Thomas Ristenpart

Affiliations:
  • Cornell Tech, New York, NY, USA
  • University of Wisconsin-Madison, USA


According to our database1, Thomas Ristenpart authored at least 117 papers between 2006 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Context Discovery and Commitment Attacks: How to Break CCM, EAX, SIV, and More.
IACR Cryptol. ePrint Arch., 2023

SoK: Safer Digital-Safety Research Involving At-Risk Users.
CoRR, 2023

Araña: Discovering and Characterizing Password Guessing Attacks in Practice.
Proceedings of the 32nd USENIX Security Symposium, 2023

Account Security Interfaces: Important, Unintuitive, and Untrustworthy.
Proceedings of the 32nd USENIX Security Symposium, 2023

The Digital-Safety Risks of Financial Technologies for Survivors of Intimate Partner Violence.
Proceedings of the 32nd USENIX Security Symposium, 2023

2022
Characterizing Alternative Monetization Strategies on YouTube.
Proc. ACM Hum. Comput. Interact., 2022

Authenticated Encryption with Key Identification.
IACR Cryptol. ePrint Arch., 2022

Might I Get Pwned: A Second Generation Compromised Credential Checking Service.
Proceedings of the 31st USENIX Security Symposium, 2022

Increasing Adversarial Uncertainty to Scale Private Similarity Testing.
Proceedings of the 31st USENIX Security Symposium, 2022

Gossamer: Securely Measuring Password-based Logins.
Proceedings of the 31st USENIX Security Symposium, 2022

Care Infrastructures for Digital Security in Intimate Partner Violence.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022

Trauma-Informed Computing: Towards Safer Technology Experiences for All.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022

2021
Orca: Blocklisting in Sender-Anonymous Messaging.
IACR Cryptol. ePrint Arch., 2021

A Fast and Simple Partially Oblivious PRF, with Applications.
IACR Cryptol. ePrint Arch., 2021

Might I Get Pwned: A Second Generation Password Breach Alerting Service.
CoRR, 2021

The Role of Computer Security Customer Support in Helping Survivors of Intimate Partner Violence.
Proceedings of the 30th USENIX Security Symposium, 2021

Searching Encrypted Data with Size-Locked Indexes.
Proceedings of the 30th USENIX Security Symposium, 2021

SoK: Hate, Harassment, and the Changing Landscape of Online Abuse.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

A Digital Safety Dilemma: Analysis of Computer-Mediated Computer Security Interventions for Intimate Partner Violence During COVID-19.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021

2020
"So-called privacy breeds evil": Narrative Justifications for Intimate Partner Surveillance in Online Forums.
Proc. ACM Hum. Comput. Interact., 2020

Partitioning Oracle Attacks.
IACR Cryptol. ePrint Arch., 2020

PANCAKE: Frequency Smoothing for Encrypted Data Stores.
IACR Cryptol. ePrint Arch., 2020

Guarding Serverless Applications with SecLambda.
CoRR, 2020

The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums.
Proceedings of the 29th USENIX Security Symposium, 2020

The Many Kinds of Creepware Used for Interpersonal Attacks.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Towards Measuring Adversarial Twitter Interactions against Candidates in the US Midterm Elections.
Proceedings of the Fourteenth International AAAI Conference on Web and Social Media, 2020

Characterizing Twitter Users Who Engage in Adversarial Interactions against Political Candidates.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020

2019
"Is my phone hacked?" Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence.
Proc. ACM Hum. Comput. Interact., 2019

Traceback for End-to-End Encrypted Messaging.
IACR Cryptol. ePrint Arch., 2019

Asymmetric Message Franking: Content Moderation for Metadata-Private End-to-End Encryption.
IACR Cryptol. ePrint Arch., 2019

Fast Message Franking: From Invisible Salamanders to Encryptment.
IACR Cryptol. ePrint Arch., 2019

Clinical Computer Security for Victims of Intimate Partner Violence.
Proceedings of the 28th USENIX Security Symposium, 2019

