Start · Paper List (Normalized: Citations/Year) · Papers/Citations per Year (Plot) · Names in Top-h5 · Person Citations per Year · Top-h5 Papers per Person
Pos Paper Citations Year
1 Spectre attacks: Exploiting speculative execution 3924 2020
2 Power analysis attacks: Revealing the secrets of smart cards 3378 2007
3 Meltdown: Reading kernel memory from user space 3215 2020
4 Flush+ flush: A fast and stealthy cache attack 963 2016
5 Cache template attacks: Automating attacks on inclusive Last-Level caches 702 2015
6 DRAMA: Exploiting DRAM addressing for Cross-CPU attacks 696 2016
7 ARMageddon: Cache attacks on mobile devices 670 2016
8 Rowhammer. js: A remote software-induced fault attack in javascript 649 2016
9 Malware guard extension: Using SGX to conceal cache attacks 614 2017
10 Masked dual-rail pre-charge logic: DPA-resistance without routing constraints 599 2005
11 Successfully attacking masked AES hardware implementations 550 2005
12 Hardware countermeasures against DPA–a statistical analysis of their effectiveness 478 2004
13 A side-channel analysis resistant description of the AES S-box 463 2005
14 Side-channel leakage of masked CMOS gates 454 2005
15 An AES smart card implementation resistant to power analysis attacks 438 2006
16 Domain-oriented masking: Compact masked hardware implementations with arbitrary protection order 404 2016
17 Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR 396 2016
18 Systematic classification of side-channel attacks: A case study for mobile devices 393 2017
19 Kaslr is dead: long live kaslr 368 2017
20 A simple power-analysis (SPA) attack on implementations of the AES key expansion 362 2002
21 ScatterCache: Thwarting Cache Attacks via Cache Set Randomization 317 2019
22 One for all–all for one: unifying standard differential power analysis attacks 304 2011
23 A highly regular and scalable AES hardware architecture 299 2003
24 Single-trace side-channel attacks on masked lattice-based encryption 268 2017
25 SIFA: exploiting ineffective fault inductions on symmetric cryptography 267 2018
26 Practical second-order DPA attacks for masked smart card implementations of block ciphers 266 2006
27 Hello from the other side: SSH over robust cache covert channels in the cloud 243 2017
28 The world is not enough: Another look on second-order DPA 232 2010
29 Fantastic timers and where to find them: High-resolution microarchitectural attacks in JavaScript 214 2017
30 Template attacks on masking—resistance is futile 199 2007
31 An efficient side-channel protected AES implementation with arbitrary protection order 192 2017
32 Evaluation of the masked logic style MDPL on a prototype chip 189 2007
33 An IoT endpoint system-on-chip for secure and energy-efficient near-sensor analytics 175 2017
34 Timber-v: Tag-isolated memory bringing fine-grained enclaves to risc-v 173 2019
35 Donky: Domain Keys–Efficient In-Process Isolation for RISC-V and x86 163 2020
36 Pinpointing the side-channel leakage of masked AES hardware implementations 159 2006
37 Formal verification of masked hardware implementations in the presence of glitches 157 2018
38 Localized electromagnetic analysis of cryptographic implementations 151 2012
39 Power analysis attacks and countermeasures 140 2007
40 Clustering algorithms for non-profiled single-execution attacks on exponentiations 130 2013
41 Statistical ineffective fault attacks on masked AES with fault countermeasures 126 2018
42 Isap v2. 0 125 2020
43 Power and EM attacks on passive RFID devices 120 2007
44 ISAP–towards side-channel secure authenticated encryption 116 2017
45 DATA–differential address trace analysis: Finding address-based Side-Channels in binaries 115 2018
46 Protecting AES software implementations on 32-bit processors against power analysis 112 2007
47 A new approach to DNS security (DNSSEC) 108 2001
48 Efficient AES implementations on ASICs and FPGAs 104 2004
49 Coco:Co-Design and Co-Verification of masked software implementations on CPUs 100 2021
50 Cryptographic Hardware and Embedded Systems: CHES 2010 99 2010
51 Keydrown: Eliminating software-based keystroke timing side-channel attacks 98 2018
52 Practical memory deduplication attacks in sandboxed Javascript 97 2015
53 Practical keystroke timing attacks in sandboxed javascript 95 2017
54 Jenny: Securing syscalls for PKU-based memory isolation systems 92 2022
55 Rolling colors: Adversarial laser exploits against traffic light recognition 90 2022
56 Reconciling masking in hardware and software 86 2017
57 Automated detection, exploitation, and elimination of double-fetch bugs using modern cpu features 74 2018
