Thomas Ristenpart
Thomas Ristenpart
Associate Professor of Computer Science, Cornell Tech
Verified email at cornell.edu - Homepage
Title
Cited by
Cited by
Year
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds
T Ristenpart, E Tromer, H Shacham, S Savage
Proceedings of the 16th ACM conference on Computer and communications …, 2009
24492009
Cross-VM side channels and their use to extract private keys
Y Zhang, A Juels, MK Reiter, T Ristenpart
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
7992012
Model inversion attacks that exploit confidence information and basic countermeasures
M Fredrikson, S Jha, T Ristenpart
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
7572015
Stealing machine learning models via prediction apis
F Tramèr, F Zhang, A Juels, MK Reiter, T Ristenpart
25th {USENIX} Security Symposium ({USENIX} Security 16), 601-618, 2016
6682016
Message-locked encryption and secure deduplication
M Bellare, S Keelveedhi, T Ristenpart
Annual international conference on the theory and applications of …, 2013
6312013
DupLESS: server-aided encryption for deduplicated storage
S Keelveedhi, M Bellare, T Ristenpart
22nd {USENIX} Security Symposium ({USENIX} Security 13), 179-194, 2013
6242013
Privacy in pharmacogenetics: an end-to-end case study of personalized warfarin dosing
M Fredrikson, E Lantz, S Jha, S Lin, D Page, T Ristenpart
USENIX Security, 2014
3652014
Peek-a-boo, i still see you: Why efficient traffic analysis countermeasures fail
KP Dyer, SE Coull, T Ristenpart, T Shrimpton
2012 IEEE symposium on security and privacy, 332-346, 2012
3362012
Leakage-abuse attacks against searchable encryption
D Cash, P Grubbs, J Perry, T Ristenpart
Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015
3302015
Cross-tenant side-channel attacks in PaaS clouds
Y Zhang, A Juels, MK Reiter, T Ristenpart
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
3182014
Format-preserving encryption
M Bellare, T Ristenpart, P Rogaway, T Stegers
International workshop on selected areas in cryptography, 295-312, 2009
2392009
Multi-property-preserving hash domain extension and the EMD transform
M Bellare, T Ristenpart
International Conference on the Theory and Application of Cryptology and …, 2006
2032006
More for your money: exploiting performance heterogeneity in public clouds
B Farley, A Juels, V Varadarajan, T Ristenpart, KD Bowers, MM Swift
Proceedings of the Third ACM Symposium on Cloud Computing, 1-14, 2012
1842012
Resource-freeing attacks: improve your cloud performance (at your neighbor's expense)
V Varadarajan, T Kooburat, B Farley, T Ristenpart, MM Swift
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
1822012
Deterministic encryption: Definitional equivalences and constructions without random oracles
M Bellare, M Fischlin, A O’Neill, T Ristenpart
Annual International Cryptology Conference, 360-378, 2008
1812008
Peeking behind the curtains of serverless platforms
L Wang, M Li, Y Zhang, T Ristenpart, M Swift
2018 {USENIX} Annual Technical Conference ({USENIX}{ATC} 18), 133-146, 2018
1692018
Machine learning models that remember too much
C Song, T Ristenpart, V Shmatikov
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1532017
Careful with composition: Limitations of the indifferentiability framework
T Ristenpart, H Shacham, T Shrimpton
Annual International Conference on the Theory and Applications of …, 2011
1522011
Hedged public-key encryption: How to protect against bad randomness
M Bellare, Z Brakerski, M Naor, T Ristenpart, G Segev, H Shacham, ...
International Conference on the Theory and Application of Cryptology and …, 2009
1482009
A placement vulnerability study in multi-tenant public clouds
V Varadarajan, Y Zhang, T Ristenpart, M Swift
24th {USENIX} Security Symposium ({USENIX} Security 15), 913-928, 2015
1472015
The system can't perform the operation now. Try again later.
Articles 1–20