Security Papers from the 2000s

This webpage is an attempt to assemble a ranking of top-cited security papers from the 2000s. The ranking has been created based on citations of papers published at top security conferences. More details are available here.

Top-cited papers from 2009 ⌄

  1. 1
    Yao Liu, Michael K. Reiter, and Peng Ning:
    False data injection attacks against state estimation in electric power grids.
    ACM Conference on Computer and Communications Security (CCS), 2009
    4010 cites at Google Scholar
    2102% above average of year
    Visited: Jul-2025
    Paper: DOI
  2. 2
    Thomas Ristenpart, Eran Tromer, Hovav Shacham, and Stefan Savage:
    Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds.
    ACM Conference on Computer and Communications Security (CCS), 2009
    3068 cites at Google Scholar
    1585% above average of year
    Visited: Jul-2025
    Paper: DOI
  3. 3
    Arvind Narayanan and Vitaly Shmatikov:
    De-anonymizing Social Networks.
    IEEE Symposium on Security and Privacy (S&P), 2009
    1894 cites at Google Scholar
    940% above average of year
    Visited: Jul-2025
    Paper: DOI
  4. 4
    C. Christopher Erway, Alptekin Küpçü, Charalampos Papamanthou, and Roberto Tamassia:
    Dynamic provable data possession.
    ACM Conference on Computer and Communications Security (CCS), 2009
    1877 cites at Google Scholar
    931% above average of year
    Visited: Jul-2025
    Paper: DOI
  5. 5
    Qian Wang, Cong Wang, Jin Li, Kui Ren, and Wenjing Lou:
    Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing.
    European Symposium on Research in Computer Security (ESORICS), 2009
    1565 cites at Google Scholar
    759% above average of year
    Visited: Jul-2025
    Paper: DOI
  6. 6
    William Enck, Machigar Ongtang, and Patrick D. McDaniel:
    On lightweight mobile phone application certification.
    ACM Conference on Computer and Communications Security (CCS), 2009
    1488 cites at Google Scholar
    717% above average of year
    Visited: Jul-2025
    Paper: DOI
  7. 7
    Kevin D. Bowers, Ari Juels, and Alina Oprea:
    HAIL: a high-availability and integrity layer for cloud storage.
    ACM Conference on Computer and Communications Security (CCS), 2009
    1433 cites at Google Scholar
    687% above average of year
    Visited: Jul-2025
    Paper: DOI
  8. 8
    Melissa Chase and Sherman S. M. Chow:
    Improving privacy and security in multi-authority attribute-based encryption.
    ACM Conference on Computer and Communications Security (CCS), 2009
    1266 cites at Google Scholar
    595% above average of year
    Visited: Jun-2025
    Paper: DOI
  9. 9
    Bennet Yee, David Sehr, Gregory Dardyk, J. Bradley Chen, Robert Muth, Tavis Ormandy, Shiki Okasaka, Neha Narula, and Nicholas Fullagar:
    Native Client: A Sandbox for Portable, Untrusted x86 Native Code.
    IEEE Symposium on Security and Privacy (S&P), 2009
    1081 cites at Google Scholar
    494% above average of year
    Visited: May-2025
    Paper: DOI
  10. 10
    Ulrich Bayer, Paolo Milani Comparetti, Clemens Hlauschek, Christopher Krügel, and Engin Kirda:
    Scalable, Behavior-Based Malware Clustering.
    Network and Distributed System Security Symposium (NDSS), 2009
    996 cites at Google Scholar
    447% above average of year
    Visited: Jul-2025
    Paper: DOI

