Cliff L. Biffle
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Cliff L. Biffle.
programming language design and implementation | 2011
Jason Ansel; Petr Marchenko; Úlfar Erlingsson; Elijah Taylor; Derek L. Schuff; David C. Sehr; Cliff L. Biffle; Bennet S. Yee
When dealing with dynamic, untrusted content, such as on the Web, software behavior must be sandboxed, typically through use of a language like JavaScript. However, even for such specially-designed languages, it is difficult to ensure the safety of highly-optimized, dynamic language runtimes which, for efficiency, rely on advanced techniques such as Just-In-Time (JIT) compilation, large libraries of native-code support routines, and intricate mechanisms for multi-threading and garbage collection. Each new runtime provides a new potential attack surface and this security risk raises a barrier to the adoption of new languages for creating untrusted content. Removing this limitation, this paper introduces general mechanisms for safely and efficiently sandboxing software, such as dynamic language runtimes, that make use of advanced, low-level techniques like runtime code modification. Our language-independent sandboxing builds on Software-based Fault Isolation (SFI), a traditionally static technique. We provide a more flexible form of SFI by adding new constraints and mechanisms that allow safety to be guaranteed despite runtime code modifications. We have added our extensions to both the x86-32 and x86-64 variants of a production-quality, SFI-based sandboxing platform; on those two architectures SFI mechanisms face different challenges. We have also ported two representative language platforms to our extended sandbox: the Mono common language runtime and the V8 JavaScript engine. In detailed evaluations, we find that sandboxing slowdown varies between different benchmarks, languages, and hardware platforms. Overheads are generally moderate and they are close to zero for some important benchmark/platform combinations.
usenix security symposium | 2010
David C. Sehr; Robert Muth; Cliff L. Biffle; Victor Khimenko; Egor Pasko; Karl Schimpf; Bennet S. Yee
Archive | 2010
Bennet S. Yee; David C. Sehr; Cliff L. Biffle
Archive | 2012
Joshua Weaver; Thad Starner; Cliff L. Biffle; Edward Allen Keyes
Archive | 2012
Aaron Joseph Wheeler; Sergey Brin; Thad Starner; Alejandro Jose Kauffmann; Cliff L. Biffle; Liang-Yu Chi; Steve Lee; Sebastian Thrun; Luis Ricardo Prada Gomez
Archive | 2011
Jason Ansel; Cliff L. Biffle; Úlfar Erlingsson; David C. Sehr
Archive | 2012
Richard Wayne DeVaul; Waleed Kadous; Eric Teller; Cliff L. Biffle; Edward Allen Keyes
Archive | 2012
Cliff L. Biffle; Bennet S. Yee
Archive | 2015
Cliff L. Biffle; Richard Wayne DeVaul; Joshua Weaver; Anton Valdemar Staaf; Eric Teller; Michael Cassidy
Archive | 2012
Cliff L. Biffle; Richard Wayne DeVaul; Joshua Weaver; Anton Valdemar Staaf; Eric Teller; Michael Cassidy