Úlfar Erlingsson

Affiliations:
  • Reykjavík University, Iceland


According to our database1, Úlfar Erlingsson authored at least 51 papers between 1996 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Extracting Training Data from Large Language Models.
Proceedings of the 30th USENIX Security Symposium, 2021

Tempered Sigmoid Activations for Deep Learning with Differential Privacy.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
Encode, Shuffle, Analyze Privacy Revisited: Formalizations and Empirical Evaluation.
CoRR, 2020

2019
Distribution Density, Tails, and Outliers in Machine Learning: Metrics and Applications.
CoRR, 2019

That which we call private.
CoRR, 2019

The Secret Sharer: Evaluating and Testing Unintended Memorization in Neural Networks.
Proceedings of the 28th USENIX Security Symposium, 2019

Amplification by Shuffling: From Local to Central Differential Privacy via Anonymity.
Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms, 2019

Reducing Permission Requests in Mobile Apps.
Proceedings of the Internet Measurement Conference, 2019

2018
The Secret Sharer: Measuring Unintended Neural Network Memorization & Extracting Secrets.
CoRR, 2018

Scalable Private Learning with PATE.
Proceedings of the 6th International Conference on Learning Representations, 2018

2017
On the Protection of Private Information in Machine Learning Systems: Two Recent Approaches.
CoRR, 2017

Prochlo: Strong Privacy for Analytics in the Crowd.
Proceedings of the 26th Symposium on Operating Systems Principles, 2017

Semi-supervised Knowledge Transfer for Deep Learning from Private Training Data.
Proceedings of the 5th International Conference on Learning Representations, 2017

On the Protection of Private Information in Machine Learning Systems: Two Recent Approches.
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017

Data-driven Software Security and its Hardware Support.
Proceedings of the 2017 Workshop on Attacks and Solutions in Hardware Security, 2017

2016
Building a RAPPOR with the Unknown: Privacy-Preserving Learning of Associations and Data Dictionaries.
Proc. Priv. Enhancing Technol., 2016

Data-Driven Software Security: Models and Methods.
Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016

2015
Apples and Oranges: Detecting Least-Privilege Violators with Peer Group Analysis.
CoRR, 2015

2014
Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Macaroons: Cookies with Contextual Caveats for Decentralized Authorization in the Cloud.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Strato: A Retargetable Framework for Low-Level Inlined-Reference Monitors.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

2012
Fay: Extensible Distributed Tracing from Kernels to Clusters.
ACM Trans. Comput. Syst., 2012

Let's Parse to Prevent Pwnage.
Proceedings of the 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2012

2011
Automated Analysis of Security-Critical JavaScript APIs.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

Fay: extensible distributed tracing from kernels to clusters.
Proceedings of the 23rd ACM Symposium on Operating Systems Principles 2011, 2011

Language-independent sandboxing of just-in-time compilation and self-modifying code.
Proceedings of the 32nd ACM SIGPLAN Conference on Programming Language Design and Implementation, 2011

2010
Low-Level Software Security by Example.
Proceedings of the Handbook of Information and Communication Security, 2010

2009
Control-flow integrity principles, implementations, and applications.
ACM Trans. Inf. Syst. Secur., 2009

An implementation and semantics for transactional memory introspection in Haskell.
Proceedings of the 2009 Workshop on Programming Languages and Analysis for Security, 2009

09141 Executive Summary - Web Application Security.
Proceedings of the Web Application Security, 29.03. - 03.04.2009, 2009

09141 Abstracts Collection - Web Application Security.
Proceedings of the Web Application Security, 29.03. - 03.04.2009, 2009

2008
Programming languages and program analysis for security: a three-year retrospective.
ACM SIGPLAN Notices, 2008

PLAS 2008 paper abstracts.
ACM SIGPLAN Notices, 2008

Workshop on programming languages and analysis for security (PLAS 2008).
ACM SIGPLAN Notices, 2008

DryadLINQ: A System for General-Purpose Distributed Data-Parallel Computing Using a High-Level Language.
Proceedings of the 8th USENIX Symposium on Operating Systems Design and Implementation, 2008

Enforcing authorization policies using transactional memory introspection.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

2007
Using web application construction frameworks to protect against code injection attacks.
Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security, 2007

End-to-End Web Application Security.
Proceedings of HotOS'07: 11th Workshop on Hot Topics in Operating Systems, 2007

Low-Level Software Security: Attacks and Defenses.
Proceedings of the Foundations of Security Analysis and Design IV, 2007

2006
Ad hoc extensibility and access control.
ACM SIGOPS Oper. Syst. Rev., 2006

XFI: Software Guards for System Address Spaces.
Proceedings of the 7th Symposium on Operating Systems Design and Implementation (OSDI '06), 2006

Architectural support for software-based protection.
Proceedings of the 1st Workshop on Architectural and System Support for Improving Software Dependability, 2006

2005
A Theory of Secure Control Flow.
Proceedings of the Formal Methods and Software Engineering, 2005

Control-flow integrity.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

2004
The Inlined Reference Monitor Approach to Security Policy Enforcement.
PhD thesis, 2004

2000
IRM Enforcement of Java Stack Inspection.
Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000

Efficient and Flexible Value Sampling.
Proceedings of the ASPLOS-IX Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems, 2000

1999
SASI enforcement of security policies: a retrospective.
Proceedings of the 1999 Workshop on New Security Paradigms, 1999

1996
Efficient Multiway Radix Search Trees.
Inf. Process. Lett., 1996

Generic Gram-Schmidt Orthogonalization by Exact Division.
Proceedings of the 1996 International Symposium on Symbolic and Algebraic Computation, 1996


  Loading...