Deterministic Detection for Hijacked Program Execution
Our proposal specifically addresses the stated requirements of the solicitation; we will develop software and system protection tools for monitoring the execution of untrusted software in large complex networks. This includes attacks which may be present in software applications used within the DoD (e.g. buffer overflow, code injection, rootkit patching, etc.). The proposed EDAptive DeforcE solution builds on previous Edaptive Computing, Inc. (ECI) knowledge and technology itself innovative to provide detection and reporting of software based attacks. The resulting capabilities will result in innovative compiler technology, along with a software monitor, to determine if anomalous behavior (i.e. an attack) has occurred in the execution of the application.
Small Business Information at Submission:
EDAptive Computing, Inc.
1245 LYONS RD STE G Dayton, OH -
Number of Employees: