USA flag logo/image

An Official Website of the United States Government

Countermeasures to Covert Access Methods to ReduceAttack Susceptibility and…

Award Information

Department of Defense
Award ID:
Program Year/Program:
2011 / SBIR
Agency Tracking Number:
Solicitation Year:
Solicitation Topic Code:
Solicitation Number:
Small Business Information
EDAptive Computing, Inc.
1245 Lyons Road Building G Dayton, OH 45458-1818
View profile »
Woman-Owned: No
Minority-Owned: Yes
HUBZone-Owned: No
Phase 2
Fiscal Year: 2011
Title: Countermeasures to Covert Access Methods to ReduceAttack Susceptibility and Ensure Trust
Agency: DOD
Contract: FA8650-11-C-1049
Award Amount: $749,913.00


Sophisticated methods for compromising computer systems have continuously shown their ability to defeat current operating system and network defenses. Processes such as the BIOS, hardware device drivers, and COTS hardware from a non-trusted supply chain have been identified to include malware or Trojan horse applications. These subversive programs provide attackers with gaping holes from which they can pirate software, exfiltrate data, execute processes, alter critical information, or control network end-nodes. The biggest problem with many attacks of this magnitude is that they lie in areas of the computer system which are not easily accessible through software-only approaches. As such, the goal of our proposed technology is to provide protection at the hardware level through a combination of software and hardware systems that will monitor low-level access to critical system devices including hard disks, memory, and peripherals.

Principal Investigator:

Jorge Sanchez
Developer I
(937) 281-0783

Business Contact:

Praveen Chawla
(937) 281-0790
Small Business Information at Submission:

Edaptive Computing, Inc
1245 LYONS RD STE G Dayton, OH -

EIN/Tax ID: 311497253
Number of Employees:
Woman-Owned: No
Minority-Owned: No
HUBZone-Owned: No