USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 27 results:
Filters: Author is Thomas Ristenpart [Clear All Filters]
Account Security Interfaces: Important, Unintuitive, and Untrustworthy. 32nd USENIX Security Symposium (USENIX Security 23). :3601--3618.
.
2023. Araña: Discovering and Characterizing Password Guessing Attacks in Practice. 32nd USENIX Security Symposium (USENIX Security 23). :1019--1036.
.
2023. The Digital-Safety Risks of Financial Technologies for Survivors of Intimate Partner Violence. 32nd USENIX Security Symposium (USENIX Security 23). :87--104.
.
2023. Gossamer: Securely Measuring Password-based Logins. 31st USENIX Security Symposium (USENIX Security 22). :1867--1884.
.
2022. Increasing Adversarial Uncertainty to Scale Private Similarity Testing. 31st USENIX Security Symposium (USENIX Security 22). :1777--1794.
.
2022. Might I Get Pwned: A Second Generation Compromised Credential Checking Service. 31st USENIX Security Symposium (USENIX Security 22). :1831--1848.
.
2022. Orca: Blocklisting in Sender-Anonymous Messaging. 31st USENIX Security Symposium (USENIX Security 22). :2299--2316.
.
2022. Partitioning Oracle Attacks. 30th USENIX Security Symposium (USENIX Security 21). :195--212.
.
2021. The Role of Computer Security Customer Support in Helping Survivors of Intimate Partner Violence. 30th USENIX Security Symposium (USENIX Security 21). :429--446.
.
2021. Searching Encrypted Data with Size-Locked Indexes. 30th USENIX Security Symposium (USENIX Security 21). :4025--4042.
.
2021. Pancake: Frequency Smoothing for Encrypted Data Stores. 29th USENIX Security Symposium (USENIX Security 20). :2451--2468.
.
2020. The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums. 29th USENIX Security Symposium (USENIX Security 20). :1893--1909.
.
2020. Clinical Computer Security for Victims of Intimate Partner Violence. 28th USENIX Security Symposium (USENIX Security 19). :105--122.
.
2019. BurnBox: Self-Revocable Encryption in a World Of Compelled Access. 27th USENIX Security Symposium (USENIX Security 18). :445--461.
.
2018. Peeking Behind the Curtains of Serverless Platforms. 2018 USENIX Annual Technical Conference (USENIX ATC 18). :133--146.
.
2018. Controlling UAVs with Sensor Input Spoofing Attacks. 10th USENIX Workshop on Offensive Technologies (WOOT 16).
.
2016. Stealing Machine Learning Models via Prediction APIs. 25th USENIX Security Symposium (USENIX Security 16). :601--618.
.
2016. A Placement Vulnerability Study in Multi-Tenant Public Clouds. 24th USENIX Security Symposium (USENIX Security 15). :913--928.
.
2015. The Pythia PRF Service. 24th USENIX Security Symposium (USENIX Security 15). :547--562.
.
2015. A Day Late and a Dollar Short: The Case for Research on Cloud Billing Systems. 6th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 14).
.
2014. LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes. 23rd USENIX Security Symposium (USENIX Security 14). :877--891.
.
2014. On the Practical Exploitability of Dual EC in TLS Implementations. 23rd USENIX Security Symposium (USENIX Security 14). :319--335.
.
2014. Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin Dosing. 23rd USENIX Security Symposium (USENIX Security 14). :17--32.
.
2014. Scheduler-based Defenses against Cross-VM Side-channels. 23rd USENIX Security Symposium (USENIX Security 14). :687--702.
.
2014. DupLESS: Server-Aided Encryption for Deduplicated Storage. 22nd USENIX Security Symposium (USENIX Security 13). :179--194.
.
2013.