Sotabase
Home
Researchers
Career
·
Professor
,
Cornell Tech
2015–
·
Assistant Professor
,
University of Wisconsin-Madison
2011–2015
·
Graduate Student
,
UC San Diego
2005–2010
Publications
(139)
Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures
Conference on Computer and Communications Security · 2015
3,117
cited
Get Off of My Cloud : Exploring Information Leakage in Third-Party Compute Clouds
2009
2,419
cited
Stealing Machine Learning Models via Prediction APIs
USENIX Security Symposium · 2016
2,006
cited
Cross-VM side channels and their use to extract private keys
Conference on Computer and Communications Security · 2012
881
cited
Message-Locked Encryption and Secure Deduplication
International Conference on the Theory and Application of Cryptographic Techniques · 2013
832
cited
DupLESS: Server-Aided Encryption for Deduplicated Storage
USENIX Security Symposium · 2013
738
cited
Leakage-Abuse Attacks Against Searchable Encryption
IACR Cryptology ePrint Archive · 2015
647
cited
Peeking Behind the Curtains of Serverless Platforms
USENIX Annual Technical Conference · 2018
626
cited
Machine Learning Models that Remember Too Much
Conference on Computer and Communications Security · 2017
568
cited
Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail
IEEE Symposium on Security and Privacy · 2012
498
cited
Cross-Tenant Side-Channel Attacks in PaaS Clouds
Conference on Computer and Communications Security · 2014
387
cited
“A Stalker's Paradise”: How Intimate Partner Abusers Exploit Technology
International Conference on Human Factors in Computing Systems · 2018
348
cited
Format-Preserving Encryption
IACR Cryptology ePrint Archive · 2009
269
cited
FIE on Firmware: Finding Vulnerabilities in Embedded Systems Using Symbolic Execution
USENIX Security Symposium · 2013
227
cited
Resource-freeing attacks: improve your cloud performance (at your neighbor's expense)
Conference on Computer and Communications Security · 2012
211
cited
Leakage-Abuse Attacks against Order-Revealing Encryption
IEEE Symposium on Security and Privacy · 2017
202
cited
Careful with Composition: Limitations of the Indifferentiability Framework
International Conference on the Theory and Application of Cryptographic Techniques · 2011
190
cited
Multi-Property-Preserving Hash Domain Extension and the EMD Transform
International Conference on the Theory and Application of Cryptology and Information Security · 2006
188
cited
A Placement Vulnerability Study in Multi-Tenant Public Clouds
USENIX Security Symposium · 2015
187
cited
The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks
International Conference on the Theory and Application of Cryptographic Techniques · 2007
182
cited
Show all 139 papers →
Sotabase
Thomas Ristenpart | Researcher Profile | Sotabase | Sotabase