default search action
Thomas Ristenpart
Person information
- affiliation: Cornell Tech, New York, NY, USA
- affiliation: University of Wisconsin-Madison, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j9]Emily Tseng, Rosanna Bellini, Yeuk-Yu Lee, Alana Ramjit, Thomas Ristenpart, Nicola Dell:
Data Stewardship in Clinical Computer Security: Balancing Benefit and Burden in Participatory Systems. Proc. ACM Hum. Comput. Interact. 8(CSCW1): 1-29 (2024) - [c104]Avital Shafran, Eran Malach, Thomas Ristenpart, Gil Segev, Stefano Tessaro:
Is ML-Based Cryptanalysis Inherently Limited? Simulating Cryptographic Adversaries via Gradient-Based Methods. CRYPTO (6) 2024: 37-71 - [c103]Rosanna Bellini, Emily Tseng, Noel Warford, Alaa Daffalla, Tara Matthews, Sunny Consolvo, Jill Palzkill Woelfer, Patrick Gage Kelley, Michelle L. Mazurek, Dana Cuomo, Nicola Dell, Thomas Ristenpart:
SoK: Safer Digital-Safety Research Involving At-Risk Users. SP 2024: 635-654 - [c102]Armin Namavari, Barry Wang, Sanketh Menda, Ben Nassi, Nirvan Tyagi, James Grimmelmann, Amy X. Zhang, Thomas Ristenpart:
Private Hierarchical Governance for Encrypted Messaging. SP 2024: 2610-2629 - [c101]Andrés Fábrega, Carolina Ortega Pérez, Armin Namavari, Ben Nassi, Rachit Agarwal, Thomas Ristenpart:
Injection Attacks Against End-to-End Encrypted Applications. SP 2024: 2648-2665 - [c100]Andrés Fábrega, Armin Namavari, Rachit Agarwal, Ben Nassi, Thomas Ristenpart:
Exploiting Leakage in Password Managers via Injection Attacks. USENIX Security Symposium 2024 - [c99]Lana Ramjit, Natalie Dolci, Francesca Rossi, Ryan Garcia, Thomas Ristenpart, Dana Cuomo:
Navigating Traumatic Stress Reactions During Computer Security Interventions. USENIX Security Symposium 2024 - [i61]Armin Namavari, Barry Wang, Sanketh Menda, Ben Nassi, Nirvan Tyagi, James Grimmelmann, Amy X. Zhang, Thomas Ristenpart:
Private Hierarchical Governance for Encrypted Messaging. CoRR abs/2406.19433 (2024) - [i60]Andrés Fábrega, Armin Namavari, Rachit Agarwal, Ben Nassi, Thomas Ristenpart:
Exploiting Leakage in Password Managers via Injection Attacks. CoRR abs/2408.07054 (2024) - [i59]Avital Shafran, Eran Malach, Thomas Ristenpart, Gil Segev, Stefano Tessaro:
Is ML-Based Cryptanalysis Inherently Limited? Simulating Cryptographic Adversaries via Gradient-Based Methods. IACR Cryptol. ePrint Arch. 2024: 1126 (2024) - 2023
- [c98]Sanketh Menda, Julia Len, Paul Grubbs, Thomas Ristenpart:
Context Discovery and Commitment Attacks - How to Break CCM, EAX, SIV, and More. EUROCRYPT (4) 2023: 379-407 - [c97]Rosanna Bellini, Kevin Lee, Megan A. Brown, Jeremy Shaffer, Rasika Bhalerao, Thomas Ristenpart:
The Digital-Safety Risks of Financial Technologies for Survivors of Intimate Partner Violence. USENIX Security Symposium 2023: 87-104 - [c96]Mazharul Islam, Marina Sanusi Bohuk, Paul Chung, Thomas Ristenpart, Rahul Chatterjee:
Araña: Discovering and Characterizing Password Guessing Attacks in Practice. USENIX Security Symposium 2023: 1019-1036 - [c95]Alaa Daffalla, Marina Sanusi Bohuk, Nicola Dell, Rosanna Bellini, Thomas Ristenpart:
