Seguir
Thomas Ristenpart
Thomas Ristenpart
Professor of Computer Science, Cornell Tech
Dirección de correo verificada de cornell.edu - Página principal
Título
Citado por
Citado por
Año
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds
T Ristenpart, E Tromer, H Shacham, S Savage
Proceedings of the 16th ACM conference on Computer and communications …, 2009
29502009
Model inversion attacks that exploit confidence information and basic countermeasures
M Fredrikson, S Jha, T Ristenpart
Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015
28822015
Stealing machine learning models via prediction {APIs}
F Tramèr, F Zhang, A Juels, MK Reiter, T Ristenpart
25th USENIX security symposium (USENIX Security 16), 601-618, 2016
19902016
Cross-VM side channels and their use to extract private keys
Y Zhang, A Juels, MK Reiter, T Ristenpart
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
10382012
Privacy in pharmacogenetics: an end-to-end case study of personalized warfarin dosing
M Fredrikson, E Lantz, S Jha, S Lin, D Page, T Ristenpart
USENIX Security, 2014
9772014
Message-locked encryption and secure deduplication
M Bellare, S Keelveedhi, T Ristenpart
Annual international conference on the theory and applications of …, 2013
8962013
{DupLESS}:{Server-Aided} encryption for deduplicated storage
S Keelveedhi, M Bellare, T Ristenpart
22nd USENIX security symposium (USENIX security 13), 179-194, 2013
8772013
Leakage-abuse attacks against searchable encryption
D Cash, P Grubbs, J Perry, T Ristenpart
Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015
6832015
Peeking behind the curtains of serverless platforms
L Wang, M Li, Y Zhang, T Ristenpart, M Swift
2018 USENIX Annual Technical Conference (USENIX ATC 18), 133-146, 2018
6192018
Peek-a-boo, i still see you: Why efficient traffic analysis countermeasures fail
KP Dyer, SE Coull, T Ristenpart, T Shrimpton
2012 IEEE symposium on security and privacy, 332-346, 2012
5952012
Machine learning models that remember too much
C Song, T Ristenpart, V Shmatikov
Proceedings of the 2017 ACM SIGSAC Conference on computer and communications …, 2017
5572017
Cross-tenant side-channel attacks in PaaS clouds
Y Zhang, A Juels, MK Reiter, T Ristenpart
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
4932014
“A Stalker's Paradise” How Intimate Partner Abusers Exploit Technology
D Freed, J Palmer, D Minchala, K Levy, T Ristenpart, N Dell
Proceedings of the 2018 CHI conference on human factors in computing systems …, 2018
3312018
Format-preserving encryption
M Bellare, T Ristenpart, P Rogaway, T Stegers
Selected Areas in Cryptography: 16th Annual International Workshop, SAC 2009 …, 2009
3312009
FIE on Firmware: Finding Vulnerabilities in Embedded Systems Using Symbolic Execution.
D Davidson, B Moench, S Jha, T Ristenpart
USENIX Security Symposium, 463-478, 2013
2742013
Leakage-abuse attacks against order-revealing encryption
P Grubbs, K Sekniqi, V Bindschaedler, M Naveed, T Ristenpart
2017 IEEE symposium on security and privacy (SP), 655-672, 2017
2382017
Resource-freeing attacks: improve your cloud performance (at your neighbor's expense)
V Varadarajan, T Kooburat, B Farley, T Ristenpart, MM Swift
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
2342012
Digital technologies and intimate partner violence: A qualitative analysis with multiple stakeholders
D Freed, J Palmer, DE Minchala, K Levy, T Ristenpart, N Dell
Proceedings of the ACM on human-computer interaction 1 (CSCW), 1-22, 2017
2212017
A placement vulnerability study in {Multi-Tenant} public clouds
V Varadarajan, Y Zhang, T Ristenpart, M Swift
24th USENIX Security Symposium (USENIX Security 15), 913-928, 2015
2182015
Multi-property-preserving hash domain extension and the EMD transform
M Bellare, T Ristenpart
Advances in Cryptology–ASIACRYPT 2006: 12th International Conference on the …, 2006
2132006
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20