Top-cited papers from 2008 ⌄

  1. 1
    Arvind Narayanan and Vitaly Shmatikov:
    Robust De-anonymization of Large Sparse Datasets.
    IEEE Symposium on Security and Privacy (S&P), 2008
    3736 cites at Google Scholar
    2223% above average of year
    Visited: Jul-2025
    Paper: DOI
  2. 2
    J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandrino, Ariel J. Feldman, Jacob Appelbaum, and Edward W. Felten:
    Lest We Remember: Cold Boot Attacks on Encryption Keys.
    USENIX Security Symposium, 2008
    1933 cites at Google Scholar
    1102% above average of year
    Visited: May-2025
    Paper: DOI
  3. 3
    Patrice Godefroid, Michael Y. Levin, and David A. Molnar:
    Automated Whitebox Fuzz Testing.
    Network and Distributed System Security Symposium (NDSS), 2008
    1808 cites at Google Scholar
    1024% above average of year
    Visited: May-2025
    Paper: DOI
  4. 4
    Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee:
    BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection.
    USENIX Security Symposium, 2008
    1675 cites at Google Scholar
    942% above average of year
    Visited: Jul-2025
    Paper: DOI
  5. 5
    Guofei Gu, Junjie Zhang, and Wenke Lee:
    BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic.
    Network and Distributed System Security Symposium (NDSS), 2008
    1274 cites at Google Scholar
    692% above average of year
    Visited: Jul-2025
    Paper: DOI
  6. 6
    Ben Adida:
    Helios: Web-based Open-Audit Voting.
    USENIX Security Symposium, 2008
    1159 cites at Google Scholar
    621% above average of year
    Visited: May-2025
    Paper: DOI
  7. 7
    Artem Dinaburg, Paul Royal, Monirul Islam Sharif, and Wenke Lee:
    Ether: malware analysis via hardware virtualization extensions.
    ACM Conference on Computer and Communications Security (CCS), 2008
    1069 cites at Google Scholar
    565% above average of year
    Visited: Jul-2025
    Paper: DOI
  8. 8
    Daniel Halperin, Thomas S. Heydt-Benjamin, Benjamin Ransford, Shane S. Clark, Benessa Defend, Will Morgan, Kevin Fu, Tadayoshi Kohno, and William H. Maisel:
    Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses.
    IEEE Symposium on Security and Privacy (S&P), 2008
    1057 cites at Google Scholar
    557% above average of year
    Visited: Jul-2025
    Paper: DOI
  9. 9
    Dan Bogdanov, Sven Laur, and Jan Willemson:
    Sharemind: A Framework for Fast Privacy-Preserving Computations.
    European Symposium on Research in Computer Security (ESORICS), 2008
    1054 cites at Google Scholar
    555% above average of year
    Visited: May-2025
    Paper: DOI
  10. 10
    Michael R. Clarkson and Fred B. Schneider:
    Hyperproperties.
    IEEE Computer Security Foundations Symposium (CSF), 2008
    1034 cites at Google Scholar
    543% above average of year
    Visited: Jul-2025
    Paper: DOI