Beyond Credential Stuffing: Password Similarity Models Using Neural Networks.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Protocols for Checking Compromised Credentials.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
The Tao of Inference in Privacy-Protected Databases.
Proc. VLDB Endow., 2018

Blind Certificate Authorities.
IACR Cryptol. ePrint Arch., 2018

BurnBox: Self-Revocable Encryption in a World Of Compelled Access.
IACR Cryptol. ePrint Arch., 2018

When Textbook RSA is Used to Protect the Privacy of Hundreds of Millions of Users.
CoRR, 2018

Peeking Behind the Curtains of Serverless Platforms.
Proceedings of the 2018 USENIX Annual Technical Conference, 2018

The Spyware Used in Intimate Partner Violence.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

"A Stalker's Paradise": How Intimate Partner Abusers Exploit Technology.
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

2017
Digital Technologies and Intimate Partner Violence: A Qualitative Analysis with Multiple Stakeholders.
Proc. ACM Hum. Comput. Interact., 2017

Rethinking Security in the Era of Cloud Computing.
IEEE Secur. Priv., 2017

A New Distribution Sensitive Secure Sketch and a Comparison Between Approaches to Typo-Tolerant Authentication.
IACR Cryptol. ePrint Arch., 2017

Modifying an Enciphering Scheme after Deployment.
IACR Cryptol. ePrint Arch., 2017

Why Your Encrypted Database Is Not Secure.
IACR Cryptol. ePrint Arch., 2017

Message Franking via Committing Authenticated Encryption.
IACR Cryptol. ePrint Arch., 2017

Key Rotation for Authenticated Encryption.
IACR Cryptol. ePrint Arch., 2017

The TypTop System: Personalized Typo-Tolerant Password Checking.
IACR Cryptol. ePrint Arch., 2017

Side-Channel Attacks on Shared Search Indexes.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

A New Distribution-Sensitive Secure Sketch and Popularity-Proportional Hashing.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

Machine Learning Models that Remember Too Much.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Using Program Analysis to Synthesize Sensor Spoofing Attacks.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Network Traffic Obfuscation and Automated Internet Censorship.
IEEE Secur. Priv., 2016

Secure Channel Injection and Anonymous Proofs of Account Ownership.
IACR Cryptol. ePrint Arch., 2016

Honey Encryption Beyond Message Recovery Security.
IACR Cryptol. ePrint Arch., 2016

Leakage-Abuse Attacks against Order-Revealing Encryption.
IACR Cryptol. ePrint Arch., 2016

Breaking Web Applications Built On Top of Encrypted Data.
IACR Cryptol. ePrint Arch., 2016

A Formal Treatment of Backdoored Pseudorandom Generators.
IACR Cryptol. ePrint Arch., 2016

Leakage-Abuse Attacks Against Searchable Encryption.
IACR Cryptol. ePrint Arch., 2016

Controlling UAVs with Sensor Input Spoofing Attacks.
Proceedings of the 10th USENIX Workshop on Offensive Technologies, 2016

Stealing Machine Learning Models via Prediction APIs.
Proceedings of the 25th USENIX Security Symposium, 2016

pASSWORD tYPOS and How to Correct Them Securely.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

CQSTR: Securing Cross-Tenant Applications with Cloud Containers.
Proceedings of the Seventh ACM Symposium on Cloud Computing, 2016

2015
Surreptitiously Weakening Cryptographic Systems.
IACR Cryptol. ePrint Arch., 2015

The Pythia PRF Service.
IACR Cryptol. ePrint Arch., 2015

Cracking-Resistant Password Vaults using Natural Language Encoders.
IACR Cryptol. ePrint Arch., 2015

A Placement Vulnerability Study in Multi-Tenant Public Clouds.
Proceedings of the 24th USENIX Security Symposium, 2015

Seeing through Network-Protocol Obfuscation.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Honey Encryption: Encryption beyond the Brute-Force Barrier.
IEEE Secur. Priv., 2014

Honey Encryption: Security Beyond the Brute-Force Bound.
IACR Cryptol. ePrint Arch., 2014

Scheduler-based Defenses against Cross-VM Side-channels.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin Dosing.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

