USA flag logo/image

An Official Website of the United States Government

Company Information:

Company Name:
Angel Secure Networks, Inc.
Address:
20 Godfrey Drive
Orono, ME 04473
Phone:
(207) 866-6537
URL:
N/A
EIN:
43500109
DUNS:
825247062
Number of Employees:
4
Woman-Owned?:
No
Minority-Owned?:
No
HUBZone-Owned?:
No

Commercialization:

Has been acquired/merged with?:
N/A
Has had Spin-off?:
N/A
Has Had IPO?:
N/A
Year of IPO:
N/A
Has Patents?:
N/A
Number of Patents:
N/A
Total Sales to Date $:
$ 0.00
Total Investment to Date $
$ 0.00
POC Title:
N/A
POC Name:
N/A
POC Phone:
N/A
POC Email:
N/A
Narrative:
N/A

Award Totals:

Program/Phase Award Amount ($) Number of Awards
SBIR Phase I $368,960.00 4
SBIR Phase II $1,499,607.00 2

Award List:

Anti-Terrorism - Detection, Indications, and Warnings

Award Year / Program / Phase:
2003 / SBIR / Phase I
Award Amount:
$69,338.00
Agency / Branch:
DOD / NAVY
Principal Investigator:
Fred Hewitt Smith, Director of Research
Abstract:
The US risks delivery by terrorists of nuclear weapons hidden in shipping containers to US ports. Navy Admiral Vern Clark has stated that the Navy and Coast Guard have the capability to deal with such problems, but lack a critical element--good informationregarding ships coming to US ports from all… More

Preventing Reverse Engineering with a Random Obfuscating Compiler (ROC)

Award Year / Program / Phase:
2003 / SBIR / Phase I
Award Amount:
$99,919.00
Agency / Branch:
DOD / OSD
Principal Investigator:
Fred Hewitt Smith, Director of Research
Abstract:
We propose to build a Random Obfuscating Compiler (ROC), a tool and a process for systematic research and testing of strategies for protecting software from reverse engineering using differential analysis. The US is at war. Our enemies will strive toreverse engineer valuable legacy software ,in… More

Automating Software Protection with the Random Obfuscating Compiler Version 2 (ROC2) running on Beowulf Clusters

Award Year / Program / Phase:
2005 / SBIR / Phase II
Award Amount:
$749,790.00
Agency / Branch:
DOD / OSD
Principal Investigator:
Fred H. Smith, Director of R&D
Abstract:
Our Random Obfuscating Compiler2 ("ROC2") automated toolset will protect DoD HPC executables running on Beowulf clusters from reverse engineering or compromise. Preliminary DoD HPC research is often conducted on university Beowulfs, which are also used by unscreened researchers and students. The US… More

Automating Software Protection with the Random Obfuscating Compiler Version 2 (ROC2) running on Beowulf Clusters

Award Year / Program / Phase:
2005 / SBIR / Phase I
Award Amount:
$99,804.00
Agency / Branch:
DOD / OSD
Principal Investigator:
Fred Smith, Director of Research
Abstract:
We propose to develop ROC2 to protect software from reverse engineering or compromise by automatically inserting strong Protect/Detect/React functionality into binaries by obfuscating executables, providing randomly different variants of the same binary, and permitting the software only to run on… More

Control & Data Plane Security of High Performance Networks

Award Year / Program / Phase:
2008 / SBIR / Phase I
Award Amount:
$99,899.00
Agency:
DOE
Principal Investigator:
Abstract:
Operating across international borders in cooperation with a multitude of domestic and foreign institutions and scientists, the DOE needs to protect its high performance science networks (such as ESnet and USnet) from destruction by outside adversaries and rogue insiders. This project will develop… More

Control & Data Plane Security of High Performance Networks

Award Year / Program / Phase:
2009 / SBIR / Phase II
Award Amount:
$749,817.00
Agency:
DOE
Principal Investigator:
Abstract:
High performance dynamic networks, which support scientific experiments with high bandwidth requirements, consist of a control plane and a data plane, neither of which, at present, is secure against cyber attack. Careless or malicious tampering with these networks could disrupt the network,… More