You are here


Company Information
ITHACA, NY 14850-9213
United States



# of Employees: 12

Ownership Information

HUBZone Owned: No

Socially and Economically Disadvantaged: No

Woman Owned: No

Award Charts

Award Listing

  1. VMCIS: A Cognitive Immune System for Virtual Machine-based Mission Critical Applications

    Amount: $149,943.00

    Cyber systems remain susceptible to attack and compromise despite the best security efforts. There are two growing trends in the research community to address this: a paradigm of prioritizing mission ...

    SBIRPhase I2013Department of Defense Navy
  2. DivA: Automated Generation of Logical Code Diversity

    Amount: $499,994.00

    If a computer system suffers a cyber attack, any compromised component that is simply reinstalled will remain vulnerable to the attack that damaged it; so replacements should provide equivalent servic ...

    STTRPhase II2013Department of Defense Navy
  3. DocMark: A Rule-based and Probabilistic Document Marking System

    Amount: $149,995.00

    ABSTRACT: The secure, automated dissemination of information across security domains requires accurate, complete, and standardized releasability markings. Existing sensors, information sources, and ...

    SBIRPhase I2013Department of Defense Air Force
  4. Typhon: A Developer's Tool for Refactoring Legacy Software for Multi-threaded Operation

    Amount: $79,953.00

    Several mission-critical Navy applications are written as single-threaded Component Object Model) COM applications. They do not receive any benefits from the recent trend in computer architecture that ...

    SBIRPhase I2013Department of Defense Navy
  5. Arden

    Amount: $99,905.88

    Solid-state storage media, particularly solid-state drives (SSDs), present new challenges to forensic investigation that need to be addressed. The low-level behavior of these drives is dramatically di ...

    SBIRPhase I2012Department of Homeland Security
  6. Emile: The EventML Explorer

    Amount: $124,986.00

    The protocols needed to coordinate the activities of distributed components, such as consensus algorithms, are notoriously difficult to design, implement, and verify. Abstraction is the only way to g ...

    SBIRPhase I2012National Aeronautics and Space Administration
  7. WITTS: White Team Training Suite

    Amount: $149,930.00

    ABSTRACT: To maintain superiority in the cyber domain, the Air Force is preparing the next generation of cyber warriors. Running trainees through realistic cyber exercises is a highly effective meth ...

    SBIRPhase I2012Department of Defense Air Force
  8. Fight-Through Nodes (FTN)

    Amount: $749,784.00

    ABSTRACT: Despite existing security efforts, DoD networks are susceptible to attack and compromise. For critical missions, it is necessary to"fight through"cyber attacks in order to achieve mission ...

    SBIRPhase II2012Department of Defense Air Force
  9. CYTAN (CYbersecurity for TActical Networks)

    Amount: $999,693.00

    The JTRS PEO has identified the need to protect tactical networks from cyber threats that can compromise a mission. Cyber attacks can compromise, corrupt, or deny information exchange, rendering the n ...

    SBIRPhase II2012Department of Defense Navy
  10. DivA: Automated Generation of Logical Code Diversity

    Amount: $149,967.00

    Computing systems built on identical foundations (hardware, operating systems, etc.) will be vulnerable to the same attacks. To avoid widespread failures, techniques have been sought for introducing"s ...

    STTRPhase I2011Department of Defense Navy
US Flag An Official Website of the United States Government