Security Papers from the 2020s

This webpage is an attempt to assemble a ranking of top-cited security papers from the 2020s. The ranking has been created based on citations of papers published at top security conferences. More details are available here.

Top-cited papers from 2024 ⌄

  1. 1
    Zichen Gui, Kenneth G. Paterson, Sikhar Patranabis, and Bogdan Warinschi:
    SWiSSSE: System-Wide Security for Searchable Symmetric Encryption.
    Proceedings on Privacy Enhancing Technologies (PoPETS), 2024
    18 cites at Google Scholar
    1176% above average of year
    Last visited: Feb-2024
    Paper: DOI
  2. 2
    Zengrui Liu, Umar Iqbal, and Nitesh Saxena:
    Opted Out, Yet Tracked: Are Regulations Enough to Protect Your Privacy?
    Proceedings on Privacy Enhancing Technologies (PoPETS), 2024
    7 cites at Google Scholar
    396% above average of year
    Last visited: Feb-2024
    Paper: DOI
  3. 3
    Gonzalo Munilla Garrido, Vivek Nair, and Dawn Song:
    SoK: Data Privacy in Virtual Reality.
    Proceedings on Privacy Enhancing Technologies (PoPETS), 2024
    6 cites at Google Scholar
    325% above average of year
    Last visited: Feb-2024
    Paper: DOI
  4. 4
    Sajin Sasy and Ian Goldberg:
    SoK: Metadata-Protecting Communication Systems.
    Proceedings on Privacy Enhancing Technologies (PoPETS), 2024
    4 cites at Google Scholar
    184% above average of year
    Last visited: Feb-2024
    Paper: DOI
  5. 5
    Nerla Jean-Louis, Yunqi Li, Yan Ji, Harjasleen Malvai, Thomas Yurek, Sylvain Bellemare, and Andrew Miller:
    SGXonerate:Finding (and Partially Fixing) Privacy Flaws in TEE-based Smart Contract Platforms Without Breaking the TEE.
    Proceedings on Privacy Enhancing Technologies (PoPETS), 2024
    4 cites at Google Scholar
    184% above average of year
    Last visited: Mar-2024
    Paper: DOI
  6. 6
    Emily Wenger, Xiuyu Li, Ben Y. Zhao, and Vitaly Shmatikov:
    Data Isotopes for Data Provenance in DNNs.
    Proceedings on Privacy Enhancing Technologies (PoPETS), 2024
    3 cites at Google Scholar
    113% above average of year
    Last visited: Feb-2024
    Paper: DOI
  7. 7
    Seny Kamara, Abdelkarim Kati, Tarik Moataz, Jamie DeMaria, Andrew Park, and Amos Treiber:
    MAPLE: MArkov Process Leakage attacks on Encrypted Search.
    Proceedings on Privacy Enhancing Technologies (PoPETS), 2024
    3 cites at Google Scholar
    113% above average of year
    Last visited: Feb-2024
    Paper: DOI
  8. 8
    François Hublet, David A. Basin, and Srdan Krstic:
    User-Controlled Privacy: Taint, Track, and Control.
    Proceedings on Privacy Enhancing Technologies (PoPETS), 2024
    2 cites at Google Scholar
    42% above average of year
    Last visited: Feb-2024
    Paper: DOI
  9. 9
    Sayan Biswas and Catuscia Palamidessi:
    PRIVIC: A privacy-preserving method for incremental collection of location data.
    Proceedings on Privacy Enhancing Technologies (PoPETS), 2024
    2 cites at Google Scholar
    42% above average of year
    Last visited: Mar-2024
    Paper: DOI
  10. 10
    Sebastian Zimmeck, Eliza Kuller, Chunyue Ma, Bella Tassone, and Joe Champeau:
    Generalizable Active Privacy Choice: Designing a Graphical User Interface for Global Privacy Control.
    Proceedings on Privacy Enhancing Technologies (PoPETS), 2024
    2 cites at Google Scholar
    42% above average of year
    Last visited: Feb-2024
    Paper: DOI

Top-cited papers from 2023 ⌄

  1. 1
    Nicholas Carlini, Jamie Hayes, Milad Nasr, Matthew Jagielski, Vikash Sehwag, Florian Tramèr, Borja Balle, Daphne Ippolito, and Eric Wallace:
    Extracting Training Data from Diffusion Models.
    USENIX Security Symposium, 2023
    213 cites at Google Scholar
    5094% above average of year
    Last visited: Feb-2024
    Paper: DOI
  2. 2
    Linyi Li, Tao Xie, and Bo Li:
    SoK: Certified Robustness for Deep Neural Networks.
    IEEE Symposium on Security and Privacy (S&P), 2023
    122 cites at Google Scholar
    2875% above average of year
    Last visited: Feb-2024
    Paper: DOI
  3. 3
    Maurice Weber, Xiaojun Xu, Bojan Karlas, Ce Zhang, and Bo Li:
    RAB: Provable Robustness Against Backdoor Attacks.
    IEEE Symposium on Security and Privacy (S&P), 2023
    116 cites at Google Scholar
    2729% above average of year
    Last visited: Feb-2024
    Paper: DOI
  4. 4
    Franziska Boenisch, Adam Dziedzic, Roei Schuster, Ali Shahin Shamsabadi, Ilia Shumailov, and Nicolas Papernot:
    When the Curious Abandon Honesty: Federated Learning Is Not Private.
    IEEE European Symposium on Security and Privacy (EuroS&P), 2023
    108 cites at Google Scholar
    2534% above average of year
    Last visited: Feb-2024
    Paper: DOI
  5. 5
    Hammond Pearce, Benjamin Tan, Baleegh Ahmad, Ramesh Karri, and Brendan Dolan-Gavitt:
    Examining Zero-Shot Vulnerability Repair with Large Language Models.
    IEEE Symposium on Security and Privacy (S&P), 2023
    94 cites at Google Scholar
    2192% above average of year
    Last visited: Feb-2024
    Paper: DOI
  6. 6
    Yi Zeng, Minzhou Pan, Hoang Anh Just, Lingjuan Lyu, Meikang Qiu, and Ruoxi Jia:
    Narcissus: A Practical Clean-Label Backdoor Attack with Limited Information.
    ACM Conference on Computer and Communications Security (CCS), 2023
    79 cites at Google Scholar
    1826% above average of year
    Last visited: Feb-2024
    Paper: DOI
  7. 7
    Mahimna Kelkar, Soubhik Deb, Sishan Long, Ari Juels, and Sreeram Kannan:
    Themis: Fast, Strong Order-Fairness in Byzantine Consensus.
    ACM Conference on Computer and Communications Security (CCS), 2023
    68 cites at Google Scholar
    1558% above average of year
    Last visited: Mar-2024
    Paper: DOI
  8. 8
    Shawn Shan, Jenna Cryan, Emily Wenger, Haitao Zheng, Rana Hanocka, and Ben Y. Zhao:
    Glaze: Protecting Artists from Style Mimicry by Text-to-Image Models.
    USENIX Security Symposium, 2023
    57 cites at Google Scholar
    1290% above average of year
    Last visited: Feb-2024
    Paper: DOI
  9. 9
    Nils Lukas, Ahmed Salem, Robert Sim, Shruti Tople, Lukas Wutschitz, and Santiago Zanella Béguelin:
    Analyzing Leakage of Personally Identifiable Information in Language Models.
    IEEE Symposium on Security and Privacy (S&P), 2023
    57 cites at Google Scholar
    1290% above average of year
    Last visited: Feb-2024
    Paper: DOI
  10. 10
    Liyi Zhou, Xihan Xiong, Jens Ernstberger, Stefanos Chaliasos, Zhipeng Wang, Ye Wang, Kaihua Qin, Roger Wattenhofer, Dawn Song, and Arthur Gervais:
    SoK: Decentralized Finance (DeFi) Attacks.
    IEEE Symposium on Security and Privacy (S&P), 2023
    55 cites at Google Scholar
    1241% above average of year
    Last visited: Jan-2024
    Paper: DOI

Top-cited papers from 2022 ⌄

  1. 1
    Nicholas Carlini, Steve Chien, Milad Nasr, Shuang Song, Andreas Terzis, and Florian Tramèr:
    Membership Inference Attacks From First Principles.
    IEEE Symposium on Security and Privacy (S&P), 2022
    324 cites at Google Scholar
    2188% above average of year
    Last visited: Mar-2024
    Paper: DOI
  2. 2
    Daniel Arp, Erwin Quiring, Feargus Pendlebury, Alexander Warnecke, Fabio Pierazzi, Christian Wressnegger, Lorenzo Cavallaro, and Konrad Rieck:
    Dos and Don'ts of Machine Learning in Computer Security.
    USENIX Security Symposium, 2022
    248 cites at Google Scholar
    1651% above average of year
    Last visited: Feb-2024
    Paper: DOI
  3. 3
    Ahmed Salem, Rui Wen, Michael Backes, Shiqing Ma, and Yang Zhang:
    Dynamic Backdoor Attacks Against Machine Learning Models.
    IEEE European Symposium on Security and Privacy (EuroS&P), 2022
    234 cites at Google Scholar
    1552% above average of year
    Last visited: Feb-2024
    Paper: DOI
  4. 4
    Kaihua Qin, Liyi Zhou, and Arthur Gervais:
    Quantifying Blockchain Extractable Value: How dark is the forest?
    IEEE Symposium on Security and Privacy (S&P), 2022
    201 cites at Google Scholar
    1319% above average of year
    Last visited: Feb-2024
    Paper: DOI
  5. 5
    Hammond Pearce, Baleegh Ahmad, Benjamin Tan, Brendan Dolan-Gavitt, and Ramesh Karri:
    Asleep at the Keyboard? Assessing the Security of GitHub Copilot's Code Contributions.
    IEEE Symposium on Security and Privacy (S&P), 2022
    197 cites at Google Scholar
    1291% above average of year
    Last visited: Feb-2024
    Paper: DOI
  6. 6
    Virat Shejwalkar, Amir Houmansadr, Peter Kairouz, and Daniel Ramage:
    Back to the Drawing Board: A Critical Evaluation of Poisoning Attacks on Production Federated Learning.
    IEEE Symposium on Security and Privacy (S&P), 2022
    180 cites at Google Scholar
    1171% above average of year
    Last visited: Mar-2024
    Paper: DOI
  7. 7
    Thien Duc Nguyen, Phillip Rieger, Huili Chen, Hossein Yalame, Helen Möllering, Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Shaza Zeitouni, Farinaz Koushanfar, Ahmad-Reza Sadeghi, and Thomas Schneider:
    FLAME: Taming Backdoors in Federated Learning.
    USENIX Security Symposium, 2022
    147 cites at Google Scholar
    938% above average of year
    Last visited: Feb-2024
    Paper: DOI
  8. 8
    Jiayuan Ye, Aadyaa Maddi, Sasi Kumar Murakonda, Vincent Bindschaedler, and Reza Shokri:
    Enhanced Membership Inference Attacks against Machine Learning Models.
    ACM Conference on Computer and Communications Security (CCS), 2022
    136 cites at Google Scholar
    860% above average of year
    Last visited: Mar-2024
    Paper: DOI
  9. 9
    Jinyuan Jia, Yupei Liu, and Neil Zhenqiang Gong:
    BadEncoder: Backdoor Attacks to Pre-trained Encoders in Self-Supervised Learning.
    IEEE Symposium on Security and Privacy (S&P), 2022
    124 cites at Google Scholar
    776% above average of year
    Last visited: Mar-2024
    Paper: DOI
  10. 10
    Theresa Stadler, Bristena Oprisanu, and Carmela Troncoso:
    Synthetic Data - Anonymisation Groundhog Day.
    USENIX Security Symposium, 2022
    123 cites at Google Scholar
    769% above average of year
    Last visited: Feb-2024
    Paper: DOI

