Countermeasures to Covert Access Methods to Reduce Attack Susceptibility and Ensure Trust
Agency / Branch:
DOD / OSD
Our proposal specifically addresses the stated requirements of the solicitation; we will develop software and data protection tools to detect and provide countermeasures to sophisticated covert access methods on computer systems. This includes hardware-based attacks which are currently undetectable through software-only approaches. The proposed EDAptiver TrEMBlE solution builds on previous EDAptive Computing, Inc (ECI) knowledge and technology - itself innovative - to provide detection of hardware-assisted attacks, otherwise undetectable through software only approaches. The resulting capabilities will result in a customized PCIe device and co-processor which will monitor traffic between non-trusted devices, detect anomalies, and create decoys for maliciously coded firmware attacks.
Small Business Information at Submission:
EDAPTIVE COMPUTING, INC.
1245 Lyons Road Building G Dayton, OH 45458
Number of Employees: