USENIX reaffirms its commitment to diversity, equity, and inclusion.
Biblio
Export 20 results:
Filters: Author is Thomas Ristenpart [Clear All Filters]
Partitioning Oracle Attacks. 30th USENIX Security Symposium (USENIX Security 21). :195--212.
.
2021. The Role of Computer Security Customer Support in Helping Survivors of Intimate Partner Violence. 30th USENIX Security Symposium (USENIX Security 21). :429--446.
.
2021. Searching Encrypted Data with Size-Locked Indexes. 30th USENIX Security Symposium (USENIX Security 21). :4025--4042.
.
2021. Pancake: Frequency Smoothing for Encrypted Data Stores. 29th USENIX Security Symposium (USENIX Security 20). :2451--2468.
.
2020. The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums. 29th USENIX Security Symposium (USENIX Security 20). :1893--1909.
.
2020. Clinical Computer Security for Victims of Intimate Partner Violence. 28th USENIX Security Symposium (USENIX Security 19). :105--122.
.
2019. BurnBox: Self-Revocable Encryption in a World Of Compelled Access. 27th USENIX Security Symposium (USENIX Security 18). :445--461.
.
2018. Peeking Behind the Curtains of Serverless Platforms. 2018 USENIX Annual Technical Conference (USENIX ATC 18). :133--146.
.
2018. Controlling UAVs with Sensor Input Spoofing Attacks. 10th USENIX Workshop on Offensive Technologies (WOOT 16).
.
2016. Stealing Machine Learning Models via Prediction APIs. 25th USENIX Security Symposium (USENIX Security 16). :601--618.
.
2016. A Placement Vulnerability Study in Multi-Tenant Public Clouds. 24th USENIX Security Symposium (USENIX Security 15). :913--928.
.
2015. The Pythia PRF Service. 24th USENIX Security Symposium (USENIX Security 15). :547--562.
.
2015. A Day Late and a Dollar Short: The Case for Research on Cloud Billing Systems. 6th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 14).
.
2014. LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes. 23rd USENIX Security Symposium (USENIX Security 14). :877--891.
.
2014. On the Practical Exploitability of Dual EC in TLS Implementations. 23rd USENIX Security Symposium (USENIX Security 14). :319--335.
.
2014. Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin Dosing. 23rd USENIX Security Symposium (USENIX Security 14). :17--32.
.
2014. Scheduler-based Defenses against Cross-VM Side-channels. 23rd USENIX Security Symposium (USENIX Security 14). :687--702.
.
2014. DupLESS: Server-Aided Encryption for Deduplicated Storage. 22nd USENIX Security Symposium (USENIX Security 13). :179--194.
.
2013. FIE on Firmware: Finding Vulnerabilities in Embedded Systems Using Symbolic Execution. 22nd USENIX Security Symposium (USENIX Security 13). :463--478.
.
2013. Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTs. 17th USENIX Security Symposium (USENIX Security 08).
.
2008.