Top-cited papers from 2021 ⌄

  1. 1
    Nicholas Carlini, Florian Tramèr, Eric Wallace, Matthew Jagielski, Ariel Herbert-Voss, Katherine Lee, Adam Roberts, Tom B. Brown, Dawn Song, Úlfar Erlingsson, Alina Oprea, and Colin Raffel:
    Extracting Training Data from Large Language Models.
    USENIX Security Symposium, 2021
    1041 cites at Google Scholar
    3316% above average of year
    Last visited: Feb-2024
    Paper: DOI
  2. 2
    Lucas Bourtoule, Varun Chandrasekaran, Christopher A. Choquette-Choo, Hengrui Jia, Adelin Travers, Baiwu Zhang, David Lie, and Nicolas Papernot:
    Machine Unlearning.
    IEEE Symposium on Security and Privacy (S&P), 2021
    438 cites at Google Scholar
    1337% above average of year
    Last visited: Feb-2024
    Paper: DOI
  3. 3
    Xiaoyu Cao, Minghong Fang, Jia Liu, and Neil Zhenqiang Gong:
    FLTrust: Byzantine-robust Federated Learning via Trust Bootstrapping.
    Network and Distributed System Security Symposium (NDSS), 2021
    353 cites at Google Scholar
    1058% above average of year
    Last visited: Feb-2024
    Paper: DOI
  4. 4
    Lorenzo Grassi, Dmitry Khovratovich, Christian Rechberger, Arnab Roy, and Markus Schofnegger:
    Poseidon: A New Hash Function for Zero-Knowledge Proof Systems.
    USENIX Security Symposium, 2021
    292 cites at Google Scholar
    858% above average of year
    Last visited: Feb-2024
    Paper: DOI
  5. 5
    Xiaoyi Chen, Ahmed Salem, Dingfan Chen, Michael Backes, Shiqing Ma, Qingni Shen, Zhonghai Wu, and Yang Zhang:
    BadNL: Backdoor Attacks against NLP Models with Semantic-preserving Improvements.
    Annual Computer Security Applications Conference (ACSAC), 2021
    271 cites at Google Scholar
    789% above average of year
    Last visited: Mar-2024
    Paper: DOI
  6. 6
    Liwei Song and Prateek Mittal:
    Systematic Evaluation of Privacy Risks of Machine Learning Models.
    USENIX Security Symposium, 2021
    263 cites at Google Scholar
    763% above average of year
    Last visited: Feb-2024
    Paper: DOI
  7. 7
    Eugene Bagdasaryan and Vitaly Shmatikov:
    Blind Backdoors in Deep Learning Models.
    USENIX Security Symposium, 2021
    255 cites at Google Scholar
    737% above average of year
    Last visited: Feb-2024
    Paper: DOI
  8. 8
    Virat Shejwalkar and Amir Houmansadr:
    Manipulating the Byzantine: Optimizing Model Poisoning Attacks and Defenses for Federated Learning.
    Network and Distributed System Security Symposium (NDSS), 2021
    246 cites at Google Scholar
    707% above average of year
    Last visited: Feb-2024
    Paper: DOI
  9. 9
    Xiaojun Xu, Qi Wang, Huichen Li, Nikita Borisov, Carl A. Gunter, and Bo Li:
    Detecting AI Trojans Using Meta Neural Analysis.
    IEEE Symposium on Security and Privacy (S&P), 2021
    238 cites at Google Scholar
    681% above average of year
    Last visited: Feb-2024
    Paper: DOI
  10. 10
    Sameer Wagh, Shruti Tople, Fabrice Benhamouda, Eyal Kushilevitz, Prateek Mittal, and Tal Rabin:
    Falcon: Honest-Majority Maliciously Secure Framework for Private Deep Learning.
    Proceedings on Privacy Enhancing Technologies (PoPETS), 2021
    215 cites at Google Scholar
    606% above average of year
    Last visited: Feb-2024
    Paper: DOI