58 HECTOR-V: A heterogeneous CPU architecture for a secure RISC-V execution environment 73 2021
59 Higher-order side-channel protected implementations of KECCAK 73 2017
60 Sponge-based control-flow protection for IoT devices 73 2018
61 Secure and efficient masking of AES-a mission impossible? 72 2004
62 Exploiting data-usage statistics for website fingerprinting attacks on Android 66 2016
63 A unified masking approach 64 2018
64 Towards fresh and hybrid re-keying schemes with beyond birthday security 63 2015
65 Susceptibility of eSTREAM candidates towards side channel analysis 61 2008
66 Spectre attacks: Exploiting speculative execution. ArXiv e-prints (Jan 60 2018
67 Procharvester: Fully automated analysis of procfs side-channel leaks on android 55 2018
68 Collide+ Power: Leaking inaccessible data with software-based power side channels 53 2023
69 Towards fresh re-keying with leakage-resilient PRFs: cipher design principles and analysis 53 2014
70 Protecting the control flow of embedded processors against fault attacks 52 2015
71 Generating a session key for authentication and secure data transfer 50 2014
72 Scandroid: Automated side-channel analysis of android apis 47 2018
73 Transparent memory encryption and authentication 45 2017
74 Exploiting radiated emissions-EM attacks on cryptographic ICs 44 2003
75 Malware Guard Extension: abusing Intel SGX to conceal cache attacks 42 2020
76 Dependable Internet of Things for Networked Cars 41 2017
77 Fault attacks on nonce-based authenticated encryption: Application to keyak and ketje 41 2018
78 Implementation aspects of the DPA-resistant logic style MDPL 40 2006
79 A Masked AES ASIC Implementation 39 2004
80 Cryptag: Thwarting physical and logical memory vulnerabilities using cryptographically colored memory 39 2021
81 Side channel analysis resistant design flow 39 2006
82 MEAS: memory encryption and authentication secure against side-channel attacks 38 2019
83 On the security of fresh re-keying to counteract side-channel and fault attacks 36 2014
84 Concealing secrets in embedded processors designs 34 2016
85 Enhancing side-channel analysis of binary-field multiplication with bit reliability 34 2016
86 Protecting risc-v processors against physical attacks 34 2019
87 Scatter and split securely: Defeating cache contention and occupancy attacks 32 2023
88 A novel CMOS logic style with data independent power consumption 30 2005
89 SLUBStick: Arbitrary Memory Writes through Practical Software Cross-Cache Attacks within the Linux Kernel 30 2024
90 Securing implementations of block ciphers against side-channel attacks 29 2005
91 Dope: Domain protection enforcement with pks 28 2023
92 Riding the waves towards generic single-cycle masking in hardware 28 2022
93 Exploiting the physical disparity: Side-channel attacks on memory encryption 27 2016
94 First-order masking with only two random bits 27 2019
95 Secure and efficient software masking on superscalar pipelined processors 26 2021
96 Exploiting the difference of side-channel leakages 24 2012
97 Multi-tag: A hardware-software co-design for memory safety based on multi-granular memory tagging 24 2023
98 SYNFI: pre-silicon fault analysis of an open-source secure element 24 2022
99 i Popp T 23 2007
100 Formal verification of arithmetic masking in hardware and software 21 2023
101 Arithmetic logic units with high error detection rates to counteract fault attacks 20 2011
102 Distributed compiling process with instruction signature support 20 2014
103 Ec-cfi: Control-flow integrity via code encryption counteracting fault attacks 18 2023
104 FIPAC: Thwarting fault-and software-induced control-flow attacks with arm pointer authentication 18 2022
105 KernelSnitch: side-channel attacks on kernel data structures 18 2025
106 Securing conditional branches in the presence of fault attacks 18 2018
107 Fault-resistant partitioning of secure cpus for system co-verification against faults 17 2024
108 On the duality of probing and fault attacks 17 2010
109 Power contracts: Provably complete power leakage models for processors 17 2022
110 Practical attacks on masked hardware 17 2009
111 Protecting indirect branches against fault attacks using ARM pointer authentication 17 2021
112 Servas! secure enclaves via risc-v authenticryption shield 16 2021
113 Compress: Generate small and fast masked pipelined circuits 14 2024
114 On the relationship between correlation power analysis and the stochastic approach: an ASIC designer perspective 14 2013
115 Power-related side-channel attacks using the Android sensor framework 14 2025
