Computer Network Operations (CNO)
Agency / Branch:
DOD / MDA
The aim of this Phase I SBIR effort is to protect software from malicious code embedded in COTS components and wrappers which bind them to middleware and operating system software using a concept we call protected COTS wrappers. Current protection technology secures COTS interfaces against malicious code using agents, containers, guards, trusted components or certifying compilers. None of these methods is foolproof. Most incur a performance penalty when instantiated operationally. RCI will minimize such performance penalties by developing optimization algorithms for use with its protected wrapper technology. RCI will then verify that its algorithms work via experiments using an NASA energy conversion applications library. In addition to verifying the feasibility of using its protected COTS wrapper technology in real-time systems, RCI will generate threat models and a knowledge base of protection experience. As an additional by-product of the effort, RCI will generate guidelines for use in selecting the most appropriate protection technology. To assess the commercial potential of the technology, RCI will conduct an aligned market survey and prepare a business plan. They will also plan a technology demonstration should they be awarded a Phase II follow-on effort.
Small Business Information at Submission:
REIFER CONSULTANTS, INC.
P.O. Box 4046 Torrance, CA 90510
Number of Employees: