Year |
Citation |
Score |
2011 |
Erlingsson U, Peinado M, Peter S, Budiu M. Fay: Extensible distributed tracing from kernels to clusters Sosp'11 - Proceedings of the 23rd Acm Symposium On Operating Systems Principles. 311-326. DOI: 10.1145/2382553.2382555 |
0.38 |
|
2011 |
Ansel J, Marchenko P, Erlingsson U, Taylor E, Chen B, Schuff DL, Sehr D, Biffle CL, Yee B. Language-independent sandboxing of just-in-time compilation and self-modifying code Proceedings of the Acm Sigplan Conference On Programming Language Design and Implementation (Pldi). 355-366. DOI: 10.1145/1993498.1993540 |
0.336 |
|
2011 |
Taly A, Erlingsson U, Mitchell JC, Miller MS, Nagra J. Automated analysis of security-critical JavaScript APIs Proceedings - Ieee Symposium On Security and Privacy. 363-378. DOI: 10.1109/SP.2011.39 |
0.379 |
|
2009 |
Birgisson A, Erlingsson Ú. An implementation and semantics for transactional memory introspection in Haskell (abstract only) Sigplan Notices. 44: 6-6. DOI: 10.1145/1667209.1667218 |
0.35 |
|
2009 |
Abadi M, Budiu M, Erlingsson U, Ligatti J. Control-flow integrity principles, implementations, and applications Acm Transactions On Information and System Security. 13. DOI: 10.1145/1609956.1609960 |
0.441 |
|
2009 |
Erlingsson U, Birgisson A. An implementation and semantics for transactional memory introspection in haskell Plas'09 - Proceedings of the Acm Sigplan 4th Workshop On Programming Languages and Analysis For Security. 87-99. DOI: 10.1145/1554339.1554350 |
0.302 |
|
2008 |
Pistoia M, Erlingsson U. Programming languages and program analysis for security : A three-year retrospective Acm Sigplan Notices. 43: 32-39. DOI: 10.1145/1513443.1513449 |
0.502 |
|
2008 |
Pistoia M, Erlingsson U. Workshop on programming languages and analysis for security (PLAS 2008) Acm Sigplan Notices. 43: 3-4. DOI: 10.1145/1513443.1513445 |
0.384 |
|
2008 |
Birgisson A, Dhawan M, Erlingsson U, Ganapathy V, Iftode L. Enforcing authorization policies using transactional memory introspection Proceedings of the Acm Conference On Computer and Communications Security. 223-234. DOI: 10.1145/1455770.1455800 |
0.446 |
|
2008 |
Erlingsson Ú, Pistoia M. PLAS'08: Proceedings of the ACM SIGPLAN 3rd Workshop on Programming Languages and Analysis for Security: Foreword Plas'08: Proceedings of the Acm Sigplan 3rd Workshop On Programming Languages and Analysis For Security. |
0.357 |
|
2007 |
Livshits B, Erlingsson U. Using web application construction frameworks to protect against code injection attacks Plas'07 - Proceedings of the 2007 Acm Sigplan Workshop On Programming Languages and Analysis For Security. 95-104. DOI: 10.1145/1255329.1255346 |
0.362 |
|
2007 |
Erlingsson U. Low-level software security: Attacks and defenses Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4677: 92-134. |
0.408 |
|
2006 |
Budiu M, Erlingsson U, Abadi M. Architectural support for software-based protection Asid'06: 1st Workshop On Architectural and System Support For Improving Software Dependability. 42-51. DOI: 10.1145/1181309.1181316 |
0.374 |
|
2006 |
Erlingsson U, MacCormick J. Ad hoc extensibility and access control Operating Systems Review (Acm). 40: 93-101. DOI: 10.1145/1151374.1151393 |
0.413 |
|
2005 |
Abadi M, Budiu M, Erlingsson U, Ligatti J. Control-flow integrity: Principles, implementations, and applications Proceedings of the Acm Conference On Computer and Communications Security. 340-353. DOI: 10.1145/1609956.1609960 |
0.461 |
|
2000 |
Erlingsson U, Schneider FB. SASI enforcement of security policies: A retrospective Proceedings - Darpa Information Survivability Conference and Exposition, Discex 2000. 2: 287-295. DOI: 10.1109/DISCEX.2000.821527 |
0.433 |
|
Show low-probability matches. |