LDSS

mugshot

Úlfar Erlingsson

Associate Professor
School of Computer Science
Reykjavík University
Menntavegur 1
IS -101 Reykjavík
Iceland

ulfar@ru.is
Tel: +354 599 6283
Fax: +354 599 6301


Úlfar Erlingsson is currently at Google USA, where he leads security efforts in Google Research.
He is on indefinite leave from Reykjavík University.

Background

Úlfar joined as full-time faculty in late 2007. Before, he was a researcher at Microsoft Research Silicon Valley where he focused on secure, dependable software and low-level components such as device drivers, e.g., in the Gleipnir project.

Úlfar did his PhD work at Cornell University's Information Assurance Institute in the mid-to-late 90's on enforcing security policies by program modification. After Cornell, Úlfar was the Director of Privacy Protection for deCODE Genetics, where he worked on database security, both for their controversial Healthcare Database project and for the web interface to their genealogical database of all Icelanders.

In 1997, Úlfar developed Cornell Untrusted Binary Applets as a simple project in sandboxing. In 2001, he continued work on these ideas when he co-founded and was CTO of the Silicon Valley security software startup Green Border Technologies. GreenBorder was acquired by Google in 2007, and similar sandboxing is now the basis of the security in Google Chrome.

Publications

Yuan Yu, Michael Isard, Dennis Fetterly, Mihai Budiu, Úlfar Erlingsson, Pradeep Kumar Gunda, and Jon Currey. DryadLINQ: A System for General-Purpose Distributed Data-Parallel Computing Using a High-Level Language. To appear in the Symposium on Operating System Design and Implementation (OSDI'08), December, 2008

Arnar Birgisson, Mohan Dhawan, Úlfar Erlingsson, Vinod Ganapathy, Liviu Iftode. Enforcing Authorization Policies using Transactional Memory Introspection. To appear in the 15th ACM Conference on Computer and Communications Security (CCS 2008), October, 2008. [PDF]

Martín Abadi, Mihai Budiu, Úlfar Erlingsson, and Jay Ligatti. Control-Flow Integrity. Accepted to appear in a special issue of ACM Transactions on Information and System Security, 2008.

Úlfar Erlingsson. Low-level software security: Attacks and defenses. Foundations of Security Analysis and Design IV. Lecture Notes in Computer Science, LNCS 4677, pages 92-134, Springer Verlag, August, 2007. Also available as Technical Report MSR-TR-2007-153, Microsoft Research, November 2007.

Benjamin Livshits and Úlfar Erlingsson. Using Web Application Construction Frameworks To Protect Against Code Injection Attacks. In Workshop on Programming Languages and Analysis for Security (PLAS 2007), San Diego, California, June 2007. [PDF]

Benjamin Livshits and Úlfar Erlingsson. Towards Security By Construction For Web 2.0 Applications. In Workshop on Web 2.0 Security and Privacy (W2SP 2007), Oakland, California, May 2007. [PDF]

Úlfar Erlingsson, Benjamin Livshits, and Yinglian Xie.  End-to-end Web Application Security.  In Proceedings of the 11th Workshop on Hot Topics in Operating Systems (HotOS'07), San Diego, CA, May 2007. [PDF]

Úlfar Erlingsson, Martín Abadi, Michael Vrable, Mihai Budiu, and George C. Necula.  XFI: Software Guards for System Address Spaces.  In Proceedings of the 7th Usenix Symposium on Operating Systems Design and Implementation (OSDI'06), Seattle, Washington, November 2006. [PDF]

Mihai Budiu, Úlfar Erlingsson, and Martín Abadi.  Architectural Support for Software-based Protection.  In Workshop on Architectural and System Support for Improving Software Dependability (ASID), held in conjunction with ASPLOS'06, San Jose, CA, October 21, 2006. Also available as Technical Report MSR-TR-06-115, Microsoft Research, August 2006.

Úlfar Erlingsson and John MacCormick.  Ad hoc Extensibility and Access Control.  ACM Operating Systems Review, 40(3), July 2006. [Abstract and PDF]

Úlfar Erlingsson, Mark Manasse, and Frank McSherry.  A cool and practical alternative to traditional hash tables.  In Proceedings of the 7th Workshop on Distributed Data and Structures (WDAS'06), Santa Clara, CA, January 2006. [PDF]

Martín Abadi, Mihai Budiu, Úlfar Erlingsson, and Jay Ligatti. Control-Flow Integrity: Principles, Implementations, and Applications. In Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS'05), Alexandria, VA, November 2005. [Abstract and PDF]

Martín Abadi, Mihai Budiu, Úlfar Erlingsson, and Jay Ligatti. A theory of secure control flow. In Proceedings of the 7th International Conference on Formal Engineering Methods (ICFEM'05), Manchester, U.K., November 2005. [Abstract and PDF]

Michael Burrows, Úlfar Erlingsson, Shun-Tak Leung, Mark Vandevoorde, Carl Waldspurger, Kip Walker, and Bill Weihl.  Efficient and Flexible Value Sampling.  Proceedings of ASPLOS'00: The 9th International Conference on Architectural Support for Programming Languages and Operating Systems (Cambridge, MA, November 2000), pages 160-167.  [CiteSeer]

Úlfar Erlingsson, editor.  Proceedings of NORDSEC'00: The 5th Nordic Workshop on Secure IT Systems.  Reykjavík University (Reykjavík, Iceland), October 2000.

Úlfar Erlingsson and Fred B. Schneider.  IRM enforcement of Java stack inspection.  Proceedings 2000 IEEE Symposium on Security and Privacy (Oakland, California, May 2000), IEEE Computer Society, Los Alamitos, California, pages 246-255.  [CiteSeer]

Úlfar Erlingsson and Fred B. Schneider.  SASI enforcement of security policies: A retrospective. Proceedings of the New Security Paradigms Workshop (Caledon Hills, Ontario, Canada, September 1999), Association for Computing Machinery, pages 87-95.  [CiteSeer]

Úlfar Erlingsson, Mukkai Krishnamoorthy and T.V. Raman. Efficient Multiway Radix Search Trees. Information Processing Letters 60 (3):115-120, 1996. [PDF]

Úlfar Erlingsson, Erich Kaltofen and David Musser. Generic Gram-Schmidt Orthogonalization by Exact Division. Proceedings of ISSAC'96: The 1996 International Symposium on Symbolic and Algebraic Computation (Zurich, Switzerland), July 1996. [CiteSeer]

Technical reports

Arnar Birgisson, Úlfar Erlingsson. An Implementation and Semantics for Transactional Memory Introspection in Haskell. Technical Report RUTR-CS08007, Reykjavík University, August, 2008. [PDF]

Yuan Yu, Michael Isard, Dennis Fetterly, Mihai Budiu, Úlfar Erlingsson, Pradeep Kumar Gunda, Jon Currey, Frank McSherry, and Kannan Achan. Some sample programs written in DryadLINQ. Microsoft Research Technical Report, MSR-TR-2008-74, May, 2008. [PDF]

Arnar Birgisson, Mohan Dhawan, Úlfar Erlingsson, Vinod Ganapathy, and Liviu Iftode. Enforcing Authorization Policies using Transactional Memory Introspection. Technical Report DCS-TR-628, Rutgers University, April, 2008. [PDF]

Úlfar Erlingsson. Low-level software security: Attacks and defenses.  Technical Report MSR-TR-2007-153, Microsoft Research, November 2007. [PDF]

Mihai Budiu, Úlfar Erlingsson, and Martín Abadi.  Architectural Support for Software-based Protection.  Technical Report MSR-TR-06-115, Microsoft Research, August 2006. [PDF]

Úlfar Erlingsson and John MacCormick.  Ad hoc Extensibility and Access Control.  Technical Report MSR-TR-05-143, Microsoft Research, October 2005. [PDF]

Úlfar Erlingsson, Tom Roeder, and Ted Wobber.  Virtual Environments for Unreliable Extensions.  Technical Report MSR-TR-05-82, Microsoft Research, June 2005. [PDF]

Martín Abadi, Mihai Budiu, Úlfar Erlingsson, and Jay Ligatti.  Control-Flow Integrity.  Technical Report MSR-TR-05-18, Microsoft Research, Feb 2005. [PDF]

Martín Abadi, Mihai Budiu, Úlfar Erlingsson, and Jay Ligatti.  A Theory of Secure Control Flow.  Technical Report MSR-TR-05-17, Microsoft Research, Feb 2005. [PDF]

Úlfar Erlingsson.  The Inlined Reference Monitor Approach to Security Policy Enforcement.  Ph.D. thesis, Department of Computer Science, Cornell University. Technical Report 2003-1916, Department of Computer Science, Cornell University, Ithaca, NY, 2003. [PDF]

Úlfar Erlingsson and Fred B. Schneider.  IRM enforcement of Java stack inspection.  Technical Report 2000-1786, Department of Computer Science, Cornell University, Ithaca, NY, 2000. [PDF]

Úlfar Erlingsson and Fred B. Schneider.  SASI Enforcement of Security Policies: A Retrospective.  Technical Report 1999-1758, Department of Computer Science, Cornell University, Ithaca, NY, 1999. [PDF]

Úlfar Erlingsson and Mukkai Krishnamoorthy. Interactive Graph Drawing on the World Wide Web. Technical Report 96-13, Department of Computer Science, Rensselaer Polytechnic Institute, Troy, NY, 1996. [PDF]

Úlfar Erlingsson and Alexander V. Konstantinou. Implementing the C++ Standard Template Library in Ada 95. Technical Report 96-03, Department of Computer Science, Rensselaer Polytechnic Institute, Troy, NY, 1996. [PDF]

Úlfar Erlingsson, Erich Kaltofen and David Musser. Generic Gram-Schmidt Orthogonalization by Exact Division. Technical Report 96-02, Department of Computer Science, Rensselaer Polytechnic Institute, Troy, NY, 1996. [PDF]

Úlfar Erlingsson, Mukkai Krishnamoorthy and T.V. Raman. Lucid and Efficient Case Analysis. Technical Report 95-14, Department of Computer Science, Rensselaer Polytechnic Institute, Troy, NY, 1995. [PS]