You are here

Kernel-mode Software Protection Vulnerability Assessment and Rootkit Reverse Engineering Tool Development

Award Information
Agency: Department of Defense
Branch: Air Force
Contract: FA8650-06-M-8078
Agency Tracking Number: O064-NC4-1009
Amount: $100,000.00
Phase: Phase I
Program: STTR
Solicitation Topic Code: OSD06-NC4
Solicitation Number: N/A
Timeline
Solicitation Year: 2006
Award Year: 2006
Award Start Date (Proposal Award Date): 2006-07-27
Award End Date (Contract End Date): 2007-01-27
Small Business Information
6900 Wisconsin Avenue, Suite 706
Chevy Chase, MD 20815
United States
DUNS: 144818379
HUBZone Owned: No
Woman Owned: No
Socially and Economically Disadvantaged: No
Principal Investigator
 Greg Hoglund
 CEO
 (408) 529-4370
 derrick@hbgary.com
Business Contact
 Robert Slapnik
Title: Vice President
Phone: (301) 652-8885
Email: bob@hbgary.com
Research Institution
N/A
Abstract

Software protections mechanisms are a means for preventing piracy, alteration, and reverse engineering of critical national security software and data. Kernel-mode software protection techniques utilize, in-part, rootkit-like methods that provide anti-piracy and anti-reverse engineering protection to critical software applications. The fundamental difficulty associated with rootkits and software protection mechanisms are that they each wish to hide some aspect of their operation from outside observation. In striving to remain unobserved both types of software may spend some amount of time "on the lookout" for tools that may be used to thwart their respective efforts. The goal of this work is to design and prototype a toolset that can be used for unobserved, dynamic reverse engineering of software programs even when those software programs employ tamper-proofing and anti-reverse engineering techniques. The target programs may exist within a lab or upon production machinery. As such, the technology must be in-field deployable into existing machine environments. HBGary offers kernel mode reverse engineering tools to assist in analysis rootkits and overcome tamper-proofing techniques.

* Information listed above is at the time of submission. *

US Flag An Official Website of the United States Government