Follow
Úlfar Erlingsson
Úlfar Erlingsson
Architect at Lacework
Verified email at lacework.net - Homepage
Title
Cited by
Cited by
Year
Control-flow integrity: Principles, implementations, and applications
M Abadi, M Budiu, Ú Erlingsson, J Ligatti
ACM Transactions on Information and System Security (TISSEC) 13 (1), 4, 2009
25452009
RAPPOR: Randomized aggregatable privacy-preserving ordinal response
Ú Erlingsson, V Pihur, A Korolova
Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014
22032014
Extracting training data from large language models
N Carlini, F Tramer, E Wallace, M Jagielski, A Herbert-Voss, K Lee, ...
30th USENIX Security Symposium (USENIX Security 21), 2633-2650, 2021
11582021
The secret sharer: Evaluating and testing unintended memorization in neural networks
N Carlini, C Liu, Ú Erlingsson, J Kos, D Song
28th USENIX security symposium (USENIX security 19), 267-284, 2019
1156*2019
DryadLINQ: A system for general-purpose distributed data-parallel computing using a high-level language
YYMID Fetterly, M Budiu, Ú Erlingsson, PK Gunda, J Currey
OSDI, 2008
11182008
Semi-supervised knowledge transfer for deep learning from private training data
N Papernot, M Abadi, U Erlingsson, I Goodfellow, K Talwar
arXiv preprint arXiv:1610.05755, 2016
10752016
Scalable private learning with pate
P Nicolas, S Shuang, M Ilya, R Ananth, T Kunal, E Úlfar
arXiv preprint arXiv:1802.08908, 2018
658*2018
XFI: Software guards for system address spaces
U Erlingsson, M Abadi, M Vrable, M Budiu, GC Necula
Proceedings of the 7th symposium on Operating systems design and …, 2006
5682006
SASI enforcement of security policies: A retrospective
Ú Erlingsson, FB Schneider
Proceedings of the 1999 workshop on New security paradigms, 87-95, 1999
5401999
Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM
C Tice, T Roeder, P Collingbourne, S Checkoway, Ú Erlingsson, ...
USENIX Security Symposium, 2014
5292014
Prochlo: Strong privacy for analytics in the crowd
A Bittau, Ú Erlingsson, P Maniatis, I Mironov, A Raghunathan, D Lie, ...
Proceedings of the 26th symposium on operating systems principles, 441-459, 2017
4452017
IRM enforcement of Java stack inspection
Ú Erlingsson, FB Schneider
Cornell University, 2000
4232000
Amplification by shuffling: From local to central differential privacy via anonymity
Ú Erlingsson, V Feldman, I Mironov, A Raghunathan, K Talwar, ...
Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete …, 2019
4172019
Building a RAPPOR with the unknown: Privacy-preserving learning of associations and data dictionaries
G Fanti, V Pihur, Ú Erlingsson
Proceedings on Privacy Enhancing Technologies 2016 (3), 41-61, 2016
3422016
The inlined reference monitor approach to security policy enforcement
Ú Erlingsson
Cornell University, 2003
3002003
Methods and systems for implementing a secure application execution environment using derived user accounts for internet content
U Erlingsson
US Patent App. 10/456,805, 2004
2312004
A general approach to adding differential privacy to iterative training procedures
HB McMahan, G Andrew, U Erlingsson, S Chien, I Mironov, N Papernot, ...
arXiv preprint arXiv:1812.06210, 2018
1932018
Automated analysis of security-critical Javascript APIs
A Taly, Ú Erlingsson, JC Mitchell, MS Miller, J Nagra
Security and Privacy (SP), 2011 IEEE Symposium on, 363-378, 2011
1592011
Tempered sigmoid activations for deep learning with differential privacy
N Papernot, A Thakurta, S Song, S Chien, Ú Erlingsson
Proceedings of the AAAI Conference on Artificial Intelligence 35 (10), 9312-9321, 2021
1542021
Fay: Extensible distributed tracing from kernels to clusters
Ú Erlingsson, M Peinado, S Peter, M Budiu, G Mainar-Ruiz
ACM Transactions on Computer Systems (TOCS) 30 (4), 1-35, 2012
1502012
The system can't perform the operation now. Try again later.
Articles 1–20