Most Cited Security Papers from 2015–2019
4 min readOct 15, 2020
These are a selection of the most cited papers from ACM CCS, IEEE Security & Privacy, NDSS, Usenix Security, Crypto, and Eurocrypt between the years 2015 and 2019. Source data is from Google Scholar Metrics.
The papers are roughly in the order of citations per year and grouped in 5 categories.
- Machine Learning Security & Privacy
- Architecture & Side-Channel Attacks
- Cryptocurrencies & Blockchains
- Real World Attacks & Case Studies
- Cryptography
Machine Learning Privacy & Security
- Towards Evaluating the Robustness of Neural Networks
N Carlini, D Wagner
2017 IEEE Symposium on Security and Privacy (SP), 39–57 - Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks
N Papernot, P McDaniel, X Wu, S Jha, A Swami
2016 IEEE Symposium on Security and Privacy (SP), 582–597 - Deep Learning with Differential Privacy
M Abadi, A Chu, I Goodfellow, HB McMahan, I Mironov, K Talwar, L Zhang
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications - Feature Squeezing: Detecting Adversarial Examples in Deep Neural Networks.
W Xu, D Evans, Y Qi
NDSS - Membership Inference Attacks Against Machine Learning Models
R Shokri, M Stronati, C Song, V Shmatikov
2017 IEEE Symposium on Security and Privacy (SP), 3–18 - Privacy-Preserving Deep Learning
R Shokri, V Shmatikov
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications - Stealing Machine Learning Models via Prediction APIs
F Tramèr, F Zhang, A Juels, MK Reiter, T Ristenpart
25th {USENIX} Security Symposium ({USENIX} Security 16), 601–618 - Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures
M Fredrikson, S Jha, T Ristenpart
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications - Machine Learning Classification over Encrypted Data.
R Bost, RA Popa, S Tu, S Goldwasser
NDSS - Building a RAPPOR with the Unknown: Privacy-Preserving Learning of Associations and Data Dictionaries
G Fanti, V Pihur, Ú Erlingsson
Proceedings on Privacy Enhancing Technologies 2016 (3), 41–61
Architecture & Side-Channel Attacks
- Spectre Attacks: Exploiting Speculative Execution
P Kocher, J Horn, A Fogh, D Genkin, D Gruss, W Haas, M Hamburg, …
2019 IEEE Symposium on Security and Privacy (SP), 1–19 - Meltdown: Reading Kernel Memory from User Space
M Lipp, M Schwarz, D Gruss, T Prescher, W Haas, A Fogh, J Horn, …
27th {USENIX} Security Symposium ({USENIX} Security 18), 973–990 - Foreshadow: Extracting the Keys to the Intel {SGX} Kingdom with Transient Out-of-Order Execution
J Van Bulck, M Minkin, O Weisse, D Genkin, B Kasikci, F Piessens, …
27th {USENIX} Security Symposium ({USENIX} Security 18), 991–1008 - Last-Level Cache Side-Channel Attacks are Practical
F Liu, Y Yarom, Q Ge, G Heiser, RB Lee
2015 IEEE Symposium on Security and Privacy, 605–622
Cryptocurrencies & Blockchains
- Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts
A Kosba, A Miller, E Shi, Z Wen, C Papamanthou
2016 IEEE Symposium on Security and Privacy (SP), 839–858 - Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol.
A Kiayias, A Russell, B David, R Oliynykov
CRYPTO (1), 357–388 - Making Smart Contracts Smarter
L Luu, DH Chu, H Olickel, P Saxena, A Hobor
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications - SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies
J Bonneau, A Miller, J Clark, A Narayanan, JA Kroll, EW Felten
2015 IEEE Symposium on Security and Privacy, 104–121 - The Bitcoin Backbone Protocol: Analysis and Applications.
JA Garay, A Kiayias, N Leonardos
EUROCRYPT (2), 281–310 - On the Security and Performance of Proof of Work Blockchains
A Gervais, GO Karame, K Wüst, V Glykantzis, H Ritzdorf, S Capkun
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications - Analysis of the Blockchain Protocol in Asynchronous Networks.
R Pass, L Seeman, A Shelat
EUROCRYPT (2), 643–673
Real World Attacks & Case Studies
- Understanding the Mirai Botnet
M Antonakakis, T April, M Bailey, M Bernhard, E Bursztein, J Cochran, …
26th {USENIX} Security Symposium ({USENIX} Security 17), 1093–1110 - IoT Goes Nuclear: Creating a Zigbee Chain Reaction
E Ronen, A Shamir, AO Weingarten, C O’Flynn
IEEE Security & Privacy 16 (1), 54–62 - Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition
M Sharif, S Bhagavatula, L Bauer, MK Reiter
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications - Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem
K Soska, N Christin
24th {USENIX} Security Symposium ({USENIX} Security 15), 33–48 - Hidden Voice Commands
N Carlini, P Mishra, T Vaidya, Y Zhang, M Sherr, C Shields, D Wagner, …
25th {USENIX} Security Symposium ({USENIX} Security 16), 513–530
Cryptography
- Post-quantum Key Exchange — A New Hope
E Alkim, L Ducas, T Pöppelmann, P Schwabe
25th {USENIX} Security Symposium ({USENIX} Security 16), 327–343 - The First Collision for Full SHA-1.
M Stevens, E Bursztein, P Karpman, A Albertini, Y Markov
CRYPTO (1), 570–596 - The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS.
C Beierle, J Jean, S Kölbl, G Leander, A Moradi, T Peyrin, Y Sasaki, …CRYPTO (2), 123–153 - FHEW: Bootstrapping Homomorphic Encryption in Less Than a Second.
L Ducas, D Micciancio
EUROCRYPT (1), 617–640 - Efficient Algorithms for Supersingular Isogeny Diffie-Hellman.
C Costello, P Longa, M Naehrig
CRYPTO (1), 572–601 - Graph-Induced Multilinear Maps from Lattices.
C Gentry, S Gorbunov, S Halevi
TCC (2), 498–527 - Memory Encryption for General-Purpose Processors
S Gueron
IEEE Security & Privacy 14 (6), 54–62