average of year
    Last visited: Feb-2018
  92. 92
    John C. Mitchell, Mark Mitchell, Ulrich Stern:
    Automated analysis of cryptographic protocols using Mur-phi.
    IEEE Symposium on Security and Privacy, 1997
    702 cites at Google Scholar
    531% above average of year
    Last visited: Apr-2018
  93. 93
    Neal R. Wagner:
    Fingerprinting.
    IEEE Symposium on Security and Privacy, 1983
    260 cites at Google Scholar
    529% above average of year
    Last visited: Feb-2018
  94. 94
    James Newsome, Brad Karp, Dawn Xiaodong Song:
    Polygraph: Automatically Generating Signatures for Polymorphic Worms.
    IEEE Symposium on Security and Privacy, 2005
    941 cites at Google Scholar
    529% above average of year
    Last visited: Jan-2018
  95. 95
    Ben Gras, Kaveh Razavi, Erik Bosman, Herbert Box, Cristiano Giuffrida:
    ASLR on the Line: Practical Cache Attacks on the MMU.
    Network and Distributed System Security Symposium (NDSS), 2017
    34 cites at Google Scholar
    527% above average of year
    Last visited: Feb-2018
  96. 96
    Martín Abadi, Mihai Budiu, Úlfar Erlingsson, Jay Ligatti:
    Control-flow integrity.
    ACM Conference on Computer and Communications Security (CCS), 2005
    932 cites at Google Scholar
    523% above average of year
    Last visited: Mar-2018
  97. 97
    Guojun Wang, Qin Liu, Jie Wu:
    Hierarchical attribute-based encryption for fine-grained access control in cloud storage services.
    ACM Conference on Computer and Communications Security (CCS), 2010
    533 cites at Google Scholar
    523% above average of year
    Last visited: Mar-2018
  98. 98
    Rafail Ostrovsky, Amit Sahai, Brent Waters:
    Attribute-based encryption with non-monotonic access structures.
    ACM Conference on Computer and Communications Security (CCS), 2007
    965 cites at Google Scholar
    516% above average of year
    Last visited: Mar-2018
  99. 99
    Paul F. Syverson, Paul C. van Oorschot:
    On unifying some cryptographic protocol logics.
    IEEE Symposium on Security and Privacy, 1994
    440 cites at Google Scholar
    514% above average of year
    Last visited: Mar-2018
  100. 100
    Long Lu, Zhichun Li, Zhenyu Wu, Wenke Lee, Guofei Jiang:
    CHEX: statically vetting Android apps for component hijacking vulnerabilities.
    ACM Conference on Computer and Communications Security (CCS), 2012
    473 cites at Google Scholar
    508% above average of year
    Last visited: Feb-2018