Follow
Thomas Ristenpart
Thomas Ristenpart
Professor of Computer Science, Cornell Tech
Verified email at cornell.edu - Homepage
Title
Cited by
Cited by
Year
Model inversion attacks that exploit confidence information and basic countermeasures
M Fredrikson, S Jha, T Ristenpart
Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015
29762015
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds
T Ristenpart, E Tromer, H Shacham, S Savage
Proceedings of the 16th ACM conference on Computer and communications …, 2009
29732009
Stealing machine learning models via prediction {APIs}
F Tramèr, F Zhang, A Juels, MK Reiter, T Ristenpart
25th USENIX security symposium (USENIX Security 16), 601-618, 2016
20652016
Cross-VM side channels and their use to extract private keys
Y Zhang, A Juels, MK Reiter, T Ristenpart
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
10482012
Privacy in pharmacogenetics: an end-to-end case study of personalized warfarin dosing
M Fredrikson, E Lantz, S Jha, S Lin, D Page, T Ristenpart
USENIX Security, 2014
10012014
Message-locked encryption and secure deduplication
M Bellare, S Keelveedhi, T Ristenpart
Annual international conference on the theory and applications of …, 2013
9152013
{DupLESS}:{Server-Aided} encryption for deduplicated storage
S Keelveedhi, M Bellare, T Ristenpart
22nd USENIX security symposium (USENIX security 13), 179-194, 2013
8962013
Leakage-abuse attacks against searchable encryption
D Cash, P Grubbs, J Perry, T Ristenpart
Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015
6942015
Peeking behind the curtains of serverless platforms
L Wang, M Li, Y Zhang, T Ristenpart, M Swift
2018 USENIX Annual Technical Conference (USENIX ATC 18), 133-146, 2018
6482018
Peek-a-boo, i still see you: Why efficient traffic analysis countermeasures fail
KP Dyer, SE Coull, T Ristenpart, T Shrimpton
2012 IEEE symposium on security and privacy, 332-346, 2012
6012012
Machine learning models that remember too much
C Song, T Ristenpart, V Shmatikov
Proceedings of the 2017 ACM SIGSAC Conference on computer and communications …, 2017
5742017
Cross-tenant side-channel attacks in PaaS clouds
Y Zhang, A Juels, MK Reiter, T Ristenpart
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
4952014
“A Stalker's Paradise” How Intimate Partner Abusers Exploit Technology
D Freed, J Palmer, D Minchala, K Levy, T Ristenpart, N Dell
Proceedings of the 2018 CHI conference on human factors in computing systems …, 2018
3452018
Format-preserving encryption
M Bellare, T Ristenpart, P Rogaway, T Stegers
Selected Areas in Cryptography: 16th Annual International Workshop, SAC 2009 …, 2009
3352009
FIE on Firmware: Finding Vulnerabilities in Embedded Systems Using Symbolic Execution.
D Davidson, B Moench, S Jha, T Ristenpart
USENIX Security Symposium, 463-478, 2013
2812013
Leakage-abuse attacks against order-revealing encryption
P Grubbs, K Sekniqi, V Bindschaedler, M Naveed, T Ristenpart
2017 IEEE symposium on security and privacy (SP), 655-672, 2017
2472017
Resource-freeing attacks: improve your cloud performance (at your neighbor's expense)
V Varadarajan, T Kooburat, B Farley, T Ristenpart, MM Swift
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
2362012
Digital technologies and intimate partner violence: A qualitative analysis with multiple stakeholders
D Freed, J Palmer, DE Minchala, K Levy, T Ristenpart, N Dell
Proceedings of the ACM on human-computer interaction 1 (CSCW), 1-22, 2017
2302017
A placement vulnerability study in {Multi-Tenant} public clouds
V Varadarajan, Y Zhang, T Ristenpart, M Swift
24th USENIX Security Symposium (USENIX Security 15), 913-928, 2015
2192015
Multi-property-preserving hash domain extension and the EMD transform
M Bellare, T Ristenpart
Advances in Cryptology–ASIACRYPT 2006: 12th International Conference on the …, 2006
2142006
The system can't perform the operation now. Try again later.
Articles 1–20