On the Practical Exploitability of Dual EC in TLS Implementations.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Not-So-Random Numbers in Virtualized Linux and the Whirlwind RNG.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

WhoWas: A Platform for Measuring Web Deployments on IaaS Clouds.
Proceedings of the 2014 Internet Measurement Conference, 2014

A Day Late and a Dollar Short: The Case for Research on Cloud Billing Systems.
Proceedings of the 6th USENIX Workshop on Hot Topics in Cloud Computing, 2014

Cross-Tenant Side-Channel Attacks in PaaS Clouds.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Formatted Encryption Beyond Regular Languages.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
To Hash or Not to Hash Again? (In)differentiability Results for H<sup>2</sup> and HMAC.
IACR Cryptol. ePrint Arch., 2013

DupLESS: Server-Aided Encryption for Deduplicated Storage.
IACR Cryptol. ePrint Arch., 2013

FIE on Firmware: Finding Vulnerabilities in Embedded Systems Using Symbolic Execution.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Next stop, the cloud: understanding modern web service deployment in EC2 and azure.
Proceedings of the 2013 Internet Measurement Conference, 2013

The Mix-and-Cut Shuffle: Small-Domain Encryption Secure against N Queries.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

Protocol misidentification made easy with format-transforming encryption.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Format-Transforming Encryption: More than Meets the DPI.
IACR Cryptol. ePrint Arch., 2012

Multi-Instance Security and its Application to Password-Based Cryptography.
IACR Cryptol. ePrint Arch., 2012

Message-Locked Encryption and Secure Deduplication.
IACR Cryptol. ePrint Arch., 2012

Hedged Public-key Encryption: How to Protect against Bad Randomness.
IACR Cryptol. ePrint Arch., 2012

Security Analysis of Smartphone Point-of-Sale Systems.
Proceedings of the 6th USENIX Workshop on Offensive Technologies, 2012

Randomness Condensers for Efficiently Samplable, Seed-Dependent Sources.
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012

Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

To Hash or Not to Hash Again? (In)Differentiability Results for H 2 and HMAC.
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012

More for your money: exploiting performance heterogeneity in public clouds.
Proceedings of the ACM Symposium on Cloud Computing, SOCC '12, 2012

Cross-VM side channels and their use to extract private keys.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Resource-freeing attacks: improve your cloud performance (at your neighbor's expense).
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Careful with Composition: Limitations of Indifferentiability and Universal Composability.
IACR Cryptol. ePrint Arch., 2011

Got traffic?: an evaluation of click traffic providers.
Proceedings of the 2011 Joint WICOW/AIRWeb Workshop on Web Quality, 2011

Careful with Composition: Limitations of the Indifferentiability Framework.
Proceedings of the Advances in Cryptology - EUROCRYPT 2011, 2011

Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

2010
New approaches for the design and analysis of cryptographic hash functions.
PhD thesis, 2010

When Good Randomness Goes Bad: Virtual Machine Reset Vulnerabilities and Hedging Deployed Cryptography.
Proceedings of the Network and Distributed System Security Symposium, 2010

Random Oracles with(out) Programmability.
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010

2009
Salvaging Merkle-Damgard for Practical Applications.
IACR Cryptol. ePrint Arch., 2009

Format-Preserving Encryption.
IACR Cryptol. ePrint Arch., 2009

Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters' IBE Scheme.
IACR Cryptol. ePrint Arch., 2009

Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
How to Build a Hash Function from any Collision-Resistant Function.
IACR Cryptol. ePrint Arch., 2008

Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles.
IACR Cryptol. ePrint Arch., 2008

Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTs.
Proceedings of the 17th USENIX Security Symposium, 2008

2007
The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks.
IACR Cryptol. ePrint Arch., 2007

How to Enrich the Message Space of a Cipher.
IACR Cryptol. ePrint Arch., 2007

Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms.
IACR Cryptol. ePrint Arch., 2007

2006
Multi-Property-Preserving Hash Domain Extension and the EMD Transform.
IACR Cryptol. ePrint Arch., 2006

Back to the Future: A Framework for Automatic Malware Removal and System Repair.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006


  Loading...