You are here

A Framework for Software Reverse Engineering Protection

Award Information
Agency: Department of Defense
Branch: Navy
Contract: N00178-02-C-3066
Agency Tracking Number: N02-100-01
Amount: $69,577.00
Phase: Phase I
Program: SBIR
Solicitation Topic Code: N/A
Solicitation Number: N/A
Solicitation Year: N/A
Award Year: 2002
Award Start Date (Proposal Award Date): N/A
Award End Date (Contract End Date): N/A
Small Business Information
9971 Valley View Road
Eden Prairie, MN 55344
United States
DUNS: 052062833
HUBZone Owned: No
Woman Owned: No
Socially and Economically Disadvantaged: No
Principal Investigator
 Kevin Millikin
 R&D Engineer
 (952) 829-5864
Business Contact
 Kenneth Thurber
Title: President
Phone: (952) 829-5864
Research Institution

"Military software systems are vulnerable to Information Warfare attacks. If an enemy can gain knowledge of the software, then the software and the systems it runs on can be attacked, either directly or indirectly. One method the enemy may employ isreverse engineering, attempting to recover the program's source code from the binary executable file. Software obfuscation is a defensive information warfare technique that tries to make the cost of reverse engineering prohibitive to the enemy.Obfuscation can also protect software from theft and subsequent reuse. In addition, a software obfuscation capability can enable active offensive information warfare and protection from attacks such as viruses and worms. Architecture TechnologyCorporation proposes the research and development of technologies and products necessary for software obfuscation technology for the Navy. There are three products of this research and development effort. A predictive obfuscation model will allow Navysoftware engineers to anticipate the cost and effectiveness of obfuscating transformations, and to intelligently design obfuscating solutions. Second, a catalog of transformations known from scientific literature and engineering folklore as well asseveral novel transformations will be produced. Finally, a prototype implementation will validate the model and serve as a proof of the concept of object to object obfuscation, as well as a prototype to an automati

* Information listed above is at the time of submission. *

US Flag An Official Website of the United States Government