You are here

Security Escorts for Not-Yet-Trusted Software

Award Information
Agency: Department of Defense
Branch: Air Force
Contract: FA9550-06-C-0080
Agency Tracking Number: O064-SP2-1001
Amount: $99,996.00
Phase: Phase I
Program: STTR
Solicitation Topic Code: OSD06-SP2
Solicitation Number: N/A
Timeline
Solicitation Year: 2006
Award Year: 2006
Award Start Date (Proposal Award Date): 2006-06-09
Award End Date (Contract End Date): 2007-06-09
Small Business Information
951 Mariner's Island Blvd., STE 360
San Mateo, CA 94404
United States
DUNS: 608176715
HUBZone Owned: No
Woman Owned: No
Socially and Economically Disadvantaged: No
Principal Investigator
 Charles Earl
 Principal Investigator
 (650) 931-2700
 earl@stottlerhenke.com
Business Contact
 James Hollingsworth
Title: Accounting/Contracting Manager
Phone: (650) 931-2700
Email: jhworth@stottlerhenke.com
Research Institution
 COLUMBIA UNIV.
 Jason Nieh
 
518 CS Bldg, Computer Science , 1214 Amsterdam Ave MC0401
New York, NY 10027
United States

 (212) 939-7160
 Nonprofit College or University
Abstract

With the rapid release of new software applications, builds and patches for existing applications, and increased mobility of software across networks, more of our systems will run software applications that may not have a full pedigree of evaluation and testing to ensure that they are free from exploits and malware. Additionally, any previous certifications are invalidated at the first update. However, it isn’t practical to exclude critical functionality from our systems simply due to a lack of pedigree. One technique for allowing untrusted functions to run on a system is to establish a constrained environment, or sandbox, that monitors the activities of software and limits access to the rest of the system.

* Information listed above is at the time of submission. *

US Flag An Official Website of the United States Government