Account Security Interfaces: Important, Unintuitive, and Untrustworthy. USENIX Security Symposium 2023: 3601-3618 - [i58]Rosanna Bellini, Emily Tseng, Noel Warford, Alaa Daffalla, Tara Matthews, Sunny Consolvo, Jill Palzkill Woelfer, Patrick Gage Kelley, Michelle L. Mazurek, Dana Cuomo, Nicola Dell, Thomas Ristenpart:
SoK: Safer Digital-Safety Research Involving At-Risk Users. CoRR abs/2309.00735 (2023) - [i57]Sanketh Menda, Julia Len, Paul Grubbs, Thomas Ristenpart:
Context Discovery and Commitment Attacks: How to Break CCM, EAX, SIV, and More. IACR Cryptol. ePrint Arch. 2023: 526 (2023) - 2022
- [j8]Yiqing Hua, Manoel Horta Ribeiro, Thomas Ristenpart, Robert West, Mor Naaman:
Characterizing Alternative Monetization Strategies on YouTube. Proc. ACM Hum. Comput. Interact. 6(CSCW2): 1-30 (2022) - [c94]Julia Len, Paul Grubbs, Thomas Ristenpart:
Authenticated Encryption with Key Identification. ASIACRYPT (3) 2022: 181-209 - [c93]Emily Tseng, Mehrnaz Sabet, Rosanna Bellini, Harkiran Kaur Sodhi, Thomas Ristenpart, Nicola Dell:
Care Infrastructures for Digital Security in Intimate Partner Violence. CHI 2022: 123:1-123:20 - [c92]Janet X. Chen, Allison McDonald, Yixin Zou, Emily Tseng, Kevin A. Roundy, Acar Tamersoy, Florian Schaub, Thomas Ristenpart, Nicola Dell:
Trauma-Informed Computing: Towards Safer Technology Experiences for All. CHI 2022: 544:1-544:20 - [c91]Nirvan Tyagi, Sofía Celi, Thomas Ristenpart, Nick Sullivan, Stefano Tessaro, Christopher A. Wood:
A Fast and Simple Partially Oblivious PRF, with Applications. EUROCRYPT (2) 2022: 674-705 - [c90]Yiqing Hua, Armin Namavari, Kaishuo Cheng, Mor Naaman, Thomas Ristenpart:
Increasing Adversarial Uncertainty to Scale Private Similarity Testing. USENIX Security Symposium 2022: 1777-1794 - [c89]Bijeeta Pal, Mazharul Islam, Marina Sanusi Bohuk, Nick Sullivan, Luke Valenta, Tara Whalen, Christopher A. Wood, Thomas Ristenpart, Rahul Chatterjee:
Might I Get Pwned: A Second Generation Compromised Credential Checking Service. USENIX Security Symposium 2022: 1831-1848 - [c88]Marina Sanusi Bohuk, Mazharul Islam, Suleman Ahmad, Michael M. Swift, Thomas Ristenpart, Rahul Chatterjee:
Gossamer: Securely Measuring Password-based Logins. USENIX Security Symposium 2022: 1867-1884 - [c87]Nirvan Tyagi, Julia Len, Ian Miers, Thomas Ristenpart:
Orca: Blocklisting in Sender-Anonymous Messaging. USENIX Security Symposium 2022: 2299-2316 - [i56]Yiqing Hua, Manoel Horta Ribeiro, Robert West, Thomas Ristenpart, Mor Naaman:
Characterizing Alternative Monetization Strategies on YouTube. CoRR abs/2203.10143 (2022) - [i55]Julia Len, Paul Grubbs, Thomas Ristenpart:
Authenticated Encryption with Key Identification. IACR Cryptol. ePrint Arch. 2022: 1680 (2022) - 2021
- [c86]Emily Tseng, Diana Freed, Kristen Engel, Thomas Ristenpart, Nicola Dell:
A Digital Safety Dilemma: Analysis of Computer-Mediated Computer Security Interventions for Intimate Partner Violence During COVID-19. CHI 2021: 71:1-71:17 - [c85]Kurt Thomas, Devdatta Akhawe, Michael D. Bailey, Dan Boneh, Elie Bursztein, Sunny Consolvo, Nicola Dell, Zakir Durumeric, Patrick Gage Kelley, Deepak Kumar, Damon McCoy, Sarah Meiklejohn, Thomas Ristenpart, Gianluca Stringhini:
SoK: Hate, Harassment, and the Changing Landscape of Online Abuse. SP 2021: 247-267 - [c84]Julia Len, Paul Grubbs, Thomas Ristenpart:
Partitioning Oracle Attacks. USENIX Security Symposium 2021: 195-212 - [c83]Yixin Zou, Allison McDonald, Julia Narakornpichit, Nicola Dell, Thomas Ristenpart, Kevin A. Roundy, Florian Schaub, Acar Tamersoy:
The Role of Computer Security Customer Support in Helping Survivors of Intimate Partner Violence. USENIX Security Symposium 2021: 429-446 - [c82]Min Xu, Armin Namavari, David Cash, Thomas Ristenpart:
Searching Encrypted Data with Size-Locked Indexes. USENIX Security Symposium 2021: 4025-4042 - [i54]Yiqing Hua, Armin Namavari, Kaishuo Cheng, Mor Naaman, Thomas Ristenpart:
Increasing Adversarial Uncertainty to Scale Private Similarity Testing. CoRR abs/2109.01727 (2021) - [i53]Bijeeta Pal, Mazharul Islam, Thomas Ristenpart, Rahul Chatterjee:
Might I Get Pwned: A Second Generation Password Breach Alerting Service. CoRR abs/2109.14490 (2021) - [i52]Nirvan Tyagi, Sofía Celi, Thomas Ristenpart, Nick Sullivan, Stefano Tessaro, Christopher A. Wood:
A Fast and Simple Partially Oblivious PRF, with Applications. IACR Cryptol. ePrint Arch. 2021: 864 (2021) - [i51]Nirvan Tyagi, Julia Len, Ian Miers, Thomas Ristenpart:
Orca: Blocklisting in Sender-Anonymous Messaging. IACR Cryptol. ePrint Arch. 2021: 1380 (2021) - 2020
- [j7]Rosanna Bellini, Emily Tseng, Nora McDonald, Rachel Greenstadt, Damon McCoy, Thomas Ristenpart, Nicola Dell:
"So-called privacy breeds evil": Narrative Justifications for Intimate Partner Surveillance in Online Forums. Proc. ACM Hum. Comput. Interact. 4(CSCW3): 1-27 (2020) - [c81]Yiqing Hua, Mor Naaman, Thomas Ristenpart:
Characterizing Twitter Users Who Engage in Adversarial Interactions against Political Candidates. CHI 2020: 1-13 - [c80]Yiqing Hua, Thomas Ristenpart, Mor Naaman:
Towards Measuring Adversarial Twitter Interactions against Candidates in the US Midterm Elections. ICWSM 2020: 272-282 - [c79]Kevin A. Roundy, Paula Barmaimon Mendelberg, Nicola Dell, Damon McCoy, Daniel Nissani, Thomas Ristenpart, Acar Tamersoy:
The Many Kinds of Creepware Used for Interpersonal Attacks. SP 2020: 626-643 - [c78]Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, Thomas Ristenpart:
The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums. USENIX Security Symposium 2020: 1893-1909 - [c77]Paul Grubbs, Anurag Khandelwal, Marie-Sarah Lacharité, Lloyd Brown, Lucy Li, Rachit Agarwal, Thomas Ristenpart:
Pancake: Frequency Smoothing for Encrypted Data Stores. USENIX Security Symposium 2020: 2451-2468 - [e5]Daniele Micciancio, Thomas Ristenpart:
Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part I. Lecture Notes in Computer Science 12170, Springer 2020, ISBN 978-3-030-56783-5 [contents] - [e4]Daniele Micciancio, Thomas Ristenpart:
Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part II. Lecture Notes in Computer Science 12171, Springer 2020, ISBN 978-3-030-56879-5 [contents] - [e3]Daniele Micciancio, Thomas Ristenpart:
Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part III. Lecture Notes in Computer Science 12172, Springer 2020, ISBN 978-3-030-56876-4 [contents] - [i50]Yiqing Hua, Thomas Ristenpart, Mor Naaman:
Towards Measuring Adversarial Twitter Interactions against Candidates in the US Midterm Elections. CoRR abs/2005.04411 (2020) - [i49]Yiqing Hua, Mor Naaman, Thomas Ristenpart:
Characterizing Twitter Users Who Engage in Adversarial Interactions against Political Candidates. CoRR abs/2005.04412 (2020) - [i48]Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, Thomas Ristenpart:
The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums. CoRR abs/2005.14341 (2020) - [i47]Deepak Sirone Jegan, Liang Wang, Siddhant Bhagat, Thomas Ristenpart, Michael M. Swift:
Guarding Serverless Applications with SecLambda. CoRR abs/2011.05322 (2020) - [i46]Julia Len, Paul Grubbs, Thomas Ristenpart:
Partitioning Oracle Attacks. IACR Cryptol. ePrint Arch. 2020: 1491 (2020) - [i45]Paul Grubbs, Anurag Khandelwal, Marie-Sarah Lacharité, Lloyd Brown, Lucy Li, Rachit Agarwal, Thomas Ristenpart:
PANCAKE: Frequency Smoothing for Encrypted Data Stores. IACR Cryptol. ePrint Arch. 2020: 1501 (2020)
2010 – 2019
- 2019
- [j6]Diana Freed, Sam Havron, Emily Tseng, Andrea Gallardo, Rahul Chatterjee, Thomas Ristenpart, Nicola Dell:
"Is my phone hacked?" Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence. Proc. ACM Hum. Comput. Interact. 3(CSCW): 202:1-202:24 (2019) - [c76]Nirvan Tyagi, Ian Miers, Thomas Ristenpart:
Traceback for End-to-End Encrypted Messaging. CCS 2019: 413-430 - [c75]Lucy Li, Bijeeta Pal, Junade Ali, Nick Sullivan, Rahul Chatterjee, Thomas Ristenpart:
Protocols for Checking Compromised Credentials. CCS 2019: 1387-1403 - [c74]Nirvan Tyagi, Paul Grubbs, Julia Len, Ian Miers, Thomas Ristenpart:
Asymmetric Message Franking: Content Moderation for Metadata-Private End-to-End Encryption. CRYPTO (3) 2019: 222-250 - [c73]Bijeeta Pal, Tal Daniel, Rahul Chatterjee, Thomas Ristenpart:
Beyond Credential Stuffing: Password Similarity Models Using Neural Networks. IEEE Symposium on Security and Privacy 2019: 417-434 - [c72]Liang Wang, Gilad Asharov, Rafael Pass, Thomas Ristenpart, Abhi Shelat:
Blind Certificate Authorities. IEEE Symposium on Security and Privacy 2019: 1015-1032 - [c71]Sam Havron, Diana Freed, Rahul Chatterjee, Damon McCoy, Nicola Dell, Thomas Ristenpart:
Clinical Computer Security for Victims of Intimate Partner Violence. USENIX Security Symposium 2019: 105-122 - [i44]Lucy Li, Bijeeta Pal, Junade Ali, Nick Sullivan, Rahul Chatterjee, Thomas Ristenpart:
Protocols for Checking Compromised Credentials. CoRR abs/1905.13737 (2019) - [i43]Yevgeniy Dodis, Paul Grubbs, Thomas Ristenpart, Joanne Woodage:
Fast Message Franking: From Invisible Salamanders to Encryptment. IACR Cryptol. ePrint Arch. 2019: 16 (2019) - [i42]Nirvan Tyagi, Paul Grubbs, Julia Len, Ian Miers, Thomas Ristenpart:
Asymmetric Message Franking: Content Moderation for Metadata-Private End-to-End Encryption. IACR Cryptol. ePrint Arch. 2019: 565 (2019) - [i41]Nirvan Tyagi, Ian Miers, Thomas Ristenpart:
Traceback for End-to-End Encrypted Messaging. IACR Cryptol. ePrint Arch. 2019: 981 (2019) - 2018
- [j5]Vincent Bindschaedler, Paul Grubbs, David Cash, Thomas Ristenpart, Vitaly Shmatikov:
The Tao of Inference in Privacy-Protected Databases. Proc. VLDB Endow. 11(11): 1715-1728 (2018) - [c70]Diana Freed, Jackeline Palmer, Diana Elizabeth Minchala, Karen Levy, Thomas Ristenpart, Nicola Dell:
"A Stalker's Paradise": How Intimate Partner Abusers Exploit Technology. CHI 2018: 667 - [c69]Yevgeniy Dodis, Paul Grubbs, Thomas Ristenpart, Joanne Woodage:
Fast Message Franking: From Invisible Salamanders to Encryptment. CRYPTO (1) 2018: 155-186 - [c68]Rahul Chatterjee, Periwinkle Doerfler, Hadas Orgad, Sam Havron, Jackeline Palmer, Diana Freed, Karen Levy, Nicola Dell, Damon McCoy, Thomas Ristenpart:
The Spyware Used in Intimate Partner Violence. IEEE Symposium on Security and Privacy 2018: 441-458 - [c67]Liang Wang, Mengyuan Li, Yinqian Zhang, Thomas Ristenpart, Michael M. Swift:
Peeking Behind the Curtains of Serverless Platforms. USENIX ATC 2018: 133-146 - [c66]Nirvan Tyagi, Muhammad Haris Mughees, Thomas Ristenpart, Ian Miers:
BurnBox: Self-Revocable Encryption in a World Of Compelled Access. USENIX Security Symposium 2018: 445-461 - [i40]Jeffrey Knockel, Thomas Ristenpart, Jedidiah R. Crandall:
When Textbook RSA is Used to Protect the Privacy of Hundreds of Millions of Users. CoRR abs/1802.03367 (2018) - [i39]Nirvan Tyagi, Muhammad Haris Mughees, Thomas Ristenpart, Ian Miers:
BurnBox: Self-Revocable Encryption in a World Of Compelled Access. IACR Cryptol. ePrint Arch. 2018: 638 (2018) - [i38]Liang Wang, Gilad Asharov, Rafael Pass, Thomas Ristenpart, Abhi Shelat:
Blind Certificate Authorities. IACR Cryptol. ePrint Arch. 2018: 1022 (2018) - 2017
- [j4]Jay Aikat, Aditya Akella, Jeffrey S. Chase, Ari Juels, Michael K. Reiter, Thomas Ristenpart, Vyas Sekar, Michael M. Swift:
Rethinking Security in the Era of Cloud Computing. IEEE Secur. Priv. 15(3): 60-69 (2017) - [j3]Diana Freed, Jackeline Palmer, Diana Elizabeth Minchala, Karen Levy, Thomas Ristenpart, Nicola Dell:
Digital Technologies and Intimate Partner Violence: A Qualitative Analysis with Multiple Stakeholders. Proc. ACM Hum. Comput. Interact. 1(CSCW): 46:1-46:22 (2017) - [c65]Rahul Chatterjee, Joanne Woodage, Yuval Pnueli, Anusha Chowdhury, Thomas Ristenpart:
The TypTop System: Personalized Typo-Tolerant Password Checking. CCS 2017: 329-346 - [c64]Congzheng Song, Thomas Ristenpart, Vitaly Shmatikov:
Machine Learning Models that Remember Too Much. CCS 2017: 587-601 - [c63]Ivan Pustogarov, Thomas Ristenpart, Vitaly Shmatikov:
Using Program Analysis to Synthesize Sensor Spoofing Attacks. AsiaCCS 2017: 757-770 - [c62]Paul Grubbs, Jiahui Lu, Thomas Ristenpart:
Message Franking via Committing Authenticated Encryption. CRYPTO (3) 2017: 66-97 - [c61]Adam Everspaugh, Kenneth G. Paterson, Thomas Ristenpart, Samuel Scott:
Key Rotation for Authenticated Encryption. CRYPTO (3) 2017: 98-129 - [c60]Joanne Woodage, Rahul Chatterjee, Yevgeniy Dodis, Ari Juels, Thomas Ristenpart:
A New Distribution-Sensitive Secure Sketch and Popularity-Proportional Hashing. CRYPTO (3) 2017: 682-710 - [c59]Paul Grubbs, Thomas Ristenpart, Yuval Yarom:
Modifying an Enciphering Scheme After Deployment. EUROCRYPT (2) 2017: 499-527 - [c58]Paul Grubbs, Thomas Ristenpart, Vitaly Shmatikov:
Why Your Encrypted Database Is Not Secure. HotOS 2017: 162-168 - [c57]Paul Grubbs, Kevin Sekniqi, Vincent Bindschaedler, Muhammad Naveed, Thomas Ristenpart:
Leakage-Abuse Attacks against Order-Revealing Encryption. IEEE Symposium on Security and Privacy 2017: 655-672 - [c56]Liang Wang, Paul Grubbs, Jiahui Lu, Vincent Bindschaedler, David Cash, Thomas Ristenpart:
Side-Channel Attacks on Shared Search Indexes. IEEE Symposium on Security and Privacy 2017: 673-692 - [e2]Engin Kirda, Thomas Ristenpart:
26th USENIX Security Symposium, USENIX Security 2017, Vancouver, BC, Canada, August 16-18, 2017. USENIX Association 2017 [contents] - [i37]Congzheng Song, Thomas Ristenpart, Vitaly Shmatikov:
Machine Learning Models that Remember Too Much. CoRR abs/1709.07886 (2017) - [i36]Paul Grubbs, Thomas Ristenpart, Yuval Yarom:
Modifying an Enciphering Scheme after Deployment. IACR Cryptol. ePrint Arch. 2017: 137 (2017) - [i35]Paul Grubbs, Thomas Ristenpart, Vitaly Shmatikov:
Why Your Encrypted Database Is Not Secure. IACR Cryptol. ePrint Arch. 2017: 468 (2017) - [i34]Adam Everspaugh, Kenneth G. Paterson, Thomas Ristenpart, Samuel Scott:
Key Rotation for Authenticated Encryption. IACR Cryptol. ePrint Arch. 2017: 527 (2017) - [i33]Joanne Woodage, Rahul Chatterjee, Yevgeniy Dodis, Ari Juels, Thomas Ristenpart:
A New Distribution Sensitive Secure Sketch and a Comparison Between Approaches to Typo-Tolerant Authentication. IACR Cryptol. ePrint Arch. 2017: 542 (2017) - [i32]Paul Grubbs, Jiahui Lu, Thomas Ristenpart:
Message Franking via Committing Authenticated Encryption. IACR Cryptol. ePrint Arch. 2017: 664 (2017) - [i31]Rahul Chatterjee, Joanne Woodage, Yuval Pnueli, Anusha Chowdhury, Thomas Ristenpart:
The TypTop System: Personalized Typo-Tolerant Password Checking. IACR Cryptol. ePrint Arch. 2017: 810 (2017) - [i30]Vincent Bindschaedler, Paul Grubbs, David Cash, Thomas Ristenpart, Vitaly Shmatikov:
The Tao of Inference in Privacy-Protected Databases. IACR Cryptol. ePrint Arch. 2017: 1078 (2017) - 2016
- [j2]Lucas Dixon, Thomas Ristenpart, Thomas Shrimpton:
Network Traffic Obfuscation and Automated Internet Censorship. IEEE Secur. Priv. 14(6): 43-53 (2016) - [c55]Paul Grubbs, Richard McPherson, Muhammad Naveed, Thomas Ristenpart, Vitaly Shmatikov:
Breaking Web Applications Built On Top of Encrypted Data. CCS 2016: 1353-1364 - [c54]Yan Zhai, Lichao Yin, Jeffrey S. Chase, Thomas Ristenpart, Michael M. Swift:
CQSTR: Securing Cross-Tenant Applications with Cloud Containers. SoCC 2016: 223-236 - [c53]Joseph Jaeger, Thomas Ristenpart, Qiang Tang:
Honey Encryption Beyond Message Recovery Security. EUROCRYPT (1) 2016: 758-788 - [c52]Rahul Chatterjee, Anish Athayle, Devdatta Akhawe, Ari Juels, Thomas Ristenpart:
pASSWORD tYPOS and How to Correct Them Securely. IEEE Symposium on Security and Privacy 2016: 799-818 - [c51]Florian Tramèr, Fan Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart:
