Úlfar Erlingsson
Co-Authors
-
Ananth Raghunathan
-
Ankur Taly
-
Arnar
Birgisson
-
Brad Chen
-
Caroline Tice
-
Cliff L.
Biffle
-
David Sehr
-
Derek Schuff
-
Geoff Pike
-
H. Brendan
McMahan
-
Ian
Goodfellow
-
Ilya
Mironov
-
Iulia Ion
-
Kunal
Talwar
-
Li Zhang
-
Mark
Lentczner
-
Mark S.
Miller
-
Martín Abadi
-
Michael Burrows
-
Michael
Vrable
-
Peter Collingbourne
-
Petros
Maniatis
-
Shun-Tak Leung
-
T. V.
Raman
Google Publications
-
Scalable Private Learning with PATE
Nicolas Papernot, Shuang Song, Ilya Mironov, Ananth Raghunathan, Kunal Talwar, Úlfar Erlingsson
ICLR 2018 (2018) (to appear)
-
The Secret Sharer: Measuring Unintended Neural Network Memorization & Extracting Secrets
Nicholas Carlini, Chang Liu, Jernej Kos, Úlfar Erlingsson, Dawn Song
ArXiv e-prints, vol. 1802.08232 (2018)
-
On the Protection of Private Information in Machine Learning Systems: Two Recent Approaches
Martín Abadi, Úlfar Erlingsson, Ian Goodfellow, H. Brendan McMahan, Nicolas Papernot, Ilya Mironov, Kunal Talwar, Li Zhang
IEEE 30th Computer Security Foundations Symposium (CSF), IEEE (2017), pp. 1-6
-
Prochlo: Strong Privacy for Analytics in the Crowd
Andrea Bittau, Úlfar Erlingsson, Petros Maniatis, Ilya Mironov, Ananth Raghunathan, David Lie, Mitch Rudominer, Ushasree Kode, Julien Tinnes, Bernhard Seefeld
Proceedings of the Symposium on Operating Systems Principles (SOSP) (2017) (to appear)
-
Semi-supervised Knowledge Transfer for Deep Learning from Private Training Data
Nicolas Papernot, Martín Abadi, Úlfar Erlingsson, Ian Goodfellow, Kunal Talwar
Proceedings of the International Conference on Learning Representations (2017)
-
Giulia Fanti, Vasyl Pihur, Úlfar Erlingsson
Proceedings on Privacy Enhancing Technologies (PoPETS), vol. issue 3, 2016 (2016)
-
Data-driven software security: Models and methods
IEEE Computer Security Foundations Symposium (2016)
-
Apples and Oranges: Detecting Least-Privilege Violators with Peer Group Analysis
Iulia Ion, Suman Jana, Úlfar Erlingsson
CoRR, vol. abs/1510.07308 (2015)
-
Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM
Caroline Tice, Tom Roeder, Peter Collingbourne, Stephen Checkoway, Úlfar Erlingsson, Luis Lozano, Geoff Pike
Proceedings of the 23rd Usenix Security Symposium, USENIX, San Diego, CA (2014)
-
Macaroons: Cookies with Contextual Caveats for Decentralized Authorization in the Cloud
Arnar Birgisson, Joe Gibbs Politz, Úlfar Erlingsson, Ankur Taly, Michael Vrable, Mark Lentczner
Network and Distributed System Security Symposium, Internet Society (2014)
-
RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response
Úlfar Erlingsson, Vasyl Pihur, Aleksandra Korolova
Proceedings of the 21st ACM Conference on Computer and Communications Security, ACM, Scottsdale, Arizona (2014)
-
Strato: A Retargetable Framework for Low-level Inlined Reference Monitors
Bin Zeng, Gang Tan, Úlfar Erlingsson
Proceedings of the 22nd USENIX Conference on Security, USENIX Association, Berkeley, CA, USA (2013), pp. 369-382
-
Mike Samuel, Úlfar Erlingsson
USENIX workshop on Large-Scale Exploits and Emergent Threats, USENIX (2012)
-
Automated Analysis of Security-Critical JavaScript APIs
Ankur Taly, Úlfar Erlingsson, John C. Mitchell, Mark S. Miller, Jasvir Nagra
IEEE Symposium on Security & Privacy (SP), IEEE (2011)
-
Fay: Extensible Distributed Tracing from Kernels to Clusters
Úlfar Erlingsson, Marcus Peinado, Simon Peter, Mihai Budiu
Proceedings of the 23rd ACM Symposium on Operating Systems Principles (SOSP'11), ACM, New York, NY, USA (2011)
-
Language-Independent Sandboxing of Just-In-Time Compilation and Self-Modifying Code
Jason Ansel, Petr Marchenko, Úlfar Erlingsson, Elijah Taylor, Brad Chen, Derek Schuff, David Sehr, Cliff L. Biffle, Bennet S. Yee
ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI), ACM SIGPLAN, New York, NY, USA. (2011)
-
Third International Symposium on Engineering Secure Software and Systems, ESSoS 2011
Úlfar Erlingsson, Roel Wieringa, Nicola Zannone, editors.
Springer Verlag, Berlin / Heidelberg
-
Dagstuhl Seminar 09141: Web Application Security (Abstracts collection)
Dan Boneh, Úlfar Erlingsson, Martin Johns, Benjamin Livshits
Dagstuhl Seminar Proceedings, Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, Germany, Dagstuhl, Germany (2010)
Previous Publications
-
Low-Level Software Security by Example
Úlfar Erlingsson, Yves Younan, Frank Piessens
Handbook of Information and Communication Security, Springer Verlag, Berlin, Heidelberg (2010), pp. 633-658
-
An implementation and semantics for transactional memory introspection in Haskell
Arnar Birgisson, Úlfar Erlingsson
Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and Analysis for Security, ACM, New York, NY, USA (2009), pp. 87-99
-
Efficient and Flexible Value Sampling
Michael Burrows, Úlfar Erlingsson, Shun-Tak Leung, Mark T. Vandevoorde, Carl A. Waldspurger, Kip Walker, William E. Weihl
ASPLOSProceedings of the 9th International Conference on Architectural Support Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS IX), ACM, Cambridge, MA (2000), pp. 160-167
-
Efficient Multiway Radix Search Trees
Úlfar Erlingsson, Mukkai S. Krishnamoorthy, T. V. Raman
Inf. Process. Lett., vol. 60 (1996), pp. 115-120