Top-cited papers from 2007 ⌄

  1. 1
    Giuseppe Ateniese, Randal C. Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary N. J. Peterson, and Dawn Xiaodong Song:
    Provable data possession at untrusted stores.
    ACM Conference on Computer and Communications Security (CCS), 2007
    4052 cites at Google Scholar
    2203% above average of year
    Visited: Jul-2025
    Paper: DOI
  2. 2
    Ari Juels and Burton S. Kaliski Jr.:
    Pors: proofs of retrievability for large files.
    ACM Conference on Computer and Communications Security (CCS), 2007
    2926 cites at Google Scholar
    1563% above average of year
    Visited: Jul-2025
    Paper: DOI
  3. 3
    Hovav Shacham:
    The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86).
    ACM Conference on Computer and Communications Security (CCS), 2007
    2109 cites at Google Scholar
    1099% above average of year
    Visited: Jul-2025
    Paper: DOI
  4. 4
    Rafail Ostrovsky, Amit Sahai, and Brent Waters:
    Attribute-based encryption with non-monotonic access structures.
    ACM Conference on Computer and Communications Security (CCS), 2007
    1578 cites at Google Scholar
    797% above average of year
    Visited: Jul-2025
    Paper: DOI
  5. 5
    Andreas Moser, Christopher Kruegel, and Engin Kirda:
    Limits of Static Analysis for Malware Detection.
    Annual Computer Security Applications Conference (ACSAC), 2007
    1334 cites at Google Scholar
    658% above average of year
    Visited: Jul-2025
    Paper: DOI
  6. 6
    Guofei Gu, Phillip A. Porras, Vinod Yegneswaran, Martin W. Fong, and Wenke Lee:
    BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation.
    USENIX Security Symposium, 2007
    1221 cites at Google Scholar
    594% above average of year
    Visited: Jul-2025
    Paper: DOI
  7. 7
    Heng Yin, Dawn Xiaodong Song, Manuel Egele, Christopher Kruegel, and Engin Kirda:
    Panorama: capturing system-wide information flow for malware detection and analysis.
    ACM Conference on Computer and Communications Security (CCS), 2007
    1141 cites at Google Scholar
    549% above average of year
    Visited: Jul-2025
    Paper: DOI
  8. 8
    Michael D. Bailey, Jon Oberheide, Jon Andersen, Zhuoqing Morley Mao, Farnam Jahanian, and Jose Nazario:
    Automated Classification and Analysis of Internet Malware.
    International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2007
    870 cites at Google Scholar
    395% above average of year
    Visited: Jul-2025
    Paper: DOI
  9. 9
    Andreas Moser, Christopher Krügel, and Engin Kirda:
    Exploring Multiple Execution Paths for Malware Analysis.
    IEEE Symposium on Security and Privacy (S&P), 2007
    835 cites at Google Scholar
    375% above average of year
    Visited: Jul-2025
    Paper: DOI
  10. 10
    Philipp Vogt, Florian Nentwich, Nenad Jovanovic, Engin Kirda, Christopher Krügel, and Giovanni Vigna:
    Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis.
    Network and Distributed System Security Symposium (NDSS), 2007
    830 cites at Google Scholar
    372% above average of year
    Visited: Jul-2025
    Paper: DOI

Top-cited papers from 2006 ⌄

  1. 1
    Vipul Goyal, Omkant Pandey, Amit Sahai, and Brent Waters:
    Attribute-based encryption for fine-grained access control of encrypted data.
    ACM Conference on Computer and Communications Security (CCS), 2006
    7289 cites at Google Scholar
    3869% above average of year
    Visited: Jul-2025
    Paper: DOI
  2. 2
    Reza Curtmola, Juan A. Garay, Seny Kamara, and Rafail Ostrovsky:
    Searchable symmetric encryption: improved definitions and efficient constructions.
    ACM Conference on Computer and Communications Security (CCS), 2006
    3532 cites at Google Scholar
    1823% above average of year
    Visited: Jul-2025
    Paper: DOI
  3. 3
    Alessandro Acquisti and Ralph Gross:
    Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook.
    International Symposium on Privacy Enhancing Technologies (PETS), 2006
    3389 cites at Google Scholar
    1745% above average of year
    Visited: Jul-2025
    Paper: DOI
  4. 4
    Cristian Cadar, Vijay Ganesh, Peter M. Pawlowski, David L. Dill, and Dawson R. Engler:
    EXE: automatically generating inputs of death.
    ACM Conference on Computer and Communications Security (CCS), 2006
    1676 cites at Google Scholar
    813% above average of year
    Visited: Jun-2025
    Paper: DOI
  5. 5
    Marco Barreno, Blaine Nelson, Russell Sears, Anthony D. Joseph, and J. D. Tygar:
    Can machine learning be secure?
    ACM Asia Conference on Computer and Communications Security (AsiaCCS), 2006
    1294 cites at Google Scholar
    605% above average of year
    Visited: Jul-2025
    Paper: DOI
  6. 6
    Xinming Ou, Wayne F. Boyer, and Miles A. McQueen:
    A scalable approach to attack graph generation.
    ACM Conference on Computer and Communications Security (CCS), 2006
    943 cites at Google Scholar
    413% above average of year
    Visited: May-2025
    Paper: DOI
  7. 7
    Mihir Bellare and Gregory Neven:
    Multi-signatures in the plain public-Key model and a general forking lemma.
    ACM Conference on Computer and Communications Security (CCS), 2006
    932 cites at Google Scholar
    407% above average of year
    Visited: May-2025
    Paper: DOI
  8. 8
    Stefan Berger, Ramón Cáceres, Kenneth A. Goldman, Ronald Perez, Reiner Sailer, and Leendert van Doorn:
    vTPM: Virtualizing the Trusted Platform Module.
    USENIX Security Symposium, 2006
    855 cites at Google Scholar
    366% above average of year
    Visited: Jul-2025
    Paper: DOI
  9. 9
    Matthew Pirretti, Patrick Traynor, Patrick D. McDaniel, and Brent Waters:
    Secure attribute-based systems.
    ACM Conference on Computer and Communications Security (CCS), 2006
    822 cites at Google Scholar
    348% above average of year
    Visited: Jul-2025
    Paper: DOI
  10. 10
    Martín Casado, Tal Garfinkel, Aditya Akella, Michael J. Freedman, Dan Boneh, and Nick McKeown:
    SANE: A Protection Architecture for Enterprise Networks.
    USENIX Security Symposium, 2006
    781 cites at Google Scholar
    325% above average of year
    Visited: May-2025
    Paper: DOI

