You are here

InnerAwareness: Preemptive Cyber Defense and Situational Understanding Through Memory-Oriented Cyber Genomics and Physiology

Award Information
Agency: Department of Homeland Security
Branch: N/A
Contract: HSHQDC-17-C-00044
Agency Tracking Number: HSHQDC-16-R-00012-H-SB016.1-003-0021-II
Amount: $749,998.63
Phase: Phase II
Program: SBIR
Solicitation Topic Code: H-SB016.1-003
Solicitation Number: HSHQDC-16-R-00012
Timeline
Solicitation Year: 2016
Award Year: 2017
Award Start Date (Proposal Award Date): 2017-05-15
Award End Date (Contract End Date): 2019-05-14
Small Business Information
130 Hamilton Hedge Pl
Cary, NC 27519-9144
United States
DUNS: 080078085
HUBZone Owned: No
Woman Owned: No
Socially and Economically Disadvantaged: No
Principal Investigator
 Kevin Snow
 CoFounder/ CEO/Lead Scientist
 (919) 659-5973
 kevin@zeropointdynamics.com
Business Contact
 Kevin Snow
Title: Co-Founder/CEO
Phone: (919) 659-5973
Email: kevin@zeropointdynamics.com
Research Institution
N/A
Abstract

Motivated by a real operational need to tackle threats posed by the onslaught of constantly evolving exploits and malware, this proposal describes techniques for dynamically analyzing malware that addresses weaknesses in the status quo by (i) focusing on memory-oriented artifacts without the use of traditional sandbox hooks, while at the same time (ii) providing operators with enhanced situational understanding and preemptive malware and exploit defenses. Specifically, we will explore the design and implementation of novel memory-oriented techniques for conducting automated analysis of malware binaries (i.e. so called cyber-physiology techniques) to not only assist analysts in understanding the their function and intent, but also produce a novel set of outputs (i.e. artifacts, behaviors, code constructs) that, combined, concisely represent human understandable malware and exploit fingerprints. Second, we will design and implement so called cyber-genomics techniques for both individually using and collating a multitude of these malware fingerprints over time to not only aid in determining their identity, lineage, and provenance, but also identify trends in fingerprint components to pinpoint key distinguishing characteristics of malware that are likely to be utilized in future waves of attack.

* Information listed above is at the time of submission. *

US Flag An Official Website of the United States Government