Follow
Thomas Ristenpart
Thomas Ristenpart
Professor of Computer Science, Cornell Tech
Verified email at cornell.edu - Homepage
Title
Cited by
Cited by
Year
Model inversion attacks that exploit confidence information and basic countermeasures
M Fredrikson, S Jha, T Ristenpart
Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015
34422015
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds
T Ristenpart, E Tromer, H Shacham, S Savage
Proceedings of the 16th ACM conference on Computer and communications …, 2009
30462009
Stealing machine learning models via prediction {APIs}
F Tramèr, F Zhang, A Juels, MK Reiter, T Ristenpart
25th USENIX security symposium (USENIX Security 16), 601-618, 2016
23232016
Privacy in pharmacogenetics: an end-to-end case study of personalized warfarin dosing
M Fredrikson, E Lantz, S Jha, S Lin, D Page, T Ristenpart
USENIX Security, 2014
11142014
Cross-VM side channels and their use to extract private keys
Y Zhang, A Juels, MK Reiter, T Ristenpart
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
10732012
Message-locked encryption and secure deduplication
M Bellare, S Keelveedhi, T Ristenpart
Annual international conference on the theory and applications of …, 2013
9632013
{DupLESS}:{Server-Aided} encryption for deduplicated storage
S Keelveedhi, M Bellare, T Ristenpart
22nd USENIX security symposium (USENIX security 13), 179-194, 2013
9322013
Leakage-abuse attacks against searchable encryption
D Cash, P Grubbs, J Perry, T Ristenpart
Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015
7532015
Peeking behind the curtains of serverless platforms
L Wang, M Li, Y Zhang, T Ristenpart, M Swift
2018 USENIX annual technical conference (USENIX ATC 18), 133-146, 2018
7392018
Peek-a-boo, i still see you: Why efficient traffic analysis countermeasures fail
KP Dyer, SE Coull, T Ristenpart, T Shrimpton
2012 IEEE symposium on security and privacy, 332-346, 2012
6492012
Machine learning models that remember too much
C Song, T Ristenpart, V Shmatikov
Proceedings of the 2017 ACM SIGSAC Conference on computer and communications …, 2017
6412017
Cross-tenant side-channel attacks in PaaS clouds
Y Zhang, A Juels, MK Reiter, T Ristenpart
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
5112014
“A Stalker's Paradise” How Intimate Partner Abusers Exploit Technology
D Freed, J Palmer, D Minchala, K Levy, T Ristenpart, N Dell
Proceedings of the 2018 CHI conference on human factors in computing systems …, 2018
3752018
Format-preserving encryption
M Bellare, T Ristenpart, P Rogaway, T Stegers
Selected Areas in Cryptography: 16th Annual International Workshop, SAC 2009 …, 2009
3582009
FIE on Firmware: Finding Vulnerabilities in Embedded Systems Using Symbolic Execution.
D Davidson, B Moench, S Jha, T Ristenpart
USENIX Security Symposium, 463-478, 2013
3002013
Leakage-abuse attacks against order-revealing encryption
P Grubbs, K Sekniqi, V Bindschaedler, M Naveed, T Ristenpart
2017 IEEE symposium on security and privacy (SP), 655-672, 2017
2652017
Digital technologies and intimate partner violence: A qualitative analysis with multiple stakeholders
D Freed, J Palmer, DE Minchala, K Levy, T Ristenpart, N Dell
Proceedings of the ACM on human-computer interaction 1 (CSCW), 1-22, 2017
2452017
Resource-freeing attacks: improve your cloud performance (at your neighbor's expense)
V Varadarajan, T Kooburat, B Farley, T Ristenpart, MM Swift
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
2362012
A placement vulnerability study in {Multi-Tenant} public clouds
V Varadarajan, Y Zhang, T Ristenpart, M Swift
24th USENIX Security Symposium (USENIX Security 15), 913-928, 2015
2302015
Controlling {UAVs} with sensor input spoofing attacks
D Davidson, H Wu, R Jellinek, V Singh, T Ristenpart
10th USENIX workshop on offensive technologies (WOOT 16), 2016
2162016
The system can't perform the operation now. Try again later.
Articles 1–20