Top-cited papers from 2005 ⌄

  1. 1
    Martín Abadi, Mihai Budiu, Úlfar Erlingsson, and Jay Ligatti:
    Control-flow integrity.
    ACM Conference on Computer and Communications Security (CCS), 2005
    2706 cites at Google Scholar
    1346% above average of year
    Visited: Jun-2025
    Paper: DOI
  2. 2
    James Newsome and Dawn Xiaodong Song:
    Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software.
    Network and Distributed System Security Symposium (NDSS), 2005
    2478 cites at Google Scholar
    1224% above average of year
    Visited: Jul-2025
    Paper: DOI
  3. 3
    Giuseppe Ateniese, Kevin Fu, Matthew Green, and Susan Hohenberger:
    Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage.
    Network and Distributed System Security Symposium (NDSS), 2005
    2155 cites at Google Scholar
    1052% above average of year
    Visited: Jul-2025
    Paper: DOI
  4. 4
    James Newsome, Brad Karp, and Dawn Xiaodong Song:
    Polygraph: Automatically Generating Signatures for Polymorphic Worms.
    IEEE Symposium on Security and Privacy (S&P), 2005
    1266 cites at Google Scholar
    577% above average of year
    Visited: Jul-2025
    Paper: DOI
  5. 5
    Mihai Christodorescu, Somesh Jha, Sanjit A. Seshia, Dawn Xiaodong Song, and Randal E. Bryant:
    Semantics-Aware Malware Detection.
    IEEE Symposium on Security and Privacy (S&P), 2005
    1182 cites at Google Scholar
    532% above average of year
    Visited: Jul-2025
    Paper: DOI
  6. 6
    Tadayoshi Kohno, Andre Broido, and Kimberly C. Claffy:
    Remote Physical Device Fingerprinting.
    IEEE Symposium on Security and Privacy (S&P), 2005
    1118 cites at Google Scholar
    497% above average of year
    Visited: Jul-2025
    Paper: DOI
  7. 7
    Xinming Ou, Sudhakar Govindavajhala, and Andrew W. Appel:
    MulVAL: A Logic-based Network Security Analyzer.
    USENIX Security Symposium, 2005
    995 cites at Google Scholar
    432% above average of year
    Visited: May-2025
    Paper: DOI
  8. 8
    Bryan Parno, Adrian Perrig, and Virgil D. Gligor:
    Distributed Detection of Node Replication Attacks in Sensor Networks.
    IEEE Symposium on Security and Privacy (S&P), 2005
    984 cites at Google Scholar
    426% above average of year
    Visited: Jul-2025
    Paper: DOI
  9. 9
    V. Benjamin Livshits and Monica S. Lam:
    Finding Security Vulnerabilities in Java Applications with Static Analysis.
    USENIX Security Symposium, 2005
    975 cites at Google Scholar
    421% above average of year
    Visited: Jul-2025
    Paper: DOI
  10. 10
    Steven J. Murdoch and George Danezis:
    Low-Cost Traffic Analysis of Tor.
    IEEE Symposium on Security and Privacy (S&P), 2005
    899 cites at Google Scholar
    380% above average of year
    Visited: Jul-2025
    Paper: DOI

