Model inversion attacks that exploit confidence information and basic countermeasures M Fredrikson, S Jha, T Ristenpart Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015 | 3030 | 2015 |
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds T Ristenpart, E Tromer, H Shacham, S Savage Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 2985 | 2009 |
Stealing machine learning models via prediction {APIs} F Tramèr, F Zhang, A Juels, MK Reiter, T Ristenpart 25th USENIX security symposium (USENIX Security 16), 601-618, 2016 | 2105 | 2016 |
Cross-VM side channels and their use to extract private keys Y Zhang, A Juels, MK Reiter, T Ristenpart Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 1054 | 2012 |
Privacy in pharmacogenetics: an end-to-end case study of personalized warfarin dosing M Fredrikson, E Lantz, S Jha, S Lin, D Page, T Ristenpart USENIX Security, 2014 | 1019 | 2014 |
Message-locked encryption and secure deduplication M Bellare, S Keelveedhi, T Ristenpart Annual international conference on the theory and applications of …, 2013 | 922 | 2013 |
{DupLESS}:{Server-Aided} encryption for deduplicated storage S Keelveedhi, M Bellare, T Ristenpart 22nd USENIX security symposium (USENIX security 13), 179-194, 2013 | 903 | 2013 |
Leakage-abuse attacks against searchable encryption D Cash, P Grubbs, J Perry, T Ristenpart Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015 | 700 | 2015 |
Peeking behind the curtains of serverless platforms L Wang, M Li, Y Zhang, T Ristenpart, M Swift 2018 USENIX Annual Technical Conference (USENIX ATC 18), 133-146, 2018 | 654 | 2018 |
Peek-a-boo, i still see you: Why efficient traffic analysis countermeasures fail KP Dyer, SE Coull, T Ristenpart, T Shrimpton 2012 IEEE symposium on security and privacy, 332-346, 2012 | 607 | 2012 |
Machine learning models that remember too much C Song, T Ristenpart, V Shmatikov Proceedings of the 2017 ACM SIGSAC Conference on computer and communications …, 2017 | 587 | 2017 |
Cross-tenant side-channel attacks in PaaS clouds Y Zhang, A Juels, MK Reiter, T Ristenpart Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 499 | 2014 |
“A Stalker's Paradise” How Intimate Partner Abusers Exploit Technology D Freed, J Palmer, D Minchala, K Levy, T Ristenpart, N Dell Proceedings of the 2018 CHI conference on human factors in computing systems …, 2018 | 349 | 2018 |
Format-preserving encryption M Bellare, T Ristenpart, P Rogaway, T Stegers Selected Areas in Cryptography: 16th Annual International Workshop, SAC 2009 …, 2009 | 340 | 2009 |
FIE on Firmware: Finding Vulnerabilities in Embedded Systems Using Symbolic Execution. D Davidson, B Moench, S Jha, T Ristenpart USENIX Security Symposium, 463-478, 2013 | 282 | 2013 |
Leakage-abuse attacks against order-revealing encryption P Grubbs, K Sekniqi, V Bindschaedler, M Naveed, T Ristenpart 2017 IEEE symposium on security and privacy (SP), 655-672, 2017 | 249 | 2017 |
Resource-freeing attacks: improve your cloud performance (at your neighbor's expense) V Varadarajan, T Kooburat, B Farley, T Ristenpart, MM Swift Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 237 | 2012 |
Digital technologies and intimate partner violence: A qualitative analysis with multiple stakeholders D Freed, J Palmer, DE Minchala, K Levy, T Ristenpart, N Dell Proceedings of the ACM on human-computer interaction 1 (CSCW), 1-22, 2017 | 231 | 2017 |
A placement vulnerability study in {Multi-Tenant} public clouds V Varadarajan, Y Zhang, T Ristenpart, M Swift 24th USENIX Security Symposium (USENIX Security 15), 913-928, 2015 | 221 | 2015 |
Multi-property-preserving hash domain extension and the EMD transform M Bellare, T Ristenpart Advances in Cryptology–ASIACRYPT 2006: 12th International Conference on the …, 2006 | 214 | 2006 |