The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Úlfar Erlingsson: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Michael Burrows, Ulfar Erlingson, Shun-Tak Leung, Mark T. Vandevoorde, Carl A. Waldspurger, Kip Walker, William E. Weihl
    Efficient and Flexible Value Sampling. [Citation Graph (0, 0)][DBLP]
    ASPLOS, 2000, pp:160-167 [Conf]
  2. Mihai Budiu, Úlfar Erlingsson, Martín Abadi
    Architectural support for software-based protection. [Citation Graph (0, 0)][DBLP]
    ASID, 2006, pp:42-51 [Conf]
  3. Martín Abadi, Mihai Budiu, Úlfar Erlingsson, Jay Ligatti
    Control-flow integrity. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:340-353 [Conf]
  4. Martín Abadi, Mihai Budiu, Úlfar Erlingsson, Jay Ligatti
    A Theory of Secure Control Flow. [Citation Graph (0, 0)][DBLP]
    ICFEM, 2005, pp:111-124 [Conf]
  5. Úlfar Erlingsson, Erich Kaltofen, David R. Musser
    Generic Gram-Schmidt Orthogonalization by Exact Division. [Citation Graph (0, 0)][DBLP]
    ISSAC, 1996, pp:275-282 [Conf]
  6. Úlfar Erlingsson, Martín Abadi, Michael Vrable, Mihai Budiu, George C. Necula
    XFI: Software Guards for System Address Spaces. [Citation Graph (0, 0)][DBLP]
    OSDI, 2006, pp:75-88 [Conf]
  7. Úlfar Erlingsson, Fred B. Schneider
    IRM Enforcement of Java Stack Inspection. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2000, pp:246-255 [Conf]
  8. Úlfar Erlingsson, Mukkai S. Krishnamoorthy, T. V. Raman
    Efficient Multiway Radix Search Trees. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1996, v:60, n:3, pp:115-120 [Journal]
  9. Úlfar Erlingsson, John MacCormick
    Ad hoc extensibility and access control. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2006, v:40, n:3, pp:93-101 [Journal]
  10. Úlfar Erlingsson
    Low-Level Software Security: Attacks and Defenses. [Citation Graph (0, 0)][DBLP]
    FOSAD, 2007, pp:92-134 [Conf]

  11. Enforcing authorization policies using transactional memory introspection. [Citation Graph (, )][DBLP]


  12. End-to-End Web Application Security. [Citation Graph (, )][DBLP]


  13. DryadLINQ: A System for General-Purpose Distributed Data-Parallel Computing Using a High-Level Language. [Citation Graph (, )][DBLP]


  14. Using web application construction frameworks to protect against code injection attacks. [Citation Graph (, )][DBLP]


  15. An implementation and semantics for transactional memory introspection in Haskell. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002