Top-cited papers from 2004 ⌄

  1. 1
    Roger Dingledine, Nick Mathewson, and Paul F. Syverson:
    Tor: The Second-Generation Onion Router.
    USENIX Security Symposium, 2004
    6666 cites at Google Scholar
    2742% above average of year
    Visited: Jul-2025
    Paper: DOI
  2. 2
    Reiner Sailer, Xiaolan Zhang, Trent Jaeger, and Leendert van Doorn:
    Design and Implementation of a TCG-based Integrity Measurement Architecture.
    USENIX Security Symposium, 2004
    1678 cites at Google Scholar
    615% above average of year
    Visited: Jul-2025
    Paper: DOI
  3. 3
    Ernest F. Brickell, Jan Camenisch, and Liqun Chen:
    Direct anonymous attestation.
    ACM Conference on Computer and Communications Security (CCS), 2004
    1441 cites at Google Scholar
    514% above average of year
    Visited: Jul-2025
    Paper: DOI
  4. 4
    Hovav Shacham, Matthew Page, Ben Pfaff, Eu-Jin Goh, Nagendra Modadugu, and Dan Boneh:
    On the effectiveness of address-space randomization.
    ACM Conference on Computer and Communications Security (CCS), 2004
    1381 cites at Google Scholar
    489% above average of year
    Visited: Jul-2025
    Paper: DOI
  5. 5
    Ke Wang and Salvatore J. Stolfo:
    Anomalous Payload-Based Network Intrusion Detection.
    International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2004
    1345 cites at Google Scholar
    473% above average of year
    Visited: Jun-2025
    Paper: DOI
  6. 6
    Hyang-Ah Kim and Brad Karp:
    Autograph: Toward Automated, Distributed Worm Signature Detection.
    USENIX Security Symposium, 2004
    1322 cites at Google Scholar
    464% above average of year
    Visited: Jun-2025
    Paper: DOI
  7. 7
    Dahlia Malkhi, Noam Nisan, Benny Pinkas, and Yaron Sella:
    Fairplay - Secure Two-Party Computation System.
    USENIX Security Symposium, 2004
    1237 cites at Google Scholar
    427% above average of year
    Visited: Jun-2025
    Paper: DOI
  8. 8
    Steven M. Bellovin:
    A Look Back at "Security Problems in the TCP/IP Protocol Suite".
    Annual Computer Security Applications Conference (ACSAC), 2004
    1173 cites at Google Scholar
    400% above average of year
    Visited: May-2025
    Paper: DOI
  9. 9
    Niels Provos:
    A Virtual Honeypot Framework.
    USENIX Security Symposium, 2004
    1125 cites at Google Scholar
    380% above average of year
    Visited: Jul-2025
    Paper: DOI
  10. 10
    David Molnar and David A. Wagner:
    Privacy and security in library RFID: issues, practices, and architectures.
    ACM Conference on Computer and Communications Security (CCS), 2004
    1111 cites at Google Scholar
    374% above average of year
    Visited: Jun-2025
    Paper: DOI