116 Program-instruction-controlled instruction flow supervision 14 2019
117 Beyond the edges of kernel control-flow hijacking protection with hek-cfi 13 2024
118 Instruction encryption/decryption arrangement and method with iterative encryption/decryption key update 13 2014
119 Pointing in the right direction-securing memory accesses in a faulty world 13 2018
120 Smooth passage with the guards: Second-order hardware masking of the AES with low randomness and low latency 13 2024
121 Spear-v: Secure and practical enclave architecture for risc-v 13 2023
122 Leakage bounds for gaussian side channels 12 2017
123 Masked nonlinear feedback shift register 12 2015
124 Power analysis attacks: revealing the secrets of smart cards 12 2007
125 Cryptographically enforced memory safety 11 2023
126 Defects-in-Depth: Analyzing the Integration of Effective Defenses against One-Day Exploits in Android Kernels 10 2024
127 HashTag: Hash-based Integrity Protection for Tagged Architectures 10 2023
128 Investigations of power analysis attacks and countermeasures for ARIA 10 2006
129 Memory tagging using cryptographic integrity on commodity x86 cpus 10 2024
130 Side-channel plaintext-recovery attacks on leakage-resilient encryption 10 2017
131 Smart Card Research and Advanced Applications: 11th International Conference, CARDIS 2012, Graz, Austria, November 28-30, 2012, Revised Selected Papers 10 2013
132 Secwalk: Protecting page table walks against fault attacks 9 2021
133 Voodoo: Memory Tagging, Authenticated Encryption, and Error Correction through MAGIC 9 2024
134 Compress: Reducing Area and Latency of Masked Pipelined Circuits 8 2023
135 Memes: Memory encryption-based memory safety on commodity hardware 8 2023
136 SCRAMBLE-CFI: mitigating fault-induced control-flow attacks on OpenTitan 8 2023
137 Sharing independence & relabeling: Efficient formal verification of higher-order masking 8 2018
138 TME-box: scalable in-process isolation through intel TME-MK memory encryption 8 2024
139 High speed ASIC implementations of leakage-resilient cryptography 7 2018
140 Keydrown: eliminating keystroke timing side-channel attacks 7 2017
141 Multi-core data analytics SoC with a flexible 1.76 Gbit/s AES-XTS cryptographic accelerator in 65 nm CMOS 7 2017
142 Submission to NIST 7 2019
143 Calculation and simulation of the susceptibility of cryptographic devices to power-analysis attacks 6 2018
144 Randomized memory access 6 2018
145 Exact Soft Analytical Side-Channel Attacks using Tractable Circuits 5 2024
146 Method and apparatus for data processing 5 2015
147 Quantile: Quantifying information leakage 5 2024
148 SCFI: State machine control-flow hardening against fault attacks 5 2023
149 Statistical characteristics of power traces 5 2007
150 When Good Kernel Defenses Go Bad: Reliable and Stable Kernel Exploits via Defense-AmplifiedTLBSide-Channel Leaks 5 2025
151 All for one-one for all: Unifying univariate DPA attacks 4 2011
152 Counteracting power analysis attacks by masking 4 2009
153 Securing memory encryption and authentication against side-channel attacks using unprotected primitives 4 2017
154 Security aspects of masking on FPGAs 4 2024
155 Signature update by code transformation 4 2016
156 The Doom of Device Drivers: Your Android Device (Most Likely) has N-Day Kernel Vulnerabilities 4 2025
157 Towards leakage simulators that withstand the correlation distinguisher 4 2014
158 TVLA on selected NIST LWC finalists 4 2022
159 Cache Template Attacks 3 2022
160 Detection of Intrusions and Malware, and Vulnerability Assessment 3 2016
161 Die physikalische Sicherheit eingebetteter Systeme 3 2012
162 KASLR is Dead: Long Live KASLR 3 2017
163 Secure Context Switching of Masked Software Implementations 3 2023
164 SFP: Providing System Call Flow Protection against Software and Fault Attacks 3 2022
165 Apparatus and method for detecting integrity violation 2 2019
166 ChoiceJacking: Compromising Mobile Devices through Malicious Chargers like a Decade ago 2 2025
167 Cryptographic Least Privilege Enforcement for Scalable Memory Isolation 2 2025
168 Keeping Secrets on Low-Cost Chips 2 2013
169 On loopy belief propagation for sascas: An analysis and empirical study of the inference problem 2 2025
170 Secure Implementation of Cryptographic Algorithms 2 2012
171 Simple Power Analysis 2 2007
172 Small faults grow up-verification of error masking robustness in arithmetically encoded programs 2 2019
173 Smart card research and advanced applications 2 2012
174 Tutorial T1: Designing Secure SoCs 2 2007
Imprint