Stealing Machine Learning Models via Prediction APIs. USENIX Security Symposium 2016: 601-618 - [c50]Drew Davidson, Hao Wu, Robert Jellinek, Vikas Singh, Thomas Ristenpart:
Controlling UAVs with Sensor Input Spoofing Attacks. WOOT 2016 - [i29]Lucas Dixon, Thomas Ristenpart, Thomas Shrimpton:
Network Traffic Obfuscation and Automated Internet Censorship. CoRR abs/1605.04044 (2016) - [i28]Florian Tramèr, Fan Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart:
Stealing Machine Learning Models via Prediction APIs. CoRR abs/1609.02943 (2016) - [i27]Joseph Jaeger, Thomas Ristenpart, Qiang Tang:
Honey Encryption Beyond Message Recovery Security. IACR Cryptol. ePrint Arch. 2016: 174 (2016) - [i26]Yevgeniy Dodis, Chaya Ganesh, Alexander Golovnev, Ari Juels, Thomas Ristenpart:
A Formal Treatment of Backdoored Pseudorandom Generators. IACR Cryptol. ePrint Arch. 2016: 306 (2016) - [i25]David Cash, Paul Grubbs, Jason Perry, Thomas Ristenpart:
Leakage-Abuse Attacks Against Searchable Encryption. IACR Cryptol. ePrint Arch. 2016: 718 (2016) - [i24]Paul Grubbs, Kevin Sekniqi, Vincent Bindschaedler, Muhammad Naveed, Thomas Ristenpart:
Leakage-Abuse Attacks against Order-Revealing Encryption. IACR Cryptol. ePrint Arch. 2016: 895 (2016) - [i23]Paul Grubbs, Richard McPherson, Muhammad Naveed, Thomas Ristenpart, Vitaly Shmatikov:
Breaking Web Applications Built On Top of Encrypted Data. IACR Cryptol. ePrint Arch. 2016: 920 (2016) - [i22]Liang Wang, Rafael Pass, Abhi Shelat, Thomas Ristenpart:
Secure Channel Injection and Anonymous Proofs of Account Ownership. IACR Cryptol. ePrint Arch. 2016: 925 (2016) - 2015
- [c49]Liang Wang, Kevin P. Dyer, Aditya Akella, Thomas Ristenpart, Thomas Shrimpton:
Seeing through Network-Protocol Obfuscation. CCS 2015: 57-69 - [c48]David Cash, Paul Grubbs, Jason Perry, Thomas Ristenpart:
Leakage-Abuse Attacks Against Searchable Encryption. CCS 2015: 668-679 - [c47]Matt Fredrikson, Somesh Jha, Thomas Ristenpart:
Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures. CCS 2015: 1322-1333 - [c46]Yevgeniy Dodis, Chaya Ganesh, Alexander Golovnev, Ari Juels, Thomas Ristenpart:
A Formal Treatment of Backdoored Pseudorandom Generators. EUROCRYPT (1) 2015: 101-126 - [c45]Rahul Chatterjee, Joseph Bonneau, Ari Juels, Thomas Ristenpart:
Cracking-Resistant Password Vaults Using Natural Language Encoders. IEEE Symposium on Security and Privacy 2015: 481-498 - [c44]Adam Everspaugh, Rahul Chatterjee, Samuel Scott, Ari Juels, Thomas Ristenpart:
The Pythia PRF Service. USENIX Security Symposium 2015: 547-562 - [c43]Venkatanathan Varadarajan, Yinqian Zhang, Thomas Ristenpart, Michael M. Swift:
A Placement Vulnerability Study in Multi-Tenant Public Clouds. USENIX Security Symposium 2015: 913-928 - [i21]Venkatanathan Varadarajan, Yinqian Zhang, Thomas Ristenpart, Michael M. Swift:
A Placement Vulnerability Study in Multi-tenant Public Clouds. CoRR abs/1507.03114 (2015) - [i20]Bruce Schneier, Matthew Fredrikson, Tadayoshi Kohno, Thomas Ristenpart:
Surreptitiously Weakening Cryptographic Systems. IACR Cryptol. ePrint Arch. 2015: 97 (2015) - [i19]