Top-cited papers from 2003 ⌄

  1. 1
    Haowen Chan, Adrian Perrig, and Dawn Xiaodong Song:
    Random Key Predistribution Schemes for Sensor Networks.
    IEEE Symposium on Security and Privacy (S&P), 2003
    4441 cites at Google Scholar
    1530% above average of year
    Visited: Jul-2025
    Paper: DOI
  2. 2
    Sencun Zhu, Sanjeev Setia, and Sushil Jajodia:
    LEAP: efficient security mechanisms for large-scale distributed sensor networks.
    ACM Conference on Computer and Communications Security (CCS), 2003
    2796 cites at Google Scholar
    926% above average of year
    Visited: Jun-2025
    Paper: DOI
  3. 3
    Donggang Liu and Peng Ning:
    Establishing pairwise keys in distributed sensor networks.
    ACM Conference on Computer and Communications Security (CCS), 2003
    2662 cites at Google Scholar
    877% above average of year
    Visited: Jul-2025
    Paper: DOI
  4. 4
    Tal Garfinkel and Mendel Rosenblum:
    A Virtual Machine Introspection Based Architecture for Intrusion Detection.
    Network and Distributed System Security Symposium (NDSS), 2003
    2281 cites at Google Scholar
    737% above average of year
    Visited: Jul-2025
    Paper: DOI
  5. 5
    David Brumley and Dan Boneh:
    Remote Timing Attacks Are Practical.
    USENIX Security Symposium, 2003
    1411 cites at Google Scholar
    418% above average of year
    Visited: Jul-2025
    Paper: DOI
  6. 6
    Ari Juels, Ronald L. Rivest, and Michael Szydlo:
    The blocker tag: selective blocking of RFID tags for consumer privacy.
    ACM Conference on Computer and Communications Security (CCS), 2003
    1387 cites at Google Scholar
    409% above average of year
    Visited: Jul-2025
    Paper: DOI
  7. 7
    Mihai Christodorescu and Somesh Jha:
    Static Analysis of Executables to Detect Malicious Patterns.
    USENIX Security Symposium, 2003
    1088 cites at Google Scholar
    299% above average of year
    Visited: Jul-2025
    Paper: DOI
  8. 8
    John Bellardo and Stefan Savage:
    802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions.
    USENIX Security Symposium, 2003
    1050 cites at Google Scholar
    285% above average of year
    Visited: May-2025
    Paper: DOI
  9. 9
    George Danezis, Roger Dingledine, and Nick Mathewson:
    Mixminion: Design of a Type III Anonymous Remailer Protocol.
    IEEE Symposium on Security and Privacy (S&P), 2003
    1032 cites at Google Scholar
    279% above average of year
    Visited: Jul-2025
    Paper: DOI
  10. 10
    Cullen Linn and Saumya K. Debray:
    Obfuscation of executable code to improve resistance to static disassembly.
    ACM Conference on Computer and Communications Security (CCS), 2003
    1030 cites at Google Scholar
    278% above average of year
    Visited: May-2025
    Paper: DOI

