Follow
Thomas Ristenpart
Thomas Ristenpart
Associate Professor of Computer Science, Cornell Tech
Verified email at cornell.edu - Homepage
Title
Cited by
Cited by
Year
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds
T Ristenpart, E Tromer, H Shacham, S Savage
Proceedings of the 16th ACM conference on Computer and communications …, 2009
28792009
Model inversion attacks that exploit confidence information and basic countermeasures
M Fredrikson, S Jha, T Ristenpart
Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015
22642015
Stealing Machine Learning Models via Prediction APIs.
F Tramèr, F Zhang, A Juels, MK Reiter, T Ristenpart
USENIX security symposium 16, 601-618, 2016
16302016
Cross-VM side channels and their use to extract private keys
Y Zhang, A Juels, MK Reiter, T Ristenpart
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
10022012
Message-locked encryption and secure deduplication
M Bellare, S Keelveedhi, T Ristenpart
Advances in Cryptology–EUROCRYPT 2013: 32nd Annual International Conference …, 2013
8452013
Privacy in pharmacogenetics: an end-to-end case study of personalized warfarin dosing
M Fredrikson, E Lantz, S Jha, S Lin, D Page, T Ristenpart
USENIX Security, 2014
8292014
DupLESS: Server-Aided Encryption for Deduplicated Storage.
M Bellare, S Keelveedhi, T Ristenpart
IACR Cryptol. ePrint Arch. 2013, 429, 2013
8262013
Leakage-abuse attacks against searchable encryption
D Cash, P Grubbs, J Perry, T Ristenpart
Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015
5972015
Peek-a-boo, i still see you: Why efficient traffic analysis countermeasures fail
KP Dyer, SE Coull, T Ristenpart, T Shrimpton
2012 IEEE symposium on security and privacy, 332-346, 2012
5402012
Peeking behind the curtains of serverless platforms
L Wang, M Li, Y Zhang, T Ristenpart, M Swift
2018 {USENIX} Annual Technical Conference ({USENIX}{ATC} 18), 133-146, 2018
5252018
Cross-tenant side-channel attacks in PaaS clouds
Y Zhang, A Juels, MK Reiter, T Ristenpart
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
4652014
Machine learning models that remember too much
C Song, T Ristenpart, V Shmatikov
Proceedings of the 2017 ACM SIGSAC Conference on computer and communications …, 2017
4422017
Format-preserving encryption
M Bellare, T Ristenpart, P Rogaway, T Stegers
Selected Areas in Cryptography: 16th Annual International Workshop, SAC 2009 …, 2009
3052009
“A Stalker's Paradise” How Intimate Partner Abusers Exploit Technology
D Freed, J Palmer, D Minchala, K Levy, T Ristenpart, N Dell
Proceedings of the 2018 CHI conference on human factors in computing systems …, 2018
2772018
FIE on Firmware: Finding Vulnerabilities in Embedded Systems Using Symbolic Execution.
D Davidson, B Moench, S Jha, T Ristenpart
USENIX Security Symposium, 463-478, 2013
2372013
Resource-freeing attacks: improve your cloud performance (at your neighbor's expense)
V Varadarajan, T Kooburat, B Farley, T Ristenpart, MM Swift
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
2302012
Leakage-abuse attacks against order-revealing encryption
P Grubbs, K Sekniqi, V Bindschaedler, M Naveed, T Ristenpart
2017 IEEE symposium on security and privacy (SP), 655-672, 2017
2162017
Multi-property-preserving hash domain extension and the EMD transform
M Bellare, T Ristenpart
Advances in Cryptology–ASIACRYPT 2006: 12th International Conference on the …, 2006
2112006
More for your money: exploiting performance heterogeneity in public clouds
B Farley, A Juels, V Varadarajan, T Ristenpart, KD Bowers, MM Swift
Proceedings of the Third ACM Symposium on Cloud Computing, 1-14, 2012
2102012
A placement vulnerability study in multi-tenant public clouds
V Varadarajan, Y Zhang, T Ristenpart, M Swift
24th {USENIX} Security Symposium ({USENIX} Security 15), 913-928, 2015
2082015
The system can't perform the operation now. Try again later.
Articles 1–20