Top-cited papers from 2020 ⌄

  1. 1
    Minghong Fang, Xiaoyu Cao, Jinyuan Jia, and Neil Zhenqiang Gong:
    Local Model Poisoning Attacks to Byzantine-Robust Federated Learning.
    USENIX Security Symposium, 2020
    839 cites at Google Scholar
    1528% above average of year
    Last visited: Feb-2024
    Paper: DOI
  2. 2
    Jianbo Chen, Michael I. Jordan, and Martin J. Wainwright:
    HopSkipJumpAttack: A Query-Efficient Decision-Based Attack.
    IEEE Symposium on Security and Privacy (S&P), 2020
    628 cites at Google Scholar
    1118% above average of year
    Last visited: Mar-2024
    Paper: DOI
  3. 3
    Vale Tolpegin, Stacey Truex, Mehmet Emre Gursoy, and Ling Liu:
    Data Poisoning Attacks Against Federated Learning Systems.
    European Symposium on Research in Computer Security (ESORICS), 2020
    554 cites at Google Scholar
    975% above average of year
    Last visited: Feb-2024
    Paper: DOI
  4. 4
    Pratyush Mishra, Ryan Lehmkuhl, Akshayaram Srinivasan, Wenting Zheng, and Raluca Ada Popa:
    Delphi: A Cryptographic Inference Service for Neural Networks.
    USENIX Security Symposium, 2020
    407 cites at Google Scholar
    690% above average of year
    Last visited: Feb-2024
    Paper: DOI
  5. 5
    Marcel Keller:
    MP-SPDZ: A Versatile Framework for Multi-Party Computation.
    ACM Conference on Computer and Communications Security (CCS), 2020
    391 cites at Google Scholar
    659% above average of year
    Last visited: Feb-2024
    Paper: DOI
  6. 6
    Philip Daian, Steven Goldfeder, Tyler Kell, Yunqi Li, Xueyuan Zhao, Iddo Bentov, Lorenz Breidenbach, and Ari Juels:
    Flash Boys 2.0: Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability.
    IEEE Symposium on Security and Privacy (S&P), 2020
    380 cites at Google Scholar
    637% above average of year
    Last visited: Feb-2024
    Paper: DOI
  7. 7
    Matthew Jagielski, Nicholas Carlini, David Berthelot, Alex Kurakin, and Nicolas Papernot:
    High Accuracy and High Fidelity Extraction of Neural Networks.
    USENIX Security Symposium, 2020
    327 cites at Google Scholar
    534% above average of year
    Last visited: Feb-2024
    Paper: DOI
  8. 8
    James Henry Bell, Kallista A. Bonawitz, Adrià Gascón, Tancrède Lepoint, and Mariana Raykova:
    Secure Single-Server Aggregation with (Poly)Logarithmic Overhead.
    ACM Conference on Computer and Communications Security (CCS), 2020
    324 cites at Google Scholar
    529% above average of year
    Last visited: Mar-2024
    Paper: DOI
  9. 9
    Dingfan Chen, Ning Yu, Yang Zhang, and Mario Fritz:
    GAN-Leaks: A Taxonomy of Membership Inference Attacks against Generative Models.
    ACM Conference on Computer and Communications Security (CCS), 2020
    304 cites at Google Scholar
    490% above average of year
    Last visited: Feb-2024
    Paper: DOI
  10. 10
    Jo Van Bulck, Daniel Moghimi, Michael Schwarz, Moritz Lipp, Marina Minkin, Daniel Genkin, Yuval Yarom, Berk Sunar, Daniel Gruss, and Frank Piessens:
    LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection.
    IEEE Symposium on Security and Privacy (S&P), 2020
    293 cites at Google Scholar
    468% above average of year
    Last visited: Feb-2024
    Paper: DOI