Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Cliff L. Biffle is active.

Publication


Featured researches published by Cliff L. Biffle.


programming language design and implementation | 2011

Language-independent sandboxing of just-in-time compilation and self-modifying code

Jason Ansel; Petr Marchenko; Úlfar Erlingsson; Elijah Taylor; Derek L. Schuff; David C. Sehr; Cliff L. Biffle; Bennet S. Yee

When dealing with dynamic, untrusted content, such as on the Web, software behavior must be sandboxed, typically through use of a language like JavaScript. However, even for such specially-designed languages, it is difficult to ensure the safety of highly-optimized, dynamic language runtimes which, for efficiency, rely on advanced techniques such as Just-In-Time (JIT) compilation, large libraries of native-code support routines, and intricate mechanisms for multi-threading and garbage collection. Each new runtime provides a new potential attack surface and this security risk raises a barrier to the adoption of new languages for creating untrusted content. Removing this limitation, this paper introduces general mechanisms for safely and efficiently sandboxing software, such as dynamic language runtimes, that make use of advanced, low-level techniques like runtime code modification. Our language-independent sandboxing builds on Software-based Fault Isolation (SFI), a traditionally static technique. We provide a more flexible form of SFI by adding new constraints and mechanisms that allow safety to be guaranteed despite runtime code modifications. We have added our extensions to both the x86-32 and x86-64 variants of a production-quality, SFI-based sandboxing platform; on those two architectures SFI mechanisms face different challenges. We have also ported two representative language platforms to our extended sandbox: the Mono common language runtime and the V8 JavaScript engine. In detailed evaluations, we find that sandboxing slowdown varies between different benchmarks, languages, and hardware platforms. Overheads are generally moderate and they are close to zero for some important benchmark/platform combinations.


usenix security symposium | 2010

Adapting software fault isolation to contemporary CPU architectures

David C. Sehr; Robert Muth; Cliff L. Biffle; Victor Khimenko; Egor Pasko; Karl Schimpf; Bennet S. Yee


Archive | 2010

Dynamic code insertion and removal for static analysis based sandboxes

Bennet S. Yee; David C. Sehr; Cliff L. Biffle


Archive | 2012

Information processing on a head-mountable device

Joshua Weaver; Thad Starner; Cliff L. Biffle; Edward Allen Keyes


Archive | 2012

Hands-Free Selection Using a Ring-Based User-Interface

Aaron Joseph Wheeler; Sergey Brin; Thad Starner; Alejandro Jose Kauffmann; Cliff L. Biffle; Liang-Yu Chi; Steve Lee; Sebastian Thrun; Luis Ricardo Prada Gomez


Archive | 2011

Safe self-modifying code

Jason Ansel; Cliff L. Biffle; Úlfar Erlingsson; David C. Sehr


Archive | 2012

Balloon-based positioning system and method

Richard Wayne DeVaul; Waleed Kadous; Eric Teller; Cliff L. Biffle; Edward Allen Keyes


Archive | 2012

BRANCH DESTINATION TABLES

Cliff L. Biffle; Bennet S. Yee


Archive | 2015

Integration of antenna structures into balloon envelopes

Cliff L. Biffle; Richard Wayne DeVaul; Joshua Weaver; Anton Valdemar Staaf; Eric Teller; Michael Cassidy


Archive | 2012

Balloon envelope with integrated receiver

Cliff L. Biffle; Richard Wayne DeVaul; Joshua Weaver; Anton Valdemar Staaf; Eric Teller; Michael Cassidy

Collaboration


Dive into the Cliff L. Biffle's collaboration.

Researchain Logo
Decentralizing Knowledge