Top-cited papers from 2002 ⌄

  1. 1
    Laurent Eschenauer and Virgil D. Gligor:
    A key-management scheme for distributed sensor networks.
    ACM Conference on Computer and Communications Security (CCS), 2002
    5594 cites at Google Scholar
    1994% above average of year
    Visited: Jun-2025
    Paper: DOI
  2. 2
    Blaise Gassend, Dwaine E. Clarke, Marten van Dijk, and Srinivas Devadas:
    Silicon physical random functions.
    ACM Conference on Computer and Communications Security (CCS), 2002
    2292 cites at Google Scholar
    758% above average of year
    Visited: Jun-2025
    Paper: DOI
  3. 3
    Oleg Sheyner, Joshua W. Haines, Somesh Jha, Richard Lippmann, and Jeannette M. Wing:
    Automated Generation and Analysis of Attack Graphs.
    IEEE Symposium on Security and Privacy (S&P), 2002
    1996 cites at Google Scholar
    647% above average of year
    Visited: Jul-2025
    Paper: DOI
  4. 4
    Stuart Staniford, Vern Paxson, and Nicholas Weaver:
    How to Own the Internet in Your Spare Time.
    USENIX Security Symposium, 2002
    1778 cites at Google Scholar
    565% above average of year
    Visited: Jul-2025
    Paper: DOI
  5. 5
    Cliff Changchun Zou, Weibo Gong, and Donald F. Towsley:
    Code red worm propagation modeling and analysis.
    ACM Conference on Computer and Communications Security (CCS), 2002
    1249 cites at Google Scholar
    367% above average of year
    Visited: Jul-2025
    Paper: DOI
  6. 6
    Michael J. Freedman and Robert Tappan Morris:
    Tarzan: a peer-to-peer anonymizing network layer.
    ACM Conference on Computer and Communications Security (CCS), 2002
    1241 cites at Google Scholar
    364% above average of year
    Visited: Jun-2025
    Paper: DOI
  7. 7
    Paul Ammann, Duminda Wijesekera, and Saket Kaushik:
    Scalable, graph-based network vulnerability analysis.
    ACM Conference on Computer and Communications Security (CCS), 2002
    1233 cites at Google Scholar
    361% above average of year
    Visited: Jun-2025
    Paper: DOI
  8. 8
    Frédéric Cuppens and Alexandre Miège:
    Alert Correlation in a Cooperative Intrusion Detection Framework.
    IEEE Symposium on Security and Privacy (S&P), 2002
    1180 cites at Google Scholar
    342% above average of year
    Visited: Jul-2025
    Paper: DOI
  9. 9
    Ninghui Li, John C. Mitchell, and William H. Winsborough:
    Design of a Role-Based Trust-Management Framework.
    IEEE Symposium on Security and Privacy (S&P), 2002
    1119 cites at Google Scholar
    319% above average of year
    Visited: Jul-2025
    Paper: DOI
  10. 10
    David A. Wagner and Paolo Soto:
    Mimicry attacks on host-based intrusion detection systems.
    ACM Conference on Computer and Communications Security (CCS), 2002
    1118 cites at Google Scholar
    318% above average of year
    Visited: Jun-2025
    Paper: DOI

Top-cited papers from 2001 ⌄

  1. 1
    David Moore, Geoffrey M. Voelker, and Stefan Savage:
    Inferring Internet Denial-of-Service Activity.
    USENIX Security Symposium, 2001
    2246 cites at Google Scholar
    1004% above average of year
    Visited: Jul-2025
    Paper: DOI
  2. 2
    Bruno Blanchet:
    An Efficient Cryptographic Protocol Verifier Based on Prolog Rules.
    IEEE Computer Security Foundations Symposium (CSF), 2001
    1571 cites at Google Scholar
    672% above average of year
    Visited: Jun-2025
    Paper: DOI
  3. 3
    Ross J. Anderson:
    Why Information Security is Hard-An Economic Perspective.
    Annual Computer Security Applications Conference (ACSAC), 2001
    1350 cites at Google Scholar
    563% above average of year
    Visited: Jul-2025
    Paper: DOI
  4. 4
    Alfonso Valdes and Keith Skinner:
    Probabilistic Alert Correlation.
    International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2001
    1161 cites at Google Scholar
    471% above average of year
    Visited: Jun-2025
    Paper: DOI
  5. 5
    David A. Wagner and Drew Dean:
    Intrusion Detection via Static Analysis.
    IEEE Symposium on Security and Privacy (S&P), 2001
    1094 cites at Google Scholar
    438% above average of year
    Visited: Jun-2025
    Paper: DOI
  6. 6
    Phillip Rogaway, Mihir Bellare, John Black, and Ted Krovetz:
    OCB: a block-cipher mode of operation for efficient authenticated encryption.
    ACM Conference on Computer and Communications Security (CCS), 2001
    1056 cites at Google Scholar
    419% above average of year
    Visited: Jun-2025
    Paper: DOI
  7. 7
    Hervé Debar and Andreas Wespi:
    Aggregation and Correlation of Intrusion-Detection Alerts.
    International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2001
    1022 cites at Google Scholar
    402% above average of year
    Visited: May-2025
    Paper: DOI
  8. 8
    Niels Provos:
    Defending Against Statistical Steganalysis.
    USENIX Security Symposium, 2001
    1003 cites at Google Scholar
    393% above average of year
    Visited: Jul-2025
    Paper: DOI
  9. 9
    Adrian Perrig, Ran Canetti, Dawn Xiaodong Song, and J. D. Tygar:
    Efficient and Secure Source Authentication for Multicast.
    Network and Distributed System Security Symposium (NDSS), 2001
    989 cites at Google Scholar
    386% above average of year
    Visited: Jul-2025
    Paper: DOI
  10. 10
    Wenke Lee and Dong Xiang:
    Information-Theoretic Measures for Anomaly Detection.
    IEEE Symposium on Security and Privacy (S&P), 2001
    952 cites at Google Scholar
    368% above average of year
    Visited: Jul-2025
    Paper: DOI

