┌lfar Erlingsson
┌lfar Erlingsson
Research Scientist, Apple
Verified email at apple.com - Homepage
Title
Cited by
Cited by
Year
Control-flow integrity: Principles, implementations, and applications
M Abadi, M Budiu, ┌ Erlingsson, J Ligatti
ACM Transactions on Information and System Security (TISSEC) 13 (1), 4, 2009
16632009
DryadLINQ: A system for general-purpose distributed data-parallel computing using a high-level language
YYMID Fetterly, M Budiu, ┌ Erlingsson, PK Gunda, J Currey
OSDI, 2008
9562008
RAPPOR: Randomized aggregatable privacy-preserving ordinal response
┌ Erlingsson, V Pihur, A Korolova
Proceedings of the 2014 ACM SIGSAC conference on computer and communicationsá…, 2014
7112014
SASI enforcement of security policies: A retrospective
┌ Erlingsson, FB Schneider
Proceedings of the 1999 workshop on New security paradigms, 87-95, 1999
4851999
XFI: Software guards for system address spaces
┌ Erlingsson, M Abadi, M Vrable, M Budiu, GC Necula
Proceedings of the 7th symposium on Operating systems design andá…, 2006
454*2006
IRM enforcement of Java stack inspection
┌ Erlingsson, FB Schneider
Cornell University, 2000
3972000
Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM
C Tice, T Roeder, P Collingbourne, S Checkoway, ┌ Erlingsson, ...
USENIX Security Symposium, 2014
3032014
The inlined reference monitor approach to security policy enforcement
┌ Erlingsson
Cornell University, 2003
2552003
Semi-supervised knowledge transfer for deep learning from private training data
N Papernot, M Abadi, U Erlingsson, I Goodfellow, K Talwar
arXiv preprint arXiv:1610.05755, 2016
2492016
Methods and systems for implementing a secure application execution environment using derived user accounts for internet content
U Erlingsson
US Patent App. 10/456,805, 2004
2092004
Building a RAPPOR with the unknown: Privacy-preserving learning of associations and data dictionaries
G Fanti, V Pihur, ┌ Erlingsson
Proceedings on Privacy Enhancing Technologies 2016 (3), 41-61, 2016
1412016
Providing direct access to hardware from a virtual environment
U Erlingsson, E Wobber, T Roeder
US Patent App. 10/837,103, 2005
1352005
Automated analysis of security-critical Javascript APIs
A Taly, ┌ Erlingsson, JC Mitchell, MS Miller, J Nagra
Security and Privacy (SP), 2011 IEEE Symposium on, 363-378, 2011
1312011
The secret sharer: Evaluating and testing unintended memorization in neural networks
N Carlini, C Liu, ┌ Erlingsson, J Kos, D Song
28th {USENIX} Security Symposium ({USENIX} Security 19), 267-284, 2019
125*2019
VEX—virtual extension framework
┌ Erlingsson, EP Wobber, P Barham, TM Roeder
US Patent 7,574,709, 2012
1142012
Language-independent sandboxing of just-in-time compilation and self-modifying code
J Ansel, P Marchenko, ┌ Erlingsson, E Taylor, B Chen, DL Schuff, D Sehr, ...
Proceedings of the 32nd ACM SIGPLAN conference on Programming languageá…, 2011
1072011
Scalable private learning with PATE
N Papernot, S Song, I Mironov, A Raghunathan, K Talwar, ┌ Erlingsson
arXiv preprint arXiv:1802.08908, 2018
972018
Fay: extensible distributed tracing from kernels to clusters
┌ Erlingsson, M Peinado, S Peter, M Budiu, G Mainar-Ruiz
ACM Transactions on Computer Systems (TOCS) 30 (4), 1-35, 2012
962012
Methods and systems for providing a secure application environment using derived user accounts
U Erlingsson
US Patent 7,191,469, 2007
912007
High level programming extensions for distributed data parallel processing
Y Yu, U Erlingsson, MA Isard, F McSherry
US Patent 8,209,664, 2012
902012
The system can't perform the operation now. Try again later.
Articles 1–20