Michael Hicks

9.4k total citations · 2 hit papers
165 papers, 5.4k citations indexed

About

Michael Hicks is a scholar working on Artificial Intelligence, Computer Networks and Communications and Hardware and Architecture. According to data from OpenAlex, Michael Hicks has authored 165 papers receiving a total of 5.4k indexed citations (citations by other indexed papers that have themselves been cited), including 117 papers in Artificial Intelligence, 78 papers in Computer Networks and Communications and 49 papers in Hardware and Architecture. Recurrent topics in Michael Hicks's work include Security and Verification in Computing (65 papers), Parallel Computing and Optimization Techniques (45 papers) and Distributed systems and fault tolerance (41 papers). Michael Hicks is often cited by papers focused on Security and Verification in Computing (65 papers), Parallel Computing and Optimization Techniques (45 papers) and Distributed systems and fault tolerance (41 papers). Michael Hicks collaborates with scholars based in United States, United Kingdom and Switzerland. Michael Hicks's co-authors include Jeffrey S. Foster, Scott Nettles, Iulian Neamtiu, Trevor Jim, Polyvios Pratikakis, Jonathan T. Moore, Dan Grossman, Nikhil Swamy, James Cheney and Nick L. Petroni and has published in prestigious journals such as Proceedings of the National Academy of Sciences, SHILAP Revista de lepidopterología and Communications of the ACM.

In The Last Decade

Michael Hicks

160 papers receiving 5.0k citations

Hit Papers

Cyclone: A Safe Dialect of C 2002 2026 2010 2018 2002 2018 100 200 300 400

Author Peers

Peers are selected by citation overlap in the author's most active subfields. citations · hero ref

Author Last Decade Papers Cites
Michael Hicks 3.5k 2.5k 2.1k 1.4k 1.3k 165 5.4k
George C. Necula 3.2k 0.9× 1.8k 0.7× 1.1k 0.5× 1.2k 0.9× 1.4k 1.1× 82 4.7k
Jeffrey S. Foster 2.5k 0.7× 1.3k 0.5× 2.2k 1.1× 903 0.6× 1.4k 1.1× 115 4.4k
Laurie Hendren 2.6k 0.7× 1.8k 0.7× 2.2k 1.1× 1.7k 1.2× 994 0.8× 152 4.9k
Yannis Smaragdakis 2.0k 0.6× 1.4k 0.6× 2.4k 1.1× 1.1k 0.7× 1.0k 0.8× 128 4.4k
Craig Chambers 3.9k 1.1× 2.5k 1.0× 2.4k 1.2× 2.6k 1.8× 550 0.4× 110 5.9k
Richard A. Kemmerer 2.4k 0.7× 3.1k 1.2× 1.4k 0.7× 584 0.4× 1.8k 1.4× 96 4.2k
Todd Millstein 1.8k 0.5× 1.5k 0.6× 1.3k 0.6× 765 0.5× 564 0.4× 115 3.5k
Steve Zdancewic 3.2k 0.9× 1.1k 0.4× 984 0.5× 957 0.7× 1.4k 1.1× 114 3.7k
Nickolai Zeldovich 3.3k 0.9× 3.1k 1.2× 3.0k 1.5× 1.1k 0.8× 911 0.7× 98 5.8k
Frank Piessens 4.0k 1.1× 1.6k 0.7× 2.0k 1.0× 866 0.6× 2.3k 1.8× 250 5.1k

Countries citing papers authored by Michael Hicks

Since Specialization
Citations

This map shows the geographic impact of Michael Hicks's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Michael Hicks with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Michael Hicks more than expected).

Fields of papers citing papers by Michael Hicks

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Michael Hicks. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Michael Hicks. The network helps show where Michael Hicks may publish in the future.

Co-authorship network of co-authors of Michael Hicks

This figure shows the co-authorship network connecting the top 25 collaborators of Michael Hicks. A scholar is included among the top collaborators of Michael Hicks based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Michael Hicks. Michael Hicks is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Disselkoen, Craig, et al.. (2024). How We Built Cedar: A Verification-Guided Approach. 351–357. 1 indexed citations
2.
Disselkoen, Craig, et al.. (2024). Cedar: A New Language for Expressive, Fast, Safe, and Analyzable Authorization. Proceedings of the ACM on Programming Languages. 8(OOPSLA1). 670–697.
3.
Hicks, Michael, et al.. (2023). Fuzzing Configurations of Program Options. ACM Transactions on Software Engineering and Methodology. 32(2). 1–21. 5 indexed citations
4.
Hicks, Michael, et al.. (2023). Fuzzing Configurations of Program Options - RCR Report. ACM Transactions on Software Engineering and Methodology. 32(2). 1–3. 1 indexed citations
5.
Heath, David, et al.. (2023). Symphony: Expressive Secure Multiparty Computation with Coordination. arXiv (Cornell University). 7(3). 2 indexed citations
6.
Chan, Anna, et al.. (2021). Benefits and Drawbacks of Adopting a Secure Programming Language: Rust as a Case Study. Symposium On Usable Privacy and Security. 597–616. 9 indexed citations
7.
Tian, Dave, Kristopher Micinski, Anurag Yadav, et al.. (2020). {BigMAC}: {Fine-Grained} Policy Analysis of Android Firmware. USENIX Security Symposium. 271–287. 8 indexed citations
8.
Votipka, Daniel, et al.. (2020). Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It.. USENIX Security Symposium. 109–126. 10 indexed citations
9.
Hung, Shih-Han, et al.. (2019). Quantitative robustness analysis of quantum programs. UTS ePRESS (University of Technology Sydney). 19 indexed citations
10.
Cunningham, Robert K., et al.. (2016). IEEE SecDev 2016: Prioritizing Secure Development. IEEE Security & Privacy. 14(4). 82–84. 2 indexed citations
11.
Rastogi, Aseem, Matthew A. Hammer, & Michael Hicks. (2014). Wysteria: A Programming Language for Generic, Mixed-Mode Multiparty Computations. 655–670. 70 indexed citations
12.
Mardziel, Piotr, Mário S. Alvim, Michael Hicks, & Michael R. Clarkson. (2014). Quantifying Information Flow for Dynamic Secrets. 540–555. 24 indexed citations
13.
Foster, Jeffrey S., et al.. (2013). Expositor: scriptable time-travel debugging with first-class traces. International Conference on Software Engineering. 352–361. 20 indexed citations
14.
Hicks, Michael. (2007). Proceedings of the 2007 workshop on Programming languages and analysis for security. 9 indexed citations
15.
Swamy, Nikhil, Michael Hicks, Greg Morrisett, Dan Grossman, & Trevor Jim. (2006). Safe manual memory management in Cyclone. Science of Computer Programming. 62(2). 122–144. 36 indexed citations
16.
Neamtiu, Iulian, Michael Hicks, Gareth Stoyle, & Manuel Oriol. (2006). Practical dynamic software updating for C. 72–83. 95 indexed citations
17.
Swamy, Nikhil, et al.. (2005). Dynamic inference of polymorphic lock types. Science of Computer Programming. 58(3). 366–383. 13 indexed citations
18.
Jim, Trevor, et al.. (2002). Cyclone: A Safe Dialect of C. USENIX Annual Technical Conference. 275–288. 426 indexed citations breakdown →
19.
Hicks, Michael, Jonathan T. Moore, & Scott Nettles. (2001). Dynamic software updating. ACM SIGPLAN Notices. 36(5). 13–23. 15 indexed citations
20.
Hicks, Michael, et al.. (1998). The SwitchWare Active Network Implementation. 4 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026