Top-cited papers from 2000 ⌄

  1. 1
    Dawn Xiaodong Song, David A. Wagner, and Adrian Perrig:
    Practical Techniques for Searches on Encrypted Data.
    IEEE Symposium on Security and Privacy (S&P), 2000
    5369 cites at Google Scholar
    2892% above average of year
    Visited: Jul-2025
    Paper: DOI
  2. 2
    Richard Lippmann, Joshua W. Haines, David J. Fried, Jonathan Korba, and Kumar Das:
    Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation.
    International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2000
    1528 cites at Google Scholar
    752% above average of year
    Visited: Jun-2025
    Paper: DOI
  3. 3
    Adrian Perrig, Ran Canetti, J. D. Tygar, and Dawn Xiaodong Song:
    Efficient Authentication and Signing of Multicast Streams over Lossy Channels.
    IEEE Symposium on Security and Privacy (S&P), 2000
    1459 cites at Google Scholar
    713% above average of year
    Visited: Jul-2025
    Paper: DOI
  4. 4
    Rachna Dhamija and Adrian Perrig:
    Deja Vu-A User Study: Using Images for Authentication.
    USENIX Security Symposium, 2000
    1383 cites at Google Scholar
    671% above average of year
    Visited: Jun-2025
    Paper: DOI
  5. 5
    David A. Wagner, Jeffrey S. Foster, Eric A. Brewer, and Alexander Aiken:
    A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities.
    Network and Distributed System Security Symposium (NDSS), 2000
    1097 cites at Google Scholar
    511% above average of year
    Visited: Jun-2025
    Paper: DOI
  6. 6
    Sotiris Ioannidis, Angelos D. Keromytis, Steven M. Bellovin, and Jonathan M. Smith:
    Implementing a distributed firewall.
    ACM Conference on Computer and Communications Security (CCS), 2000
    1029 cites at Google Scholar
    474% above average of year
    Visited: Jul-2025
    Paper: DOI
  7. 7
    Hugo Krawczyk and Tal Rabin:
    Chameleon Signatures.
    Network and Distributed System Security Symposium (NDSS), 2000
    969 cites at Google Scholar
    440% above average of year
    Visited: Jul-2025
    Paper: DOI
  8. 8
    Yongdae Kim, Adrian Perrig, and Gene Tsudik:
    Simple and fault-tolerant key agreement for dynamic collaborative groups.
    ACM Conference on Computer and Communications Security (CCS), 2000
    768 cites at Google Scholar
    328% above average of year
    Visited: Jul-2025
    Paper: DOI
  9. 9
    Robert Stone:
    CenterTrack: An IP Overlay Network for Tracking DoS Floods.
    USENIX Security Symposium, 2000
    744 cites at Google Scholar
    315% above average of year
    Visited: May-2025
    Paper: DOI
  10. 10
    Ronald W. Ritchey and Paul Ammann:
    Using Model Checking to Analyze Network Vulnerabilities.
    IEEE Symposium on Security and Privacy (S&P), 2000
    705 cites at Google Scholar
    293% above average of year
    Visited: Jun-